UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Internet Control Message Types (ICMP) must be blocked inbound from external untrusted networks (e.g., ISP and other non-DoD networks).


Overview

Finding ID Version Rule ID IA Controls Severity
V-3026 NET0911 SV-15367r2_rule ECSC-1 Medium
Description
Using ICMP messages for information gathering is a process allowing malicious computer attackers to launch attacks against a targeted network. In this stage the malicious attacker will try to determine what the characteristics of the targeted network. Techniques, such as host detection, service detection, network topology mapping, and operating system fingerprinting are often used. The data collected will be used to identify those hosts running network services, which may have a known vulnerability. This vulnerability may allow the malicious attacker to exploit vulnerabilities in the network or gain unauthorized access to those systems. This unauthorized access may become the focal point to the whole targeted network.
STIG Date
Perimeter Router Security Technical Implementation Guide Juniper 2018-02-27

Details

Check Text ( C-12834r4_chk )
Interfaces peering with commercial ISPs or other non-DoD network sources:
Review ACLs configured on external interfaces of network devices connected to untrusted networks (e.g., ISP and other non-DoD networks) are blocking inbound ICMP messages. The following are exceptions are allowed inbound.

Exceptions:
ICMP messages Echo Reply (type 0)
ICMP Destination Unreachable – fragmentation needed (type 3 - code 4)
Source Quench (type 4)
Parameter Problem (type 12).

External Interfaces peering with NIPRNet or SIPRNet:
This rule is NA.

If ICMP messages are not blocked inbound on external facing interfaces to an ISP and other non-DoD network, this is a finding.

JunOS Example:
[edit firewall]
family inet {
filter ingress-filter {
term block-frags {
from {
is-fragment;
protocol icmp;
}
then {
syslog;
discard;
}
}
term icmp-in-good {
from {
destination-address {
199.36.92.0/30;
}
then {
accept;
}
term icmp-PMTU-D {
from {
destination-address {
199.36.92.0/24;
}
protocol icmp;
icmp-type [ unreachable ];
icmp-code [ fragmentation-needed ];
}
then {
accept;
}
}
}
term icmp-in-bad {
from {
protocol icmp;
}
then {
syslog;
discard;
}
}
}
}
Fix Text (F-44084r4_fix)
Configure ACLs on external interfaces of network devices connected to untrusted networks (e.g., ISP and other non-DoD networks) to block inbound ICMP messages. Exceptions to this rule are listed below.

Exceptions:
ICMP messages Echo Reply (type 0)
ICMP Destination Unreachable – fragmentation needed (type 3 - code 4)
Source Quench (type 4)
Parameter Problem (type 12)