NET0400 - Interior routing protocols are not authenticated - 'EIGRP (Interface Check - authentication key-chain)'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The network element must authenticate all IGP peers.

A rogue router could send a fictitious routing update to convince a site's premise router to send traffic to an incorrect or even a rogue destination. This diverted traffic could be analyzed to learn confidential information of the site's network, or merely used to disrupt the network's ability to effectively communicate with other networks.

Solution

Configure authentication for all IGP peers.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-8(1), CAT|II, Rule-ID|SV-15290r2_rule, STIG-ID|NET0400, Vuln-ID|V-3034

Plugin: Cisco

Control ID: 08c3dbd4eb08b88b9e998f429888e1c08c62d9a3dd4e26dd3edeb6b67c970ebf