JUNI-RT-000890 - The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers - loopback interface

Information

MSDP peering with customer network routers presents additional risks to the DISN Core, whether from a rogue or misconfigured MSDP-enabled router. To guard against an attack from malicious MSDP traffic, the receive path or interface filter for all MSDP-enabled RP routers must be configured to only accept MSDP packets from known MSDP peers.

Solution

Configure the receive path filter to only accept MSDP packets from known MSDP peers as shown in the following example:

[edit firewall family inet filter PROTECT_RE]
set term MSDP_PEERS from protocol tcp port msdp
set term MSDP_PEERS from source-address 0.0.0.0/0
set term MSDP_PEERS from source-address 1.1.1.1/32 except
set term MSDP_PEERS from source-address 5.5.5.5/32 except
set term MSDP_PEERS then discard
set term ALLOW_OTHER then accept

Apply the filter to the loopback interface.

[edit interfaces lo0 unit 0 family inet]
set filter input PROTECT_RE

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_Router_Y22M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(11), CAT|II, CCI|CCI-002403, Rule-ID|SV-217093r604135_rule, STIG-ID|JUNI-RT-000890, STIG-Legacy|SV-101179, STIG-Legacy|V-90969, Vuln-ID|V-217093

Plugin: Juniper

Control ID: fc7a86cea2392220f9fb634fd4e5c224fff58ba50465ac10f5670ed73e20e21c