Rule ID
SV-254029r844120_rule
Version
V2R1
CCIs
CCI-001958
MSDP peering with customer network routers presents additional risks to the core, whether from a rogue or misconfigured MSDP-enabled router. MSDP password authentication is used to validate each segment sent on the TCP connection between MSDP peers, protecting the MSDP session against the threat of spoofed packets being injected into the TCP connection stream.
Review the router configuration to determine if received MSDP packets are authenticated.
[edit protocols]
msdp {
active-source-limit {
maximum <1..1000000>;
threshold <1..1000000>;
log-warning <percent to log warning>;
}
<additional configuration>
peer <address> {
authentication-key "hashed PSK"; ## SECRET-DATA
}
}
If the router does not require MSDP authentication, this is a finding.Ensure all MSDP packets received by an MSDP router are authenticated. set protocols msdp active-source-limit maximum <1..1000000> set protocols msdp active-source-limit threshold <1..1000000> set protocols msdp active-source-limit log-warning <percent to log warning> <additional configuration> set protocols msdp peer <address> authentication-key <PSK>