OS10-RTR-000390 - The Dell OS10 Router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.

Information

Fragmented ICMP packets can be generated by hackers for denial-of-service (DoS) attacks such as Ping O' Death and Teardrop. It is imperative that all fragmented ICMP packets are dropped.

Solution

Ensure all routers have their receive path filter configured to drop all fragmented ICMP packets.

Step 1: Configure a control-plane ACL that drops fragmented ICMP packets.

OS10(config)# ip access-list FILTER_FRAGMENTED_ICMP
OS10(config-ipv4-acl)# seq 10 deny icmp any any log fragment
OS10(config-ipv4-acl)# seq 20 permit ip any any

Step 2: Apply the ACL above to the control-plane.

OS10(config)# control-plane
OS10(config-control-plane)# ip access-group FILTER_FRAGMENTED_ICMP data in

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Dell_OS10_Switch_Y24M12_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7a., CAT|II, CCI|CCI-001097, Rule-ID|SV-269873r1052004_rule, STIG-ID|OS10-RTR-000390, Vuln-ID|V-269873

Plugin: Dell_OS10

Control ID: 1390baa66fb9ca1872a9ba9c9ad920b44302e949887b1affb45711c85e1f8056