From Cisco IOS XE Release 3 RTR Security Technical Implementation Guide
Part of SRG-NET-000019-RTR-000003
Associated with: CCI-001414
If multicast traffic is forwarded beyond the intended boundary, it is possible that it can be intercepted by unauthorized or unintended personnel. Limiting where, within the network, a given multicast group's data is permitted to flow is an important first step in improving multicast security.
Review the Cisco IOS XE router configuration to determine if IPv4 or IPv6 multicast routing is enabled. Verify all interfaces enabled for PIM are documented in the network's multicast topology diagram. Review the router configuration to determine if multicast routing is enabled and which interfaces are enabled for PIM. Following is an example of multicast globally enabled and PIM enabled on an interface. ip multicast-routing distributed ! … … … interface GigabitEthernet4 ip address 1.1.35.3 255.255.255.0 ip pim sparse-mode If an interface is not required to support multicast routing and it is enabled, this is a finding.
Configure the Cisco IOS XE router so that PIM is disabled on interfaces that are not required to support it. The configuration would look similar to the example below: ISR4000 (config) #Interface GigabitEthernet 0/0/1 ISR4000 (config) #no ip PIM
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer