NET-TUNL-034 - L2TPv3 sessions are not authenticated - authentication check

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The administrator must ensure the that all L2TPv3 sessions are authenticated prior to transporting traffic.

L2TPv3 sessions can be used to transport layer-2 protocols across an IP backbone. These protocols were intended for link-local scope only and are therefore less defended and not as well-known. As stated in DoD IPv6 IA Guidance for MO3 (S4-C7-1), the L2TP tunnels can also carry IP packets that are very difficult to filter because of the additional encapsulation. Hence, it is imperative that L2TP sessions are authenticated prior to transporting traffic.

Review the router or multi-layer switch configuration and determine if L2TPv3 has been configured to provide transport across an IP network. If it has been configured, verify that the L2TPv3 session requires authentication.

Solution

Configure L2TPv3 to use authentication for any peering sessions.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, CAT|II, CSCv6|3.1, Rule-ID|SV-40556r1_rule, STIG-ID|NET-TUNL-034, Vuln-ID|V-30744

Plugin: Cisco

Control ID: cbc0bb7c65d9c922693d5650e13da61ed20c6909ef6c33577ce4f4dff95bfbd0