NET-TUNL-017 - ISATAP tunnels must terminate at interior router

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

ISATAP tunnels must terminate at an interior router.

ISATAP is an automatic tunnel mechanism that does not provide authentication such as IPSec. As a result of this limitation, ISATAP is thought of as a tool that is used inside the enclave among trusted hosts, which would limit it to internal attacks. ISATAP is a service versus a product, and is readily available to most users. If a user knows the ISATAP router IP address, they can essentially get onto the IPv6 intranet. To control the vulnerability of this tunnel mechanism, it is critical to control the use of protocol 41 and use IPv4 filters to control what IPv4 nodes can send protocol 41 packets to an ISATAP router interface. Although the ISATAP tunneling mechanism is similar to other automatic tunneling mechanisms, such as IPv6 6to4 tunneling, ISATAP is designed for transporting IPv6 packets between sites within an enclave, not between enclaves.

NOTE: This check requires manual verification that the ISATAP tunnel is terminate at the Intra Enclave Security Zone.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Terminate ISATAP tunnels at the infrastructure router to prohibit tunneled traffic from exiting the enclave perimeter prior to inspection by the IDS, IPS, or firewall.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

References: CAT|II, Rule-ID|SV-16068r2_rule, STIG-ID|NET-TUNL-017, Vuln-ID|V-15288

Plugin: Cisco

Control ID: 40bc9ccd1a6d75b543d1bd17400f48c184bf5b2af79bb5f3aa8ee6a267afb1fc