STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Intrusion Detection and Prevention Systems Security Requirements Guide

V-206893

CAT II (Medium)

The IPS must block outbound Internet Control Message Protocol (ICMP) Destination Unreachable, Redirect, and Address Mask reply messages.

Rule ID

SV-206893r1137740_rule

STIG

Intrusion Detection and Prevention Systems Security Requirements Guide

Version

V3R4

CCIs

CCI-001312

Discussion

ICMP messages are used to provide feedback about problems in the network. These messages are sent back to the sender to support diagnostics; however, some messages can also provide host information and network topology that may be exploited by an attacker. An IPS must be configured to "silently drop" the packet and not send an ICMP control message back to the source. In some cases, it may be necessary to direct the traffic to a null interface. Three ICMP messages are commonly used by attackers for network mapping: Destination Unreachable, Redirect, and Address Mask Reply. These responses must be blocked on external interfaces; however, blocking the Destination Unreachable response will prevent Path Maximum Transmission Unit Discovery (PMTUD), which relies on the response "ICMP Destination Unreachable--Fragmentation Needed but DF Bit Set". PMTUD is a useful function and should only be "broken" after careful consideration. An acceptable alternative to blocking all Destination Unreachable responses is to filter Destination Unreachable messages generated by the IPS to allow ICMP Destination Unreachable--Fragmentation Needed but DF Bit Set (Type 3, Code 4) and apply this filter to the external interfaces.

Check Content

If the device being reviewed is an IDS, this is not applicable.

Verify the IPS blocks outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. 

If the IPS does not block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages, this is a finding.

Fix Text

Configure the IPS to block outbound ICMP Destination Unreachable, Redirect, and Address Mask reply messages. 

An acceptable alternative to blocking all Destination Unreachable responses is to filter Destination Unreachable messages generated by the firewall implementation to allow ICMP Destination Unreachable--
Fragmentation Needed but DF Bit Set (Type 3, Code 4) and apply this filter to the external interfaces.