CISC-RT-000190 - The Cisco switch must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Switches automatically send ICMP messages under a wide variety of conditions. Redirect ICMP messages are commonly used by attackers for network mapping and diagnosis.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Disable ICMP redirects on all external interfaces as shown in the example below:

SW1(config)#int g0/1
SW1(config-if)#no ip redirects

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS_XE_Switch_Y22M07_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002385, Rule-ID|SV-221002r622190_rule, STIG-ID|CISC-RT-000190, STIG-Legacy|SV-110825, STIG-Legacy|V-101721, Vuln-ID|V-221002

Plugin: Cisco

Control ID: 1be829a6aff19726983252ef0c33eb89acfa0d36325d9bd4522a1d13f97cab95