2.5 Ensure ICMP is restricted for untrusted interfaces

Information

Allows ICMP traffic for specific hosts or subnets and denies ICMP traffic for all other sources

Rationale:

ICMP is an important troubleshooting tool that can also be used to perform ICMP attacks on untrusted interfaces. For these interfaces, the ICMP traffic should be allowed only for specific hosts or subnets that are trusted by the Enterprise and should be denied for all other sources.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Step 1: Acquire the untrusted interface name <untrusted_interface_name>, the trusted subnet and corresponding subnet mask

Step 2: Run the following command to allow ICMP from the trusted subnet to the untrusted interface. Repeat the command if there are more than one trusted subnets identified.

hostname(config)# icmp permit <subnet> <mask> <untrusted_interface_name>

Step 3: Run the following command to deny ICMP from all other sources to the untrusted interface.

hostname(config)# icmp deny any<untrusted_interface_name>

Default Value:

ICMP is enabled by default.

See Also

https://workbench.cisecurity.org/files/3294

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-2, CSCv7|11.1

Plugin: Cisco

Control ID: bfe569ebd74e6904ef913680b9f96379d5ec6848334cd2caf8c43fe669d6a084