STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to RUCKUS ICX Router Security Technical Implementation Guide

V-273574

CAT III (Low)

The RUCKUS ICX BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.

Rule ID

SV-273574r1110883_rule

STIG

RUCKUS ICX Router Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001368

Discussion

Verifying the path a route has traversed will ensure the IP core is not used as a transit network for unauthorized or possibly even internet traffic. All autonomous system boundary routers (ASBRs) must ensure updates received from eBGP peers list their AS number as the first AS in the AS_PATH attribute.

Check Content

Review the router configuration to verify the router is configured to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute.

router bgp
local-as 1000
neighbor 10.1.1.1 remote-as 1100
neighbor 10.1.1.1 enforce-first-as enable

If the router is not configured to enforce the first AS in the AS_PATH attribute for eBGP peers, this is a finding.

Fix Text

Configure all ASBRs to deny updates received from eBGP peers that do not list their AS number as the first AS in the AS_PATH attribute.

ICX(config-bgp-router)# neighbor x.x.x.x remote-as yyyy
ICX(config-bgp-router)# neighbor x.x.x.x enforce-first-as enable