DISA STIGS Viewer

The RUCKUS ICX MSDP router must be configured to limit the amount of source-active messages it accepts on a per peer basis.

Overview

Finding ID Version Rule ID IA Controls Severity
V-273577 RCKS-RTR-000090 SV-273577r1110886_rule   Low
Description
To reduce any risk of a denial-of-service (DoS) attack from a rogue or misconfigured MSDP router, the router must be configured to limit the number of source-active messages it accepts from each peer.
STIG Date
RUCKUS ICX Router Security Technical Implementation Guide 2025-06-03

Details

Check Text (C-77668r1109751_chk)
Check for SA filter on MSDP peer:

ICX# show msdp peer x.x.x.x | include Input

Input SA Filter:Applicable
Input (S,G) route-map:MSDP_SA_filter
Input RP route-map:None

If any configured MSDP peer is not configured to limit source-active messages using an inbound filter, this is a finding.
Fix Text (F-77573r1109752_fix)
Create access-list to filter source-active multicast advertisements for any undesirable multicast groups and sources:

ip access-list extended in_MSDP_SA_filter
sequence 10 deny ip any host 224.0.1.3
sequence 20 deny ip any host 224.0.1.24
sequence 30 deny ip any host 224.0.1.22
sequence 40 deny ip any host 224.0.1.2
sequence 50 deny ip any host 224.0.1.35
sequence 60 deny ip any host 224.0.1.60
sequence 70 deny ip any host 224.0.1.39
sequence 80 deny ip any host 224.0.1.40
sequence 90 deny ip any 232.0.0.0 0.255.255.255
sequence 100 deny ip any 239.0.0.0 0.255.255.255
sequence 110 deny ip 10.0.0.0 0.255.255.255 any
sequence 120 deny ip 127.0.0.0 0.255.255.255 any
sequence 130 deny ip 172.16.0.0 0.15.255.255 any
sequence 140 deny ip 192.168.0.0 0.0.255.255 any
sequence 150 permit ip any any

route-map MSDP_SA_filter permit 10
match ip address in_MSDP_SA_filter

router msdp
msdp-peer x.x.x.x
sa-filter in x.x.x.x route-map MSDP_SA_filter
!