Skip to content

Dated: 03-12-2024

Ch03. case Study Security Hardening - Network Layer 3 Switch

  • Infrastructure Layer 3 Switch STIG
  • DISA, Release 22

      • 28 April, 2017
  • General Information:

    • Rule Title: The administrator must ensure that all L2TPv3 sessions are authenticated prior to transporting traffic.
    • Vuln ID: V-30744
    • STIG ID: NET-TUNL-034
    • Severity: CAT II
  • Discussion:
    • L2TPv3 sessions can be used to transport layer-2 protocols across an IP backbone. These protocols were intended for link-local scope only and are therefore less defended and not as well-known.
    • As stated in DoD IPv6 IA Guidance for MO3 (S4-C7-1), the L2TP tunnels can also carry IP packets that are very difficult to filter because of the additional encapsulation.
    • Hence, it is imperative that L2TP sessions are authenticated prior to transporting traffic.
  • Check Content:
    • Review the router or multi-layer switch configuration and determine if L2TPv3 has been configured to provide transport across an IP network. If it has been configured, verify that the L2TPv3 session requires authentication.
    • See details explanation in Check Content (Configurations)
  • Fix Text:
    • Configure L2TPv3 to use authentication for any peering sessions.