STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Network Infrastructure Policy Security Technical Implementation Guide

V-251392

CAT III (Low)

Protocol Independent Multicast (PIM) register messages received from a downstream multicast Designated Routers (DR) must be filtered for any reserved or any other undesirable multicast groups.

Rule ID

SV-251392r806131_rule

STIG

Network Infrastructure Policy Security Technical Implementation Guide

Version

V10R7

CCIs

CCI-001414

Discussion

Customer networks that do not maintain a multicast domain and only require the IP multicast service will be required to stand up a PIM-SM router that will be incorporated into the JIE shared tree structure by establishing a peering session with an RP router. Both of these implementations expose several risks that must be mitigated to provide a secured IP core network. All RP routers that are peering with customer PIM-SM routers must implement a PIM import policy to block multicast registration requests for reserved or any other undesirable multicast groups.

Check Content

Verify that the RP router is configured to filter PIM register messages using the ip pim accept-register global command as shown in the example below. This command can reference either an ACL or a route-map to identify and prevent unauthorized sources or groups from registering with the RP.

ip pim accept-register list PIM_REGISTER_FILTER
!
ip access-list extended PIM_REGISTER_FILTER
deny  ip any 224.0.0.0 0.0.0.255
deny  ip 0.0.0.0 0.255.255.255 any
deny  ip 1.0.0.0 0.255.255.255 any
deny  ip 2.0.0.0 0.255.255.255 any
deny  ip 5.0.0.0 0.255.255.255 any
deny  ip 7.0.0.0 0.255.255.255 any
deny  ip 10.0.0.0 0.255.255.255 any
deny  ip 23.0.0.0 0.255.255.255 any
deny  ip 27.0.0.0 0.255.255.255 any
...
...
...
deny  ip 172.16.0.0 0.15.255.255 any
deny  ip 192.168.0.0 0.0.255.255 any
deny  ip 197.0.0.0 0.255.255.255 any
deny  ip 223.0.0.0 0.255.255.255 any
deny  ip 224.0.0.0 224.255.255.255 any
permit ip any any

If the RP router peering with customer PIM-SM routers is not configured with a PIM import policy to block registration messages for reserved multicast groups, this is a finding.

Fix Text

Configure RP routers to filter PIM register messages received from a tenant multicast DR for any reserved or any other undesirable multicast groups.