HP FlexFabric Switch NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +79 −79
Comparison against the immediately-prior release (V1R3). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 79
- V-217426 Low The HP FlexFabric Switch must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.
- V-217427 Medium The HP FlexFabric Switch must automatically audit account creation.
- V-217428 Medium The HP FlexFabric Switch must automatically audit account modification.
- V-217429 Medium The HP FlexFabric Switch must automatically audit account disabling actions.
- V-217430 Medium The HP FlexFabric Switch must automatically audit account removal actions.
- V-217431 High The HP FlexFabric Switch must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
- V-217432 Medium The HP FlexFabric Switch must enforce approved authorizations for controlling the flow of management information within the HP FlexFabric Switch based on information flow control policies.
- V-217433 Medium The HP FlexFabric Switch must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- V-217434 Medium The HP FlexFabric Switch must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- V-217435 Medium The HP FlexFabric Switch must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- V-217436 Low The HP FlexFabric Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
- V-217438 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.
- V-217439 Low The HP FlexFabric Switch must initiate session auditing upon startup.
- V-217440 Low The HP FlexFabric Switch must produce audit log records containing sufficient information to establish what type of event occurred.
- V-217441 Low The HP FlexFabric Switch must produce audit records containing information to establish when (date and time) the events occurred.
- V-217442 Low The HP FlexFabric Switch must produce audit records containing information to establish where the events occurred.
- V-217443 Low The HP FlexFabric Switch must produce audit log records containing information to establish the source of events.
- V-217444 Low The HP FlexFabric Switch must produce audit records that contain information to establish the outcome of the event.
- V-217445 Low The HP FlexFabric Switch must generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-217446 Low The HP FlexFabric Switch must generate audit records containing the full-text recording of privileged commands.
- V-217447 Medium The HP FlexFabric Switch must use internal system clocks to generate time stamps for audit records.
- V-217448 Medium The HP FlexFabric Switch must protect audit information from unauthorized modification.
- V-217449 Medium The HP FlexFabric Switch must protect audit information from unauthorized deletion.
- V-217451 Medium The HP FlexFabric Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-217452 Medium The HP FlexFabric Switch must enforce a minimum 15-character password length.
- V-217453 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one uppercase character be used.
- V-217454 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one lowercase character be used.
- V-217455 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one numeric character be used.
- V-217456 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one special character be used.
- V-217457 Medium The HP FlexFabric Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
- V-217458 Medium Network devices must provide a logoff capability for administrator-initiated communication sessions.
- V-217459 Medium The HP FlexFabric Switch must automatically audit account enabling actions.
- V-217460 Medium If the HP FlexFabric Switch uses discretionary access control, the HP FlexFabric Switch must enforce organization-defined discretionary access control policies over defined subjects and objects.
- V-217461 Medium If the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects.
- V-217463 Medium The HP FlexFabric Switch must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- V-217464 Medium The HP FlexFabric Switch must generate an immediate real-time alert of all audit failure events requiring real-time alerts.
- V-217465 Medium The HP FlexFabric Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- V-217466 Medium The HP FlexFabric Switch must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-217467 Medium The HP FlexFabric Switch must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
- V-217468 Medium Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
- V-217469 Medium Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- V-217470 Medium The HP FlexFabric Switch must protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the HP FlexFabric Switch management network by employing organization-defined security safeguards.
- V-217471 Medium If the HP FlexFabric Switch uses mandatory access control, the HP FlexFabric Switch must enforce organization-defined mandatory access control policies over all subjects and objects.
- V-217472 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
- V-217473 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
- V-217474 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful logon attempts occur.
- V-217475 Medium The HP FlexFabric Switch must generate audit records for privileged activities or other system-level access.
- V-217476 Medium The HP FlexFabric Switch must generate audit records showing starting and ending time for administrator access to the system.
- V-217477 Medium The HP FlexFabric Switch must generate audit records when concurrent logons from different workstations occur.
- V-217478 Medium The HP FlexFabric Switch must off-load audit records onto a different system or media than the system being audited.
- V-217479 Medium The HP FlexFabric Switch must generate audit log events for a locally developed list of auditable events.
- V-217480 Medium The HP FlexFabric Switch must enforce access restrictions associated with changes to the system components.
- V-217481 Low The HP FlexFabric Switch must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
- V-217482 Medium The HP FlexFabric Switch must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- V-217483 High The HP FlexFabric Switch must have a local account that will only be used as an account of last resort with full access to the network device.
- V-217484 Medium The HP FlexFabric switch must be configured to utilize an authentication server for the purpose of authenticating privilege users, managing accounts, and to centrally verify authentication settings and Personal Identity Verification (PIV) credentials.
- V-217485 Medium The HP FlexFabric switch must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.
- V-217486 Medium The HP FlexFabric switch must be configured to send SNMP traps and notifications to the SNMP manager for the purpose of sending alarms and notifying appropriate personnel as required by specific events.
- V-230161 Low The HP FlexFabric Switch must automatically disable accounts after a 35-day period of account inactivity.
- V-230162 Medium Upon successful logon, the HP FlexFabric Switch must notify the administrator of the date and time of the last logon.
- V-230163 Medium Upon successful logon, the HP FlexFabric Switch must notify the administrator of the number of unsuccessful logon attempts since the last successful logon.
- V-230164 Low The HP FlexFabric Switch must provide audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch.
- V-230165 Medium The HP FlexFabric Switch must protect audit information from any type of unauthorized read access.
- V-230166 Medium The HP FlexFabric Switch must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- V-230167 Medium The HP FlexFabric Switch must prohibit password reuse for a minimum of five generations.
- V-230168 Medium The HP FlexFabric Switch must enforce 24 hours/1 day as the minimum password lifetime.
- V-230169 Medium The HP FlexFabric Switch must enforce a 60-day maximum password lifetime restriction.
- V-230170 Medium The HP FlexFabric Switch, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-230171 Medium The HP FlexFabric Switch must map the authenticated identity to the user account for PKI-based authentication.
- V-230172 Medium The HP FlexFabric Switch must generate an immediate alert for account enabling actions.
- V-230173 Medium The HP FlexFabric Switch must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-230174 Medium The HP FlexFabric Switch must notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the date and time of the last logon (access).
- V-230175 Medium The HP FlexFabric Switch must generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- V-230176 Medium The HP FlexFabric Switch must compare internal information system clocks at least every 24 hours with an authoritative time server.
- V-230177 Medium The HP FlexFabric Switch must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
- V-230178 Medium The HP FlexFabric Switch must allow the use of a temporary password for system logons with an immediate change to a permanent password.
- V-230179 Medium The HP FlexFabric Switch must generate audit records for all account creations, modifications, disabling, and termination events.
- V-230180 Medium The HP FlexFabric Switch must notify the administrator of the number of successful logon attempts occurring during an organization-defined time period.
- V-230181 Medium The HP FlexFabric Switch must employ automated mechanisms to assist in the tracking of security incidents.
Removed rules 79
- V-65963 Low The HP FlexFabric Switch must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.
- V-66141 Low The HP FlexFabric Switch must automatically disable accounts after a 35-day period of account inactivity.
- V-66143 Medium The HP FlexFabric Switch must automatically audit account creation.
- V-66145 Medium The HP FlexFabric Switch must automatically audit account modification.
- V-66147 Medium The HP FlexFabric Switch must automatically audit account disabling actions.
- V-66149 Medium The HP FlexFabric Switch must automatically audit account removal actions.
- V-66151 High The HP FlexFabric Switch must enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the device.
- V-66153 Medium The HP FlexFabric Switch must enforce approved authorizations for controlling the flow of management information within the HP FlexFabric Switch based on information flow control policies.
- V-66155 Medium The HP FlexFabric Switch must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- V-66157 Medium The HP FlexFabric Switch must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- V-66159 Medium The HP FlexFabric Switch must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- V-66161 Medium Upon successful logon, the HP FlexFabric Switch must notify the administrator of the date and time of the last logon.
- V-66163 Medium Upon successful logon, the HP FlexFabric Switch must notify the administrator of the number of unsuccessful logon attempts since the last successful logon.
- V-66165 Low The HP FlexFabric Switch must protect against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
- V-66167 Low The HP FlexFabric Switch must provide audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch.
- V-66171 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.
- V-66173 Low The HP FlexFabric Switch must initiate session auditing upon startup.
- V-66175 Low The HP FlexFabric Switch must produce audit log records containing sufficient information to establish what type of event occurred.
- V-66177 Low The HP FlexFabric Switch must produce audit records containing information to establish when (date and time) the events occurred.
- V-66179 Low The HP FlexFabric Switch must produce audit records containing information to establish where the events occurred.
- V-66181 Low The HP FlexFabric Switch must produce audit log records containing information to establish the source of events.
- V-66183 Low The HP FlexFabric Switch must produce audit records that contain information to establish the outcome of the event.
- V-66185 Low The HP FlexFabric Switch must generate audit records containing information that establishes the identity of any individual or process associated with the event.
- V-66187 Low The HP FlexFabric Switch must generate audit records containing the full-text recording of privileged commands.
- V-66189 Medium The HP FlexFabric Switch must use internal system clocks to generate time stamps for audit records.
- V-66191 Medium The HP FlexFabric Switch must protect audit information from any type of unauthorized read access.
- V-66193 Medium The HP FlexFabric Switch must protect audit information from unauthorized modification.
- V-66195 Medium The HP FlexFabric Switch must protect audit information from unauthorized deletion.
- V-66199 Medium The HP FlexFabric Switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-66201 Medium The HP FlexFabric Switch must disable identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
- V-66203 Medium The HP FlexFabric Switch must enforce a minimum 15-character password length.
- V-66205 Medium The HP FlexFabric Switch must prohibit password reuse for a minimum of five generations.
- V-66207 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one upper-case character be used.
- V-66209 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one lower-case character be used.
- V-66211 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one numeric character be used.
- V-66213 Medium If multifactor authentication is not supported and passwords must be used, the HP FlexFabric Switch must enforce password complexity by requiring that at least one special character be used.
- V-66215 Medium The HP FlexFabric Switch must enforce 24 hours/1 day as the minimum password lifetime.
- V-66217 Medium The HP FlexFabric Switch must enforce a 60-day maximum password lifetime restriction.
- V-66219 Medium The HP FlexFabric Switch, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-66221 Medium The HP FlexFabric Switch must map the authenticated identity to the user account for PKI-based authentication.
- V-66223 Medium The HP FlexFabric Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
- V-66225 Medium Network devices must provide a logoff capability for administrator-initiated communication sessions.
- V-66227 Medium The HP FlexFabric Switch must automatically audit account enabling actions.
- V-66229 Medium The HP FlexFabric Switch must generate an immediate alert for account enabling actions.
- V-66231 Medium If the HP FlexFabric Switch uses discretionary access control, the HP FlexFabric Switch must enforce organization-defined discretionary access control policies over defined subjects and objects.
- V-66233 Medium If the HP FlexFabric Switch uses role-based access control, the HP FlexFabric Switch must enforce organization-defined role-based access control policies over defined subjects and objects.
- V-66235 Medium The HP FlexFabric Switch must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-66237 Medium The HP FlexFabric Switch must notify the administrator, upon successful logon (access), of the location of last logon (terminal or IP address) in addition to the date and time of the last logon (access).
- V-66241 Medium The HP FlexFabric Switch must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
- V-66243 Medium The HP FlexFabric Switch must generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- V-66245 Medium The HP FlexFabric Switch must generate an immediate real-time alert of all audit failure events requiring real-time alerts.
- V-66247 Medium The HP FlexFabric Switch must compare internal information system clocks at least every 24 hours with an authoritative time server.
- V-66249 Medium The HP FlexFabric Switch must synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
- V-66251 Medium The HP FlexFabric Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- V-66253 Medium The HP FlexFabric Switch must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-66255 Medium The HP FlexFabric Switch must record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.
- V-66257 Medium The HP FlexFabric Switch must allow the use of a temporary password for system logons with an immediate change to a permanent password.
- V-66259 Medium Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
- V-66261 Medium Applications used for nonlocal maintenance sessions must implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
- V-66263 Medium The HP FlexFabric Switch must protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the HP FlexFabric Switch management network by employing organization-defined security safeguards.
- V-66265 Medium If the HP FlexFabric Switch uses mandatory access control, the HP FlexFabric Switch must enforce organization-defined mandatory access control policies over all subjects and objects.
- V-66267 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to modify administrator privileges occur.
- V-66269 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful attempts to delete administrator privileges occur.
- V-66271 Medium The HP FlexFabric Switch must generate audit records when successful/unsuccessful logon attempts occur.
- V-66273 Medium The HP FlexFabric Switch must generate audit records for privileged activities or other system-level access.
- V-66275 Medium The HP FlexFabric Switch must generate audit records showing starting and ending time for administrator access to the system.
- V-66277 Medium The HP FlexFabric Switch must generate audit records when concurrent logons from different workstations occur.
- V-66279 Medium The HP FlexFabric Switch must generate audit records for all account creations, modifications, disabling, and termination events.
- V-66281 Medium The HP FlexFabric Switch must off-load audit records onto a different system or media than the system being audited.
- V-66283 Medium The HP FlexFabric Switch must notify the administrator of the number of successful logon attempts occurring during an organization-defined time period.
- V-66285 Medium The HP FlexFabric Switch must generate audit log events for a locally developed list of auditable events.
- V-66287 Medium The HP FlexFabric Switch must enforce access restrictions associated with changes to the system components.
- V-66289 Low The HP FlexFabric Switch must support organizational requirements to conduct backups of system level information contained in the information system when changes occur or weekly, whichever is sooner.
- V-66291 Medium The HP FlexFabric Switch must employ automated mechanisms to assist in the tracking of security incidents.
- V-66293 Medium The HP FlexFabric Switch must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- V-66295 High The HP FlexFabric Switch must have a local account that will only be used as an account of last resort with full access to the network device.
- V-66297 Medium The HP FlexFabric switch must be configured to utilize an authentication server for the purpose of authenticating privilege users, managing accounts, and to centrally verify authentication settings and Personal Identity Verification (PIV) credentials.
- V-66299 Medium The HP FlexFabric switch must be configured to send log data to a syslog server for the purpose of forwarding alerts to the administrators and the ISSO.
- V-66301 Medium The HP FlexFabric switch must be configured to send SNMP traps and notifications to the SNMP manager for the purpose of sending alarms and notifying appropriate personnel as required by specific events.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- HFFS-ND-000001
- Vuln IDs
-
- V-217426
- V-65963
- Rule IDs
-
- SV-217426r960735_rule
- SV-80453
Checks: C-18650r292953_chk
Review the HP FlexFabric Switch configuration to see if it limits the number of concurrent sessions to an organization-defined number for all administrator accounts and/or administrator account types: [HP] display local-user Device management user test: State: Active Service type: None Access limit: Enabled Max access number: 3 Current access number: 0 User group: system Bind attributes: Authorization attributes: Work directory: cfa0: User role list: network-admin If "Max access number:" line is not present, this is a finding.
Fix: F-18648r292954_fix
Configure the HP FlexFabric Switch to limit the number of concurrent sessions to an organization-defined number for all administrator accounts and administrator account types as shown in the following example: [HP] local-user admin [HP-luser-manage-admin] access-limit 3
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- HFFS-ND-000009
- Vuln IDs
-
- V-217427
- V-66143
- Rule IDs
-
- SV-217427r960777_rule
- SV-80633
Checks: C-18651r292956_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18649r292957_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled. Account creation on the SUT generates an automatic log entry in the system's log.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- HFFS-ND-000010
- Vuln IDs
-
- V-217428
- V-66145
- Rule IDs
-
- SV-217428r960780_rule
- SV-80635
Checks: C-18652r292959_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18650r292960_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled. Account modification on the SUT generates an automatic log entry in the system's log.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001404
- Version
- HFFS-ND-000011
- Vuln IDs
-
- V-217429
- V-66147
- Rule IDs
-
- SV-217429r960783_rule
- SV-80637
Checks: C-18653r292962_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18651r292963_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled. Account disabling actions on the SUT generates an automatic log entry in the system's log.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- HFFS-ND-000012
- Vuln IDs
-
- V-217430
- V-66149
- Rule IDs
-
- SV-217430r960786_rule
- SV-80639
Checks: C-18654r292965_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18652r292966_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled. Account removal actions on the SUT generates an automatic log entry in the system's log.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- HFFS-ND-000013
- Vuln IDs
-
- V-217431
- V-66151
- Rule IDs
-
- SV-217431r960792_rule
- SV-80641
Checks: C-18655r292968_chk
Determine if the HP FlexFabric Switch is configured to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the switch. [HP] display local-user Device management user admin: State: Active Service type: SSH/Telnet/Terminal User group: system Bind attributes: Authorization attributes: Work directory: flash: User role list: network-admin Password control configurations: If the HP FlexFabric Switch does not enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level, this is a finding.
Fix: F-18653r292969_fix
Configure the HP FlexFabric Switch to enforce the assigned privilege level for each administrator and authorizations for access to all commands relative to the privilege level in accordance with applicable policy for the switch. [HP] local-user admin [HP-luser-manage-admin] [HP-luser-manage-admin]authorization-attribute user-role network-admin
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- HFFS-ND-000014
- Vuln IDs
-
- V-217432
- V-66153
- Rule IDs
-
- SV-217432r960801_rule
- SV-80643
Checks: C-18656r292971_chk
Review the HP FlexFabric Switch configuration to determine if ACLs were configured for controlling the flow of management information within the HP FlexFabric Switch based on information flow control policies: [HP] display current-configuration acl number 3000 description ACL to block traffic with invalid address rule 0 permit icmp source 10.0.0.0 0.255.255.255 rule 1 deny ip source 172.16.0.0 0.15.255.255 rule 2 deny ip source 192.168.0.0 0.0.255.255 rule 3 deny ip source 169.254.0.0 0.0.255.255 rule 6 deny ip source 127.0.0.0 0.255.255.255 If ACLs are not configured for controlling the flow of management information within the HP FlexFabric Switch based on information flow control policies , this is a finding.
Fix: F-18654r292972_fix
Configure the HP FlexFabric Switch for controlling the flow of management information within the HP FlexFabric Switch based on information flow control policies. Below is an example for an ACL configuration: [HP] acl number 3000 [HP-acl-adv-3000] description ACL to block traffic with invalid address [HP-acl-adv-3000] rule 0 permit icmp source 10.0.0.0 0.255.255.255 [HP-acl-adv-3000] rule 1 deny ip source 172.16.0.0 0.15.255.255 [HP-acl-adv-3000] rule 2 deny ip source 192.168.0.0 0.0.255.255 [HP-acl-adv-3000] rule 3 deny ip source 169.254.0.0 0.0.255.255 [HP-acl-adv-3000] rule 6 deny ip source 127.0.0.0 0.255.255.255 [HP] interface Vlan-interface 192 [HP-Vlan-interface192] packet-filter 3000 inbound
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- HFFS-ND-000015
- Vuln IDs
-
- V-217433
- V-66155
- Rule IDs
-
- SV-217433r960840_rule
- SV-80645
Checks: C-18657r292974_chk
Verify that the HP FlexFabric Switch is configured to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period. [HP] display password-control Global password control configurations: Maximum login attempts: 3 Action for exceeding login attempts: Lock user for 15 minutes If the limit of three consecutive invalid logon attempts by a user during a 15-minute time period is not enforced, this is a finding.
Fix: F-18655r292975_fix
Configure the HP FlexFabric Switch to enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period: [HP]password-control login-attempt 3 exceed lock-time 15
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- HFFS-ND-000016
- Vuln IDs
-
- V-217434
- V-66157
- Rule IDs
-
- SV-217434r960843_rule
- SV-80647
Checks: C-18658r292977_chk
Determine if the HP FlexFabric Switch is configured to present a DoD-approved banner that is formatted in accordance with DTM-08-060. Establish a console or vty connection to HP FlexFabric Switch and attempt to logon to it. Once entering the username the banner should appear: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If such a banner is not presented, this is a finding.
Fix: F-18656r292978_fix
Configure the HP FlexFabric Switch to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the switch. [HP] header legal % Desirable text goes here % Note: In this example, the percentage sign (%) is the starting and ending character of the text argument. Entering the percentage sign after the text quits the header command. Because it is the starting and ending character, the percentage sign is not included in the banner.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- HFFS-ND-000017
- Vuln IDs
-
- V-217435
- V-66159
- Rule IDs
-
- SV-217435r960846_rule
- SV-80649
Checks: C-18659r292980_chk
Determine if the HP FlexFabric Switch is configured to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access. After entering the username and password for HP FlexFabric Switch the banner and acknowledgement of the notice should be displayed: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." Press Y or ENTER to continue, N to exit. If HP FlexFabric Switch does not retain the banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to logon for further access, this is a finding.
Fix: F-18657r292981_fix
Configure the HP FlexFabric Switch to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the switch. [HP] header legal % Desirable text goes here % Note: In this example, the percentage sign (%) is the starting and ending character of the text argument. Entering the percentage sign after the text quits the header command. Because it is the starting and ending character, the percentage sign is not included in the banner.
- RMF Control
- AU-10
- Severity
- L
- CCI
- CCI-000166
- Version
- HFFS-ND-000021
- Vuln IDs
-
- V-217436
- V-66165
- Rule IDs
-
- SV-217436r960864_rule
- SV-80655
Checks: C-18660r292983_chk
Check the HP FlexFabric log file to determine if logging is enabled: [HP] display info-center Information Center: Enabled If the HP FlexFabric Switch does not have logging enabled, this is a finding.
Fix: F-18658r292984_fix
Enable informational center on the HP FlexFabric Switch: [HP] info-center enable
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000024
- Vuln IDs
-
- V-217438
- V-66171
- Rule IDs
-
- SV-217438r960885_rule
- SV-80661
Checks: C-18662r292989_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18660r292990_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-14
- Severity
- L
- CCI
- CCI-001464
- Version
- HFFS-ND-000025
- Vuln IDs
-
- V-217439
- V-66173
- Rule IDs
-
- SV-217439r960888_rule
- SV-80663
Checks: C-18663r292992_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18661r292993_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- HFFS-ND-000026
- Vuln IDs
-
- V-217440
- V-66175
- Rule IDs
-
- SV-217440r960891_rule
- SV-80665
Checks: C-18664r292995_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18662r292996_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- HFFS-ND-000027
- Vuln IDs
-
- V-217441
- V-66177
- Rule IDs
-
- SV-217441r960894_rule
- SV-80667
Checks: C-18665r292998_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18663r292999_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000132
- Version
- HFFS-ND-000028
- Vuln IDs
-
- V-217442
- V-66179
- Rule IDs
-
- SV-217442r960897_rule
- SV-80669
Checks: C-18666r293001_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18664r293002_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- HFFS-ND-000029
- Vuln IDs
-
- V-217443
- V-66181
- Rule IDs
-
- SV-217443r960900_rule
- SV-80671
Checks: C-18667r293004_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18665r293005_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- HFFS-ND-000030
- Vuln IDs
-
- V-217444
- V-66183
- Rule IDs
-
- SV-217444r960903_rule
- SV-80673
Checks: C-18668r293007_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18666r293008_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001487
- Version
- HFFS-ND-000031
- Vuln IDs
-
- V-217445
- V-66185
- Rule IDs
-
- SV-217445r960906_rule
- SV-80675
Checks: C-18669r293010_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18667r293011_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000135
- Version
- HFFS-ND-000032
- Vuln IDs
-
- V-217446
- V-66187
- Rule IDs
-
- SV-217446r960909_rule
- SV-80677
Checks: C-18670r293013_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18668r293014_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- HFFS-ND-000035
- Vuln IDs
-
- V-217447
- V-66189
- Rule IDs
-
- SV-217447r960927_rule
- SV-80679
Checks: C-18671r293016_chk
Determine if the HP FlexFabric Switch is configured to use internal system clocks to generate time stamps for audit records. [HP] display clock 06:13:14 MDT Wed 08/05/2015 Time Zone : test minus 05:00:00 Summer Time : MDT 02:00:00 March second Sunday 02:00:00 November first Sunday 01:00:00 If the switch is not configured to use internal system clocks to generate time stamps for audit records, this is a finding.
Fix: F-18669r293017_fix
Configure the HP FlexFabric Switch to use internal system clocks to generate time stamps for audit records. <HP> clock datetime 06:13:00 08/05/2015
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- HFFS-ND-000037
- Vuln IDs
-
- V-217448
- V-66193
- Rule IDs
-
- SV-217448r960933_rule
- SV-80683
Checks: C-18672r293019_chk
Determine if the HP FlexFabric Switch protects audit information from any type of unauthorized modification with such methods as ensuring log files receive the proper file system permissions utilizing file system protections, restricting access to log data and backing up log data to ensure log data is retained, and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights the user enjoys. [HP] display local-user Device management user security-user: State: Active Service type: SSH/Terminal User group: system Bind attributes: Authorization attributes: Work directory: flash: User role list: security-audit If the HP FlexFabric Switch does not protect audit information from unauthorized modification, this is a finding.
Fix: F-18670r293020_fix
Configure the HP FlexFabric Switch to protect audit information from unauthorized modification: [HP] local-user security-user [HP-luser-manage-security-user] authorization-attribute user-role security-audit [HP-luser-manage-security-user] password Password:xxxxxxxxxx confirm: xxxxxxxxxx [HP-luser-manage-security-user] service-type ssh terminal
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- HFFS-ND-000038
- Vuln IDs
-
- V-217449
- V-66195
- Rule IDs
-
- SV-217449r960936_rule
- SV-80685
Checks: C-18673r293022_chk
Determine if the HP FlexFabric Switch protects audit information from any type of unauthorized deletion with such methods as ensuring log files receive the proper file system permissions utilizing file system protections, restricting access to log data and backing up log data to ensure log data is retained, and leveraging user permissions and roles to identify the user accessing the data and the corresponding rights the user enjoys. [HP] display local-user Device management user security-user: State: Active Service type: SSH/Terminal User group: system Bind attributes: Authorization attributes: Work directory: flash: User role list: security-audit If the HP FlexFabric Switch does not protect audit information from unauthorized deletion, this is a finding.
Fix: F-18671r293023_fix
Configure the HP FlexFabric Switch to protect audit information from unauthorized deletion: [HP] local-user security-user [HP-luser-manage-security-user] authorization-attribute user-role security-audit [HP-luser-manage-security-user] password Password:xxxxxxxxxx confirm: xxxxxxxxxx [HP-luser-manage-security-user] service-type ssh terminal
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- HFFS-ND-000046
- Vuln IDs
-
- V-217451
- V-66199
- Rule IDs
-
- SV-217451r1043177_rule
- SV-80689
Checks: C-18675r293028_chk
Check if unsecured protocols and services are disabled on the HP FlexFabric Switch: [HP] display ftp-server FTP is not configured. [HP] display current-configuration | include telnet Note: When Telnet server is enabled, the output for this command is telnet server enable. If all unnecessary and non-secure functions, ports, protocols, and services are not disabled, this is a finding.
Fix: F-18673r293029_fix
Disable unsecure protocols and services on the HP FlexFabric Switch: [HP] undo ftp server enable [HP] undo telnet server enable Note: By default, both FTP and Telnet services are disabled.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- HFFS-ND-000053
- Vuln IDs
-
- V-217452
- V-66203
- Rule IDs
-
- SV-217452r1113774_rule
- SV-80693
Checks: C-18676r1113773_chk
Determine if the HP FlexFabric Switch or its associated authentication server enforces a minimum 15-character password length. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) If the HP FlexFabric Switch does not have password control enabled and does not enforce a minimum 15-character password length, this is a finding.
Fix: F-18674r1111907_fix
Configure the HP FlexFabric Switch to enforce a minimum 15-character password length. [HP] password-control enable [HP] password-control length 15
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- HFFS-ND-000055
- Vuln IDs
-
- V-217453
- V-66207
- Rule IDs
-
- SV-217453r1113778_rule
- SV-80697
Checks: C-18677r1113776_chk
Check to see that the HP FlexFabric Switch enforces password complexity by requiring that at least one uppercase character be used. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) Password composition: Enabled (4 types, 1 characters per type) If the HP FlexFabric Switch does not have password control enabled and does not require that at least one uppercase character be used in each password, this is a finding.
Fix: F-18675r1113777_fix
Configure the HP FlexFabric Switch to enforce password complexity by requiring that at least one uppercase character be used: [HP] password-control enable [HP] password-control composition enable [HP] password-control composition type-number 4 type-length 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- HFFS-ND-000056
- Vuln IDs
-
- V-217454
- V-66209
- Rule IDs
-
- SV-217454r1113781_rule
- SV-80699
Checks: C-18678r1113779_chk
Check to see that the HP FlexFabric Switch enforces password complexity by requiring that at least one lowercase character be used. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) Password composition: Enabled (4 types, 1 characters per type) If the HP FlexFabric Switch does not have password control enabled and does not require that at least one lowercase character be used in each password, this is a finding.
Fix: F-18676r1113780_fix
Configure the HP FlexFabric Switch to enforce password complexity by requiring that at least one lowercase character be used: [HP] password-control enable [HP] password-control composition enable [HP] password-control composition type-number 4 type-length 2
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- HFFS-ND-000057
- Vuln IDs
-
- V-217455
- V-66211
- Rule IDs
-
- SV-217455r1113782_rule
- SV-80701
Checks: C-18679r1111915_chk
Check to see that the HP FlexFabric Switch enforces password complexity by requiring that at least one numeric character be used. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) Password composition: Enabled (4 types, 1 characters per type) If the HP FlexFabric Switch does not have password control enabled and does not require that at least one numeric character be used in each password, this is a finding.
Fix: F-18677r293041_fix
Configure the HP FlexFabric Switch to enforce password complexity by requiring that at least one numeric character be used: [HP] password-control enable [HP] password-control composition enable [HP] password-control composition type-number 4 type-length 3
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- HFFS-ND-000058
- Vuln IDs
-
- V-217456
- V-66213
- Rule IDs
-
- SV-217456r1113783_rule
- SV-80703
Checks: C-18680r1111917_chk
Check to see that the HP FlexFabric Switch enforces password complexity by requiring that at least one special character be used. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) Password composition: Enabled (4 types, 1 characters per type) If the HP FlexFabric Switch does not have password control enabled and does not require that at least one special character be used in each password, this is a finding.
Fix: F-18678r293044_fix
Configure the HP FlexFabric Switch to enforce password complexity by requiring that at least one special character be used: [HP] password-control enable [HP] password-control composition enable [HP] password-control composition type-number 4 type-length 4
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- HFFS-ND-000069
- Vuln IDs
-
- V-217457
- V-66223
- Rule IDs
-
- SV-217457r961068_rule
- SV-80713
Checks: C-18681r293046_chk
Determine if the HP FlexFabric Switch terminates the connection associated with a device management session at the end of the session or after 10 minutes of inactivity. If the HP FlexFabric Switch does not terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity, this is a finding.
Fix: F-18679r293047_fix
Configure the HP FlexFabric Switch to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity: [HP] user-interface vty 0 63 [HP-line-vty0-63] idle-timeout 10
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- HFFS-ND-000082
- Vuln IDs
-
- V-217458
- V-66225
- Rule IDs
-
- SV-217458r961224_rule
- SV-80715
Checks: C-18682r293049_chk
Review the HP FlexFabric Switch configuration to determine if it provides a logoff capability for administrator-initiated communication sessions. [HP] display users Idx Line Idle Time Pid Type + 177 VTY 0 00:00:00 May 29 15:45:11 1011 SSH Following are more details. VTY 0 : User name: admin@system Location: 16.117.204.17 + : Current operation user. F : Current operation user works in async mode. If the HP FlexFabric Switch does not provide a logoff capability for these sessions, this is a finding.
Fix: F-18680r293050_fix
Configure the HP FlexFabric Switch to provide a logoff capability for administrator-initiated communication sessions. [HP] Ctrl + z <HP> quit
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- HFFS-ND-000085
- Vuln IDs
-
- V-217459
- V-66227
- Rule IDs
-
- SV-217459r961290_rule
- SV-80717
Checks: C-18683r293052_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18681r293053_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled. Account enabling actions on the SUT generates an automatic log entry in the system's log.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- HFFS-ND-000088
- Vuln IDs
-
- V-217460
- V-66231
- Rule IDs
-
- SV-217460r961317_rule
- SV-80721
Checks: C-18684r293055_chk
Check the HP FlexFabric Switch to determine if organization-defined discretionary access control policies are enforced over defined subjects and objects. [HP] display local-user local-user test authorization-attribute user-role network-operator If organization-defined discretionary access control policies are not enforced over defined subjects and objects, this is a finding.
Fix: F-18682r293056_fix
Configure the HP FlexFabric Switch to enforce organization-defined discretionary access control policies over defined subjects and objects. Below is an example of a test user being assigned pre-defined user-role network-operator: [HP] local-user test [HP-luser-test] authorization-attribute user-role network-operator
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002169
- Version
- HFFS-ND-000089
- Vuln IDs
-
- V-217461
- V-66233
- Rule IDs
-
- SV-217461r987662_rule
- SV-80723
Checks: C-18685r293058_chk
Check the HP FlexFabric Switch to determine if organization-defined discretionary access control policies are enforced over defined subjects and objects. [HP] display local-user local-user test authorization-attribute user-role network-operator If organization-defined discretionary access control policies are not enforced over defined subjects and objects, this is a finding.
Fix: F-18683r293059_fix
Configure the HP FlexFabric Switch to enforce organization-defined discretionary access control policies over defined subjects and objects. Below is an example of a test user being assigned pre-defined user-role network-operator: [HP] local-user test [HP-luser-test] authorization-attribute user-role network-operator
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- HFFS-ND-000095
- Vuln IDs
-
- V-217463
- V-66241
- Rule IDs
-
- SV-217463r961392_rule
- SV-80731
Checks: C-18687r293064_chk
Enter the command display logfile summary to verify audit record storage has been allocated in accordance with the organization-defined audit record storage requirements. If the switch has not been configured to allocate audit record storage in accordance with the organization-defined audit record storage requirements, this is a finding.
Fix: F-18685r293065_fix
Configure the HP FlexFabric Switch to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. [HP] info-center security-logfile size-quota 10 Note: The security logfile size in set in MB
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- HFFS-ND-000097
- Vuln IDs
-
- V-217464
- V-66245
- Rule IDs
-
- SV-217464r961401_rule
- SV-80735
Checks: C-18688r293067_chk
Determine if the HP FlexFabric Switch provides the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time. [HP] display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled 192.100.50.27, port number: 514, host facility: local7 Log buffer: Enabled Max buffer size 1024, current buffer size 512 Current messages 66, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Log host: Date Other output destination: Date If the HP FlexFabric Switch does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time, this is a finding.
Fix: F-18686r293068_fix
Configure the HP FlexFabric Switch to generate an immediate real-time alert of all audit failure events requiring real-time alerts. [HP] info-center enable
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001893
- Version
- HFFS-ND-000100
- Vuln IDs
-
- V-217465
- V-66251
- Rule IDs
-
- SV-217465r987682_rule
- SV-80741
Checks: C-18689r293070_chk
Determine if the HP FlexFabric Switch is configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. [HP] display ntp status Clock status: synchronized Clock stratum: 4 System peer: 16.110.135.123 Local mode: client Reference clock ID: 16.110.135.123 Leap indicator: 00 Clock jitter: 0.004227 s Stability: 0.000 pps Clock precision: 2^-19 Root delay: 96.75598 ms Root dispersion: 149.76501 ms Reference time: d916fabd.a5c6d326 Mon, Jun 1 2015 9:37:33.647 If the HP FlexFabric Switch is not configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources, this is a finding.
Fix: F-18687r293071_fix
Configure the HP FlexFabric Switch to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources: [HP] ntp service enable [HP] ntp service unicast-server 16.110.135.123 [HP] ntp service unicast-server 16.110.135.124
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- HFFS-ND-000101
- Vuln IDs
-
- V-217466
- V-66253
- Rule IDs
-
- SV-217466r961443_rule
- SV-80743
Checks: C-18690r293073_chk
Determine if time zone is configured on the HP FlexFabric Switch: [HP] display clock 15:00:32 EST Thu 07/09/2015 Time Zone : EST minus 05:00:00 Check if info-center is configured to provide timestamp: [HP] display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled 192.100.50.27, port number: 514, host facility: local7 Log buffer: Enabled Max buffer size 1024, current buffer size 512 Current messages 66, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Log host: Date Other output destination: Date Check logfile content to determine if the time stamp is present: <HP> cd logfile/ <HP> more logfile.log %@9377%Jan 20 23:31:03:567 2011 HP5930_SUT SHELL/6/SHELL_CMD: -Line=vty0-IPAddr=16.123.122.155-User=admin; Command is dis info-center %@9378%Jan 20 23:31:09:342 2011 HP5930_SUT SHELL/6/SHELL_CMD: -Line=vty0-IPAddr=16.123.122.155-User=admin; Command is qui If the HP FlexFabric Switch is not configured to enable timestamp in the log and if time zone is not configurable, this is a finding.
Fix: F-18688r293074_fix
Configure time zone on the HP FlexFabric Switch: [HP] clock timezone EST minus 5:00:00 Configure timestamp on the logs on the HP FlexFabric Switch: [HP] info-center timestamp date Note: By default, the device uses internal system clocks to generate time stamps for audit records in the date format - MMM DD hh:mm:ss:xxx YYYY.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- HFFS-ND-000102
- Vuln IDs
-
- V-217467
- V-66255
- Rule IDs
-
- SV-217467r961446_rule
- SV-80745
Checks: C-18691r293076_chk
Check if info-center is configured to provide timestamp: [HP] display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled 192.100.50.27, port number: 514, host facility: local7 Log buffer: Enabled Max buffer size 1024, current buffer size 512 Current messages 66, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Log host: Date Other output destination: Date Check logfile content to determine if the time stamp is present: <HP> cd logfile/ <HP> more logfile.log %@9377%Jan 20 23:31:03:567 2011 HP5930_SUT SHELL/6/SHELL_CMD: -Line=vty0-IPAddr=16.123.122.155-User=admin; Command is dis info-center %@9378%Jan 20 23:31:09:342 2011 HP5930_SUT SHELL/6/SHELL_CMD: -Line=vty0-IPAddr=16.123.122.155-User=admin; Command is qui If the HP FlexFabric Switch is not configured to enable timestamp, this is a finding.
Fix: F-18689r293077_fix
Configure timestamp on the logs on the HP FlexFabric Switch: [HP] info-center timestamp date By default, the device uses internal system clocks to generate time stamps for audit records in the date format - MMM DD hh:mm:ss:xxx YYYY which provides required granularity.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- HFFS-ND-000116
- Vuln IDs
-
- V-217468
- V-66259
- Rule IDs
-
- SV-217468r961554_rule
- SV-80749
Checks: C-18692r293079_chk
Determine if the HP FlexFabric Switch implements cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. [HP]display ssh server status SSH server: Enable SSH version : 2.0 SSH authentication-timeout : 60 second(s) SSH server key generating interval : 0 hour(s) SSH authentication retries : 3 time(s) SFTP server: Enable SFTP Server Idle-Timeout: 10 minute(s) Netconf server: Disable [HP] display current | i sftp sftp server enable If SSH and SFTP protocols are not configured for nonlocal device maintenance , this is a finding.
Fix: F-18690r293080_fix
Configure the HP FlexFabric Switch to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. Generate local RSA key pairs on the SSH server: [HP] public-key local create rsa Enable the SSH server function: [HP] ssh server enable Enable the SFTP server function: [HP] sftp server enable Configure the user interfaces for SSH clients: [HP] user-interface vty 0 63 [HP-ui-vty0-63] authentication-mode scheme Configure a local device management user, assign password and enable service-type SSH: [HP] local-user admin [HP-luser-admin] password simple xxxxxxxx [HP-luser-admin] service-type ssh
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- HFFS-ND-000117
- Vuln IDs
-
- V-217469
- V-66261
- Rule IDs
-
- SV-217469r961557_rule
- SV-80751
Checks: C-18693r293082_chk
Determine if the HP FlexFabric Switch implements cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. [HP] display ssh server status SSH server: Enable SSH version : 2.0 SSH authentication-timeout : 60 second(s) SSH server key generating interval : 0 hour(s) SSH authentication retries : 3 time(s) SFTP server: Enable SFTP Server Idle-Timeout: 10 minute(s) Netconf server: Disable [HP] display current | i sftp sftp server enable If SSH and SFTP protocols are not configured for nonlocal device maintenance , this is a finding.
Fix: F-18691r293083_fix
Configure the HP FlexFabric Switch to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. Generate local RSA key pairs on the SSH server: [HP] public-key local create rsa Enable the SSH server function: [HP] ssh server enable Enable the SFTP server function: [HP] sftp server enable Configure the user interfaces for SSH clients: [HP] user-interface vty 0 63 [HP-ui-vty0-63] authentication-mode scheme Configure a local device management user, assign password and enable service-type SSH: [HP] local-user admin [HP-luser-admin] password simple xxxxxx [HP-luser-admin] service-type ssh
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- HFFS-ND-000118
- Vuln IDs
-
- V-217470
- V-66263
- Rule IDs
-
- SV-217470r961620_rule
- SV-80753
Checks: C-18694r293085_chk
Check if the HP FlexFabric Switch is configured to protect against known DoS attacks by implementing ACLs and by enabling tcp syn-flood protection: [HP] display current-configuration tcp syn-cookie enable tcp timer syn-timeout 10 [HP] display acl all If the HP FlexFabric Switch is not configured with ACLs and tcp syn-flood features, this is a finding. Check pre-defined qos policies that are by default applied to the control plane: [HP] display qos policy control-plane pre-defined Check user-defined qos policies: [HP] display qos policy user-defined
Fix: F-18692r293086_fix
Configure the HP FlexFabric Switch to protect against or limit the effects of all known types of DoS attacks by employing organization-defined security safeguards. Enable the anti-attack function: [HP] tcp syn-cookie enable Configure maximum wait time to establish a TCP connection: [HP] tcp timer syn-timeout 10 Configure QoS policy and apply it to the control plane: [HP] traffic classifier Net-Protocols operator or [HP-classifier Net-Protocols] if match control-plane protocol icmp [HP-classifier Net-Protocols] quit [HP] traffic behavior Net-Protocols [HP-behavior-Net-Protocols] car cir 320 [HP-behavior-Net-Protocols] quit [HP] qos policy Net-protocols [HP-qospolicy-Net-Protocols] classifier Net-Protocols behavior Net-protocols [HP-qospolicy-Net-Protocols] quit [HP] control-plane slot 1 [HP-cp-slot1] qos apply policy Net-Protocols inbound Note: In addition, ACLs can be deployed to address specific types of attacks based on IP, MAC, protocols and ports. Note: By default, the HP FlexFabric Switches are configured with pre-defined control plane QoS policies, which take effect on the control planes by default.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-003014
- Version
- HFFS-ND-000119
- Vuln IDs
-
- V-217471
- V-66265
- Rule IDs
-
- SV-217471r987719_rule
- SV-80755
Checks: C-18695r293088_chk
Check the HP FlexFabric Switch to determine if organization-defined mandatory access control policies are enforced over all subjects and objects. [HP] display local-user Device management user user1: State: Active Service type: SSH User group: system Bind attributes: Authorization attributes: Work directory: flash: User role list: role1 [HP] display role Role: role1 Description: VLAN policy: deny Permitted VLANs: 10 to 20 Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule Perm Type Scope Entity ------------------------------------------------------------------- 1 permit R-- feature - 2 permit command system-view ; vlan * R:Read W:Write X:Execute If organization-defined mandatory access control policies are not enforced over all subjects and objects, this is a finding.
Fix: F-18693r293089_fix
Configure the HP FlexFabric Switch to enforce organization-defined mandatory access control policies over all subjects and objects. Below is an example how to configure a user-role and assign it to a user: Create the user role role1: [HP] role name role1 Configure rule 1 to permit the user role to access read commands of all features: [HP-role-role1] rule 1 permit read feature Configure rule 2 to permit the user role to create VLANs and access commands in VLAN view: [HP-role-role1] rule 2 permit command system-view ; vlan * Change the VLAN policy to permit the user role to configure only VLANs 10 to 20: [HP-role-role1] vlan policy deny [HP-role-role1-vlanpolicy] permit vlan 10 to 20 [HP-role-role1-vlanpolicy] quit [HP-role-role1] quit Create a management local user named user1 and enter its view: [HP] local-user user1 class manage Set a password for the user: [HP-luser-manage-user1] password simple xxxxxx Set the service type to SSH: [HP-luser-manage-user1] service-type ssh Assign role1 to the user: [HP-luser-manage-user1] authorization-attribute user-role role1 To make sure that the user has only the permissions of role1, remove the user from the default user role network-operator: [HP-luser-manage-user1] undo authorization-attribute user-role network-operator [HP-luser-manage-user1] quit
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000120
- Vuln IDs
-
- V-217472
- V-66267
- Rule IDs
-
- SV-217472r961800_rule
- SV-80757
Checks: C-18696r293091_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18694r293092_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000121
- Vuln IDs
-
- V-217473
- V-66269
- Rule IDs
-
- SV-217473r961812_rule
- SV-80759
Checks: C-18697r293094_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18695r293095_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000122
- Vuln IDs
-
- V-217474
- V-66271
- Rule IDs
-
- SV-217474r961824_rule
- SV-80761
Checks: C-18698r293097_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18696r293098_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000123
- Vuln IDs
-
- V-217475
- V-66273
- Rule IDs
-
- SV-217475r961827_rule
- SV-80763
Checks: C-18699r293100_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18697r293101_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000124
- Vuln IDs
-
- V-217476
- V-66275
- Rule IDs
-
- SV-217476r961830_rule
- SV-80765
Checks: C-18700r293103_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18698r293104_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000125
- Vuln IDs
-
- V-217477
- V-66277
- Rule IDs
-
- SV-217477r961833_rule
- SV-80767
Checks: C-18701r293106_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18699r293107_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- HFFS-ND-000127
- Vuln IDs
-
- V-217478
- V-66281
- Rule IDs
-
- SV-217478r961860_rule
- SV-80771
Checks: C-18702r293109_chk
Determine if the HP FlexFabric Switch is configured to use an external syslog server: [HP] display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled Source address interface: M-GigabitEthernet0/0/0 192.168.100.12, port number: 514, host facility: local7 Log buffer: Enabled Max buffer size 1024, current buffer size 512 Current messages 356, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Log host: Date Other output destination: Date If the HP FlexFabric Switch is not configure to use an external syslog server, this is a finding.
Fix: F-18700r293110_fix
Configure the HP FlexFabric Switch to forward its log to an external syslog server: [HP] info-center loghost 192.168.100.12
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000131
- Vuln IDs
-
- V-217479
- V-66285
- Rule IDs
-
- SV-217479r961863_rule
- SV-80775
Checks: C-18703r293112_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-18701r293113_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- HFFS-ND-000132
- Vuln IDs
-
- V-217480
- V-66287
- Rule IDs
-
- SV-217480r961863_rule
- SV-80777
Checks: C-18704r293115_chk
Check the HP FlexFabric Switch to determine if only authorized administrators have permissions for changes, deletions and updates on HP FlexFabric Switch. [HP] display local-user Device management user user1: State: Active Service type: SSH User group: system Bind attributes: Authorization attributes: Work directory: flash: User role list: role1 [HP] display role Role: role1 Description: VLAN policy: deny Permitted VLANs: 10 to 20 Interface policy: permit (default) VPN instance policy: permit (default) ------------------------------------------------------------------- Rule Perm Type Scope Entity ------------------------------------------------------------------- 1 permit R-- feature - 2 permit command system-view ; vlan * R:Read W:Write X:Execute If unauthorized users are allowed to change the hardware or software, this is a finding.
Fix: F-18702r293116_fix
Configure the HP FlexFabric Switch to enforce access restrictions associated with changes to the system components. Below is an example how to configure a user-role and assign it to a user: Create the user role role1: [HP] role name role1 Configure rule 1 to permit the user role to access read commands of all features: [HP-role-role1] rule 1 permit read feature Configure rule 2 to permit the user role to create VLANs and access commands in VLAN view: [HP-role-role1] rule 2 permit command system-view ; vlan * Change the VLAN policy to permit the user role to configure only VLANs 10 to 20: [HP-role-role1] vlan policy deny [HP-role-role1-vlanpolicy] permit vlan 10 to 20 [HP-role-role1-vlanpolicy] quit [HP-role-role1] quit Create a management local user named user1 and enter its view: [HP] local-user user1 class manage Set a password for the user: [HP-luser-manage-user1] password simple xxxxxx Set the service type to SSH: [HP-luser-manage-user1] service-type ssh Assign role1 to the user: [HP-luser-manage-user1] authorization-attribute user-role role1 To make sure that the user has only the permissions of role1, remove the user from the default user role network-operator: [HP-luser-manage-user1] undo authorization-attribute user-role network-operator [HP-luser-manage-user1] quit
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- HFFS-ND-000137
- Vuln IDs
-
- V-217481
- V-66289
- Rule IDs
-
- SV-217481r961863_rule
- SV-80779
Checks: C-18705r293118_chk
Review the HP FlexFabric Switch configuration to determine if it is configured to back up its configuration file on a weekly basis. If a schedule does not exist, this is a finding. [HP] display scheduler job Job name: system_backup tftp 192.168.1.13 put hp5900.cfg
Fix: F-18703r293119_fix
Configure the HP FlexFabric Switch to back up its configuration to a TFTP/FTP server: [HP] scheduler job config_backup [HP-job-config_backup] command 1 tftp 15.252.76.13 put 5900.cfg [HP-job-config_backup] quit [HP] scheduler schedule 5900-backup [HP-schedule-5900-backup] user-role network-admin [HP-schedule-5900-backup] job test [HP-schedule-5900-backup] time repeating at 14:14 week-day Thu
- RMF Control
- SC-17
- Severity
- M
- CCI
- CCI-001159
- Version
- HFFS-ND-000139
- Vuln IDs
-
- V-217482
- V-66293
- Rule IDs
-
- SV-217482r961863_rule
- SV-80783
Checks: C-18706r293121_chk
Determine if the HP FlexFabric Switch obtains public key certificates from an appropriate certificate policy through an approved service provider. [HP] display pki certificate domain HP local Certificate: Data: Version: 3 (0x2) Serial Number: 3e:7b:9b:bb:00:00:00:00:00:28 Signature Algorithm: sha1WithRSAEncryption Issuer: DC=local, DC=rae-domain, CN=rae-domain-WIN2008-RAE-CA Validity Not Before: Apr 23 18:19:27 2015 GMT Not After : Apr 22 18:19:27 2016 GMT Subject: unstructuredAddress=15.252.76.101, C=US, ST=MA, L=Littleton, O=HP, OU=STG, CN=12508 Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:e1:13:04:10:94:4a:a9:f7:6b:42:bb:64:13:4a: eb:10:48:60:61:a5:e7:d6:13:95:2d:69:b0:79:ae: df:be:e3:a2:5d:7d:be:3b:97:b9:2c:99:05:37:ea: bf:a9:95:49:e7:08:50:14:68:fc:1d:16:83:f9:ea: 66:cc:8a:8f:f9:9c:28:dc:66:7a:80:0c:53:5e:cc: a2:ee:4a:c3:4f:fb:6f:81:00:6c:4f:5d:72:e7:34: dc:4c:06:18:97:7d:da:45:b5:f1:2b:7e:71:c7:62: b3:59:fe:b9:6d:62:19:43:fd:73:93:fc:f5:ed:5e: 08:db:76:e7:66:26:cb:17:fd:69:a5:f5:b9:7e:e9: 9b:b4:91:30:d1:1a:1b:89:a3:ed:07:99:59:33:1e: de:4d:96:34:67:8c:b2:20:4d:5f:ec:19:49:33:d6: 14:57:03:a5:90:9c:a7:6a:31:3f:37:c3:29:5b:0a: db:24:2c:83:7d:e9:cb:c3:70:55:24:36:f5:c5:3f: f5:4e:f5:87:05:99:2d:4a:59:6f:d9:2e:2d:90:c7: fa:43:59:86:50:ee:e0:fc:2a:f9:bc:52:8c:39:d0: 05:3f:85:5c:5e:6b:5f:95:31:7b:e7:1e:b7:b5:af: 08:0d:34:8f:a0:07:4a:5a:32:eb:e7:39:5f:0e:9a: f5:01 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature X509v3 Subject Alternative Name: IP Address:15.252.76.101 X509v3 Subject Key Identifier: A7:B8:9F:0D:07:A9:31:91:ED:90:5C:F6:BF:6C:E0:7D:58:74:AB:08 X509v3 Authority Key Identifier: keyid:07:8D:A0:CF:CB:47:DB:E3:BE:E9:F6:18:21:F6:19:05:B8:34:26:3E X509v3 CRL Distribution Points: Full Name: URI:ldap:///CN=rae-domain-WIN2008-RAE-CA,CN=WIN2008-RAE,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rae-domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint Authority Information Access: CA Issuers - URI:ldap:///CN=rae-domain-WIN2008-RAE-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rae-domain,DC=local?cACertificate?base?objectClass=certificationAuthority 1.3.6.1.4.1.311.21.7: 0,.$+.....7.....E...\... ...0.............d... X509v3 Extended Key Usage: Code Signing 1.3.6.1.4.1.311.21.10: 0.0 ..+....... Signature Algorithm: sha1WithRSAEncryption 0b:1f:81:59:9d:4b:bf:b7:1c:a9:45:af:9e:2d:ab:0e:d4:a9: 20:3b:f7:25:36:59:72:da:c9:80:3d:66:66:ab:4f:bf:d7:b4: 55:23:96:24:2e:43:2c:20:79:41:d7:ec:23:18:55:49:d7:42: 36:d3:0f:1f:99:50:c7:84:94:0f:6f:b0:b7:e7:6a:e7:e7:e0: d5:b8:09:f7:3d:1e:9b:6e:9e:7a:d8:39:30:66:60:f5:05:fd: d9:68:0d:22:73:7e:91:69:8c:a3:99:2f:24:a3:9b:96:a7:37: 1d:a6:42:50:6d:8f:92:bf:90:8f:2b:26:a5:26:5c:59:f1:ef: 12:1f:d3:77:8e:59:58:3c:c1:1c:20:74:31:95:2b:f2:71:69: 39:fd:9b:06:4e:09:08:55:bc:ce:a7:3c:4e:1a:64:ae:0e:1b: a4:61:89:17:d1:72:31:20:2f:cc:24:97:d1:dd:1c:28:98:84: 00:bc:3c:0e:c4:14:dd:26:6f:20:7d:0d:82:f7:71:d2:00:ec: 1c:10:2e:35:a8:cc:75:0f:76:1b:7f:f2:d4:d9:df:a5:f8:c2: 75:38:4c:7c:7f:42:81:a1:36:23:a8:f3:c1:9e:f2:12:02:6f: db:3c:38:b5:0b:e4:0b:ea:f9:17:81:b2:6e:2c:34:7c:35:dc: 9f:e8:b9:0d If the HP FlexFabric Switch does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-18704r293122_fix
Configure the HP FlexFabric Switch to obtain its public key certificates in offline mode from an appropriate certificate policy through an approved service provider. Configure PKI entity: [HP] pki entity HP [HP-pki-entity-HP] common-name HP [HP-pki-entity-HP] country US [HP-pki-entity-HP] locality Littleton [HP-pki-entity-HP] organization-unit STG [HP-pki-entity-HP] organization HP [HP-pki-entity-HP] state MA [HP-pki-entity-HP] ip 15.252.76.101 [HP-pki-entity-HP] quit Configure PKI domain: [HP] pki domain HP [HP-pki-domain-HP] certificate request entity HP [HP-pki-domain-HP] public-key rsa general name hostkey [HP-pki-domain-HP] source ip 15.252.76.101 [HP-pki-domain-HP] undo crl check enable [HP-pki-domain-HP] quit Submit certificate request on the switch: [HP] pki request-certificate domain HP pkcs10 Transfer and import downloaded CA and user certificates to the switch: [HP] pki import domain jitc pem ca filename rae-root-ca.cer [HP] pki import domain jitc pem local filename HP.cer Note: Configuration required on the server side is not covered here.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- HFFS-ND-000140
- Vuln IDs
-
- V-217483
- V-66295
- Rule IDs
-
- SV-217483r961863_rule
- SV-80785
Checks: C-18707r293124_chk
Verify that the switch is configured with a local user that has full access by entering the following command: display local-user user-name <name of user account>. The user role list should contain the following: network-admin, network-operator If the switch does not have a local user with full access, this is a finding.
Fix: F-18705r293125_fix
Configure the switch with a local user account that has network-admin and network-operator role. [5900]local-user adminxxx [5900-luser-manage-adminxxx]authorization-attribute user-role network-admin (or level=15) [5900-luser-manage-adminxxx]authorization-attribute user-role network-operator [5900-luser-manage-adminxxx]service-type terminal [5900-luser-manage-adminxxx]password hash xxxxxxxxxxxxxx
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000141
- Vuln IDs
-
- V-217484
- V-66297
- Rule IDs
-
- SV-217484r961863_rule
- SV-80787
Checks: C-18708r293127_chk
Review the HP FlexFabric Switch configuration to determine if it is authenticating user logon via an authentication server. Local authentication must only be used as a last resort. Example configuration would look similar to the following: authentication login hwtacacs-scheme <name of scheme> local or authentication login radius-scheme <name of scheme> local If the HP FlexFabric Switch does not have an authentication server configured as the primary authentication method, this is a finding.
Fix: F-18706r293128_fix
Configure the HP FlexFabric Switch to use an authentication server: [HP] radius scheme <name of scheme> [HP-radius-jitc] primary authentication x.x.x.x key simple xxxxxx [HP-radius-jitc] user-name-format without-domain [HP] domain <domain name> [HP-isp-jitc] authentication login radius-scheme <name of scheme> local [HP-isp-jitc] authorization login radius-scheme <name of scheme> local [HP-isp-jitc] accounting login radius-scheme <name of scheme>c local [HP] domain default enable <domain name>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000142
- Vuln IDs
-
- V-217485
- V-66299
- Rule IDs
-
- SV-217485r961863_rule
- SV-80789
Checks: C-18709r293130_chk
Determine if the HP FlexFabric Switch generates alerts that can be forwarded to the administrators and ISSO when accounts are created. [HP] display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled Source address interface: GigabitEthernet0/1 192.168.16.102, port number: 514, host facility: local7 If the HP FlexFabric Switch is configured to use an authentication server which would perform this function, this is not a finding. If alerts are not generated when accounts are created and forwarded to the administrators and ISSO, this is a finding.
Fix: F-18707r293131_fix
Configure the HP FlexFabric Switch to send a notification message to the to the syslog server when accounts are created. [HP] info-center loghost 192.168.16.102
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000143
- Vuln IDs
-
- V-217486
- V-66301
- Rule IDs
-
- SV-217486r961863_rule
- SV-80791
Checks: C-18710r293133_chk
Determine if the HP FlexFabric Switch is configured to send system alert messages, alarms to a SNMP agent and/or automatically shuts down when a component failure is detected. [HP] display current-configuration snmp-agent snmp-agent local-engineid 800063A280D07E28ECBDB800000001 snmp-agent sys-info version v3 snmp-agent group v3 group1 privacy snmp-agent target-host trap address udp-domain 192.168.16.103 params securityname snmp1 v3 privacy snmp-agent usm-user v3 user1 group1 cipher authentication-mode sha $c$3$3C41avdWWmRMT64buQYb6FLdhVIUpAVHhIGyxIMhX6o3Qe3+GjY= privacy-mode aes128 $c$3$YpvVDasCitD9iCUvGc01ycckCq0rY+c6sThoqny+TjMTlQ== If the HP FlexFabric Switch is not configured to send system alert messages and alarms to a SNMP agent and/or does not automatically shuts down when a component failure is detected, this is a finding.
Fix: F-18708r293134_fix
Configure the HP FlexFabric Switch to send system alert messages and alarms to a SNMP agent: [HP]snmp-agent [HP]snmp-agent sys-info version v3 [HP]snmp-agent group v3 group1 privacy [HP]snmp-agent target-host trap address udp-domain 192.168.16.103 params securityname snmp1 v3 privacy [HP]snmp-agent usm-user v3 user1 group1 simple authentication-mode xxxxxxxxx privacy-mode aes128 xxxxxxxxx
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-000017
- Version
- HFFS-ND-000008
- Vuln IDs
-
- V-230161
- V-66141
- Rule IDs
-
- SV-230161r961863_rule
- SV-80631
Checks: C-32494r539345_chk
Review the HP FlexFabric Switch configuration to determine if it automatically disables accounts after 35 days. [HP] display password-control Global password control configurations: User account idle time: 35 days If accounts are not automatically disabled after 35 days of inactivity, this is a finding.
Fix: F-32472r539346_fix
Configure the HP FlexFabric Switch to automatically disable accounts after 35 days of inactivity: [HP]password-control login idle-time 35
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000052
- Version
- HFFS-ND-000018
- Vuln IDs
-
- V-230162
- V-66161
- Rule IDs
-
- SV-230162r961863_rule
- SV-80651
Checks: C-32495r539348_chk
Determine if the HP FlexFabric Switch is configured to notify the administrator of the date and time of their last logon. Once the logon credentials have been entered the system should display the previous logon information for the user: Log on as: admin admin@15.252.78.64's password: Your logon failures since the last successful logon: Wed May 27 10:06:04 2015 Wed May 27 10:06:09 2015 Last successfully logon time: Wed May 27 10:45:51 2015 If the administrator is not notified of the date and time of the last logon upon successful logon, this is a finding.
Fix: F-32473r539349_fix
Configure the HP FlexFabric Switch to notify the administrator of the date and time of the last successful logon: [HP] password-control enable
- RMF Control
- AC-9
- Severity
- M
- CCI
- CCI-000053
- Version
- HFFS-ND-000019
- Vuln IDs
-
- V-230163
- V-66163
- Rule IDs
-
- SV-230163r961863_rule
- SV-80653
Checks: C-32496r539351_chk
Determine if the HP FlexFabric Switch is configured to notify the administrator of the date and time of their last logon. Once the logon credentials have been entered the system should display the previous logon information for the user: Log on as: admin admin@15.252.78.64's password: Your logon failures since the last successful logon: Wed May 27 10:06:04 2015 Wed May 27 10:06:09 2015 Last successfully logon time: Wed May 27 10:45:51 2015 If the administrator is not notified of the date and time of the last logon upon successful logon, this is a finding.
Fix: F-32474r539352_fix
Configure the HP FlexFabric Switch to notify the administrator of the date and time of the last unsuccessful logon: [HP] password-control enable
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- HFFS-ND-000022
- Vuln IDs
-
- V-230164
- V-66167
- Rule IDs
-
- SV-230164r961863_rule
- SV-80657
Checks: C-32497r539354_chk
Determine if the HP FlexFabric Switch provides audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch. The list of events for which the device will provide an audit record generation capability is outlined in the vulnerability discussion. [HP] display security-logfile summary summary Display summary information of the security log file Security log file: Disabled Security log file size quota: 10 MB Security log file directory: cfa0:/seclog Alarm threshold: 80% Current usage: 0% Writing frequency: 24 hour 0 min 0 sec If the HP FlexFabric Switch does not provide audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch, this is a finding.
Fix: F-32475r539355_fix
Configure the HP FlexFabric Switch to provide audit record generation capability for DoD-defined auditable events within the HP FlexFabric Switch. [HP] info-center security-logfile enable [HP] info-center security-logfile frequency 30 (in seconds) [HP] info-center security-logfile size-quota 5 (in MB) [HP] info-center security-logfile alarm-threshold 90 (in %)
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- HFFS-ND-000036
- Vuln IDs
-
- V-230165
- V-66191
- Rule IDs
-
- SV-230165r961863_rule
- SV-80681
Checks: C-32498r539357_chk
Determine if the HP FlexFabric Switch protects audit information from any type of unauthorized read access with such methods as least privilege permissions, restrictions on the location and number of log file repositories and not allowing for the unfettered manipulation of or access to audit records via switch interface. [HP] display local-user Device management user security-user: State: Active Service type: SSH/Terminal User group: system Bind attributes: Authorization attributes: Work directory: flash: User role list: security-audit If the HP FlexFabric Switch does not protect audit information from any type of unauthorized read access, this is a finding.
Fix: F-32476r539358_fix
Configure the HP FlexFabric Switch to protect audit information from any type of unauthorized read access. Configure user that has security audit role and privileges: [HP] local-user security-user [HP-luser-manage-security-user] authorization-attribute user-role security-audit [HP-luser-manage-security-user] password Password:xxxxxxxxxx confirm: xxxxxxxxxx [HP-luser-manage-security-user] service-type ash terminal
- RMF Control
- IA-4
- Severity
- M
- CCI
- CCI-000795
- Version
- HFFS-ND-000052
- Vuln IDs
-
- V-230166
- V-66201
- Rule IDs
-
- SV-230166r961863_rule
- SV-80691
Checks: C-32499r539360_chk
Review the HP FlexFabric Switch configuration to determine if it automatically disables accounts after 35 days. [HP] display password-control Global password control configurations: User account idle time: 35 days If accounts are not automatically disabled after 35 days of inactivity, this is a finding.
Fix: F-32477r539361_fix
Configure the HP FlexFabric Switch to automatically disable accounts after 35 days of inactivity: [HP] password-control enable [HP] password-control login idle-time 35
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- HFFS-ND-000054
- Vuln IDs
-
- V-230167
- V-66205
- Rule IDs
-
- SV-230167r1113775_rule
- SV-80695
Checks: C-32500r1111909_chk
Determine if the HP FlexFabric Switch prohibits password reuse for a minimum of five generations. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) Password composition: Enabled (1 types, 1 characters per type) Password history: Enabled (max history records: 4) If the HP FlexFabric Switch does not have password control enabled and does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-32478r539364_fix
Configure the HP FlexFabric Switch server to prohibit password reuse for a minimum of five generations. [HP] password-control enable [HP] password-control history 5
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000198
- Version
- HFFS-ND-000062
- Vuln IDs
-
- V-230168
- V-66215
- Rule IDs
-
- SV-230168r1113784_rule
- SV-80705
Checks: C-32501r1111919_chk
Determine if the HP FlexFabric Switch enforces 24 hours/1 day as the minimum password lifetime. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) Password length: Enabled (15 characters) Password composition: Enabled (1 types, 1 characters per type) Password history: Enabled (max history records: 4) Early notice on password expiration: 7 days Maximum login attempts: 3 Action for exceeding login attempts: Lock user for 1 minutes Minimum interval between two updates: 24 hours If the HP FlexFabric Switch does not have password control enabled and does not enforce 24 hours/1 day as the minimum password lifetime, this is a finding.
Fix: F-32479r539367_fix
Configure the HP FlexFabric Switch to enforce 24 hours/1 day as the minimum password lifetime. [HP] password-control enable [HP] password-control update-interval 24
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- HFFS-ND-000063
- Vuln IDs
-
- V-230169
- V-66217
- Rule IDs
-
- SV-230169r1113785_rule
- SV-80707
Checks: C-32502r1111921_chk
Determine if the HP FlexFabric Switch enforces a 60-day maximum password lifetime. [HP] display password-control Global password control configurations: Password control: Enabled Password aging: Enabled (60 days) If the HP FlexFabric Switch does not have password control enabled and does not enforce a 60-day maximum password lifetime, this is a finding.
Fix: F-32480r539370_fix
Configure the HP FlexFabric Switch to enforce a 60-day maximum password lifetime. [HP]password-control enable [HP]password-control aging 60
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- HFFS-ND-000064
- Vuln IDs
-
- V-230170
- V-66219
- Rule IDs
-
- SV-230170r961863_rule
- SV-80709
Checks: C-32503r539372_chk
If PKI-based authentication is being used, determine if the HP FlexFabric Switch validates certificates by constructing a certification path to an accepted trust anchor. [HP] display pki certificate domain HP local Certificate: Data: Version: 3 (0x2) Serial Number: 3e:7b:9b:bb:00:00:00:00:00:28 Signature Algorithm: sha1WithRSAEncryption Issuer: DC=local, DC=rae-domain, CN=rae-domain-WIN2008-RAE-CA Validity Not Before: Apr 23 18:19:27 2015 GMT Not After : Apr 22 18:19:27 2016 GMT Subject: unstructuredAddress=15.252.76.101, C=US, ST=MA, L=Littleton, O=HP, OU=STG, CN=12508 Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:e1:13:04:10:94:4a:a9:f7:6b:42:bb:64:13:4a: eb:10:48:60:61:a5:e7:d6:13:95:2d:69:b0:79:ae: df:be:e3:a2:5d:7d:be:3b:97:b9:2c:99:05:37:ea: bf:a9:95:49:e7:08:50:14:68:fc:1d:16:83:f9:ea: 66:cc:8a:8f:f9:9c:28:dc:66:7a:80:0c:53:5e:cc: a2:ee:4a:c3:4f:fb:6f:81:00:6c:4f:5d:72:e7:34: dc:4c:06:18:97:7d:da:45:b5:f1:2b:7e:71:c7:62: b3:59:fe:b9:6d:62:19:43:fd:73:93:fc:f5:ed:5e: 08:db:76:e7:66:26:cb:17:fd:69:a5:f5:b9:7e:e9: 9b:b4:91:30:d1:1a:1b:89:a3:ed:07:99:59:33:1e: de:4d:96:34:67:8c:b2:20:4d:5f:ec:19:49:33:d6: 14:57:03:a5:90:9c:a7:6a:31:3f:37:c3:29:5b:0a: db:24:2c:83:7d:e9:cb:c3:70:55:24:36:f5:c5:3f: f5:4e:f5:87:05:99:2d:4a:59:6f:d9:2e:2d:90:c7: fa:43:59:86:50:ee:e0:fc:2a:f9:bc:52:8c:39:d0: 05:3f:85:5c:5e:6b:5f:95:31:7b:e7:1e:b7:b5:af: 08:0d:34:8f:a0:07:4a:5a:32:eb:e7:39:5f:0e:9a: f5:01 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature X509v3 Subject Alternative Name: IP Address:15.252.76.101 X509v3 Subject Key Identifier: A7:B8:9F:0D:07:A9:31:91:ED:90:5C:F6:BF:6C:E0:7D:58:74:AB:08 X509v3 Authority Key Identifier: keyid:07:8D:A0:CF:CB:47:DB:E3:BE:E9:F6:18:21:F6:19:05:B8:34:26:3E X509v3 CRL Distribution Points: Full Name: URI:ldap:///CN=rae-domain-WIN2008-RAE-CA,CN=WIN2008-RAE,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rae-domain,DC=local?certificateRevocationList?base?objectClass=cRLDistributionPoint Authority Information Access: CA Issuers - URI:ldap:///CN=rae-domain-WIN2008-RAE-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=rae-domain,DC=local?cACertificate?base?objectClass=certificationAuthority 1.3.6.1.4.1.311.21.7: 0,.$+.....7.....E...\... ...0.............d... X509v3 Extended Key Usage: Code Signing 1.3.6.1.4.1.311.21.10: 0.0 ..+....... Signature Algorithm: sha1WithRSAEncryption 0b:1f:81:59:9d:4b:bf:b7:1c:a9:45:af:9e:2d:ab:0e:d4:a9: 20:3b:f7:25:36:59:72:da:c9:80:3d:66:66:ab:4f:bf:d7:b4: 55:23:96:24:2e:43:2c:20:79:41:d7:ec:23:18:55:49:d7:42: 36:d3:0f:1f:99:50:c7:84:94:0f:6f:b0:b7:e7:6a:e7:e7:e0: d5:b8:09:f7:3d:1e:9b:6e:9e:7a:d8:39:30:66:60:f5:05:fd: d9:68:0d:22:73:7e:91:69:8c:a3:99:2f:24:a3:9b:96:a7:37: 1d:a6:42:50:6d:8f:92:bf:90:8f:2b:26:a5:26:5c:59:f1:ef: 12:1f:d3:77:8e:59:58:3c:c1:1c:20:74:31:95:2b:f2:71:69: 39:fd:9b:06:4e:09:08:55:bc:ce:a7:3c:4e:1a:64:ae:0e:1b: a4:61:89:17:d1:72:31:20:2f:cc:24:97:d1:dd:1c:28:98:84: 00:bc:3c:0e:c4:14:dd:26:6f:20:7d:0d:82:f7:71:d2:00:ec: 1c:10:2e:35:a8:cc:75:0f:76:1b:7f:f2:d4:d9:df:a5:f8:c2: 75:38:4c:7c:7f:42:81:a1:36:23:a8:f3:c1:9e:f2:12:02:6f: db:3c:38:b5:0b:e4:0b:ea:f9:17:81:b2:6e:2c:34:7c:35:dc: 9f:e8:b9:0d If PKI-based authentication is being used and HP FlexFabric Switch does not validate certificates by constructing a certification path to an accepted trust anchor, this is a finding.
Fix: F-32481r539373_fix
Configure the HP FlexFabric Switch to validate certificates by constructing a certification path to an accepted trust anchor when utilizing PKI-based authentication. Configure PKI entity: [HP] pki entity HP [HP-pki-entity-HP] common-name HP [HP-pki-entity-HP] country US [HP-pki-entity-HP] locality Littleton [HP-pki-entity-HP] organization-unit STG [HP-pki-entity-HP] organization HP [HP-pki-entity-HP] state MA [HP-pki-entity-HP] ip 15.252.76.101 [HP-pki-entity-HP] quit Configure PKI domain: [HP] pki domain HP [HP-pki-domain-HP] certificate request entity HP [HP-pki-domain-HP] public-key rsa general name hostkey [HP-pki-domain-HP] source ip 15.252.76.101 [HP-pki-domain-HP] undo crl check enable [HP-pki-domain-HP] quit Submit certificate request on the switch: [HP] pki request-certificate domain HP pkcs10 Transfer and import downloaded CA and user certificates to the switch: [HP] pki import domain jitc pem ca filename rae-root-ca.cer [HP] pki import domain jitc pem local filename HP.cer Configure a local user: [HP] local-user pkiuser [HP-luser-pkiuser] service-type ssh [HP-luser-pkiuser] authorization-attribute user-role network-admin [HP-luser-pkiuser] password Set this user as an SSH user and set authentication type to password-public key and assign pki domain: [HP] ssh user pkiuser service-type all authentication-type password-publickey assign pki-domain hp Note: Configuration required on the server side is not covered here.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- HFFS-ND-000065
- Vuln IDs
-
- V-230171
- V-66221
- Rule IDs
-
- SV-230171r961863_rule
- SV-80711
Checks: C-32504r539375_chk
Determine if the HP FlexFabric Switch maps the authenticated identity to the user account for PKI-based authentication. [HP] display ssh user-information Total ssh users: 3 Username Authentication-type User-public-key-name Service-type pkiuser password-publickey hp all If the HP FlexFabric Switch does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-32482r539376_fix
Configure the HP FlexFabric Switch to map the authenticated identity to the user account for PKI-based authentication. Configure PKI entity: [HP] pki entity HP [HP-pki-entity-HP] common-name HP [HP-pki-entity-HP] country US [HP-pki-entity-HP] locality Littleton [HP-pki-entity-HP] organization-unit STG [HP-pki-entity-HP] organization HP [HP-pki-entity-HP] state MA [HP-pki-entity-HP] ip 15.252.76.101 [HP-pki-entity-HP] quit Configure PKI domain: [HP] pki domain HP [HP-pki-domain-HP] certificate request entity HP [HP-pki-domain-HP] public-key rsa general name hostkey [HP-pki-domain-HP] source ip 15.252.76.101 [HP-pki-domain-HP] undo crl check enable [HP-pki-domain-HP] quit Submit certificate request on the switch: [HP] pki request-certificate domain HP pkcs10 Transfer and import downloaded CA and user certificates to the switch: [HP] pki import domain jitc pem ca filename rae-root-ca.cer [HP] pki import domain jitc pem local filename HP.cer Configure a local user: [HP] local-user pkiuser [HP-luser-pkiuser] service-type ssh [HP-luser-pkiuser] authorization-attribute user-role network-admin [HP-luser-pkiuser] password Set this user as an SSH user and set authentication type to password-public key and assign pki domain: [HP] ssh user pkiuser service-type all authentication-type password-publickey assign pki-domain hp Note: Configuration required on the server side is not covered here.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- HFFS-ND-000086
- Vuln IDs
-
- V-230172
- V-66229
- Rule IDs
-
- SV-230172r961863_rule
- SV-80719
Checks: C-32505r539378_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-32483r539379_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled. Account enabling actions on the SUT generates an automatic log entry in the system's log.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- HFFS-ND-000092
- Vuln IDs
-
- V-230173
- V-66235
- Rule IDs
-
- SV-230173r961863_rule
- SV-80725
Checks: C-32506r539381_chk
Determine if the HP FlexFabric Switch automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. [HP] display local-user Device management user admin: State: Active Service type: SSH/Terminal User group: system Bind attributes: Authorization attributes: Work directory: cfa0: User role list: network-admin, network-operator Password control configurations: Maximum login attempts: 3 Action for exceeding login attempts: Lock user for 15 minutes If an account is not automatically locked out until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded, this is a finding.
Fix: F-32484r539382_fix
Configure the HP FlexFabric Switch to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. [HP] local-user test [HP-luser-test] password-control login-attempt 3 exceed lock-time 15
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000093
- Vuln IDs
-
- V-230174
- V-66237
- Rule IDs
-
- SV-230174r961863_rule
- SV-80727
Checks: C-32507r539384_chk
Determine if the HP FlexFabric Switch notifies the administrator upon successful logon of the location of last logon (terminal or IP address) in addition to the date and time of the last logon. [HP] display password-control Global password control configurations: Password control: Enabled If the administrator is not notified of the location of last logon (terminal or IP address) upon successful logon, this is a finding.
Fix: F-32485r539385_fix
Configure the HP FlexFabric Switch to notify the administrator upon successful logon of the location of last logon (terminal or IP address). [HP] password-control enabled
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- HFFS-ND-000096
- Vuln IDs
-
- V-230175
- V-66243
- Rule IDs
-
- SV-230175r961863_rule
- SV-80733
Checks: C-32508r539387_chk
Determine if the HP FlexFabric Switch provides the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time. [HP] display info-center Information Center: Enabled Console: Enabled Monitor: Enabled Log host: Enabled 192.100.50.27, port number: 514, host facility: local7 Log buffer: Enabled Max buffer size 1024, current buffer size 512 Current messages 66, dropped messages 0, overwritten messages 0 Log file: Enabled Security log file: Enabled Information timestamp format: Log host: Date Other output destination: Date If the HP FlexFabric Switch does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near-real-time, this is a finding.
Fix: F-32486r539388_fix
Configure the HP FlexFabric Switch to generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. [HP] info-center security-logfile alarm-threshold 75
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001891
- Version
- HFFS-ND-000098
- Vuln IDs
-
- V-230176
- V-66247
- Rule IDs
-
- SV-230176r961863_rule
- SV-80737
Checks: C-32509r539390_chk
Check the HP FlexFabric Switch configuration to determine if compares internal information system clocks at least every 24 hours with an authoritative time server. [HP] display ntp status Clock status: synchronized Clock stratum: 4 System peer: 16.110.135.123 Local mode: client Reference clock ID: 16.110.135.123 Leap indicator: 00 Clock jitter: 0.004227 s Stability: 0.000 pps Clock precision: 2^-19 Root delay: 96.75598 ms Root dispersion: 149.76501 ms Reference time: d916fabd.a5c6d326 Mon, Jun 1 2015 9:37:33.647 If this comparison does not occur at least every 24 hours, this is a finding.
Fix: F-32487r539391_fix
Configure the HP FlexFabric Switch to compare internal information system clocks at least every 24 hours with an authoritative time server. [HP] ntp enable [HP] ntp unicast-server 16.110.135.123
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-002046
- Version
- HFFS-ND-000099
- Vuln IDs
-
- V-230177
- V-66249
- Rule IDs
-
- SV-230177r961863_rule
- SV-80739
Checks: C-32510r539393_chk
Check the HP FlexFabric Switch configuration to determine if it synchronizes internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period. [HP] display ntp status Clock status: synchronized Clock stratum: 4 System peer: 16.110.135.123 Local mode: client Reference clock ID: 16.110.135.123 Leap indicator: 00 Clock jitter: 0.004227 s Stability: 0.000 pps Clock precision: 2^-19 Root delay: 96.75598 ms Root dispersion: 149.76501 ms Reference time: d916fabd.a5c6d326 Mon, Jun 1 2015 9:37:33.647 If this synchronization is not occurring when the time difference is greater than the organization-defined time period, this is a finding.
Fix: F-32488r539394_fix
Configure the HP FlexFabric Switch to synchronize internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period. [HP] ntp enable [HP] ntp unicast-server 16.110.135.123
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-002041
- Version
- HFFS-ND-000113
- Vuln IDs
-
- V-230178
- V-66257
- Rule IDs
-
- SV-230178r961863_rule
- SV-80747
Checks: C-32511r539396_chk
Determine if the HP FlexFabric Switch allows the use of a temporary password for system logons with an immediate change to a permanent password. This requirement may be verified by demonstration, configuration review, or validated test results. This requirement may be met through use of a properly configured authentication server if the device is configured to use the authentication server. [HP] display password-control Global password control configurations: Password control: Enabled If the use of a temporary password for system logons with an immediate change to a permanent password is not allowed, this is a finding.
Fix: F-32489r539397_fix
Configure the HP FlexFabric Switch to allow the use of a temporary password for system logons with an immediate change to a permanent password. [HP] password-control enable Note: Once password control feature is enabled, user is forced to change password upon next logon.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- HFFS-ND-000126
- Vuln IDs
-
- V-230179
- V-66279
- Rule IDs
-
- SV-230179r961863_rule
- SV-80769
Checks: C-32512r539399_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-32490r539400_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000129
- Vuln IDs
-
- V-230180
- V-66283
- Rule IDs
-
- SV-230180r961863_rule
- SV-80773
Checks: C-32513r539402_chk
Determine if the HP FlexFabric Switch notifies the administrator of the number of successful logon attempts occurring during an organization-defined time period. Once the logon credentials have been entered, the system should display the previous logon information for the user: Log on as: admin admin@15.252.78.64's password: Your logon failures since the last successful logon: Wed May 27 10:06:04 2015 Wed May 27 10:06:09 2015 Last successfully logon time: Wed May 27 10:45:51 2015 If the administrator is not notified of the number of successful logon attempts occurring during an organization-defined time period, this is a finding.
Fix: F-32491r539403_fix
Configure the HP FlexFabric Switch to notify the administrator of the date and time of the last unsuccessful logon: [HP] password-control enable
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- HFFS-ND-000138
- Vuln IDs
-
- V-230181
- V-66291
- Rule IDs
-
- SV-230181r961863_rule
- SV-80781
Checks: C-32514r539405_chk
Determine if the info-center feature is enabled on the HP FlexFabric Switch: [HP] display info-center Information Center: Enabled If logging is not enabled, this is a finding.
Fix: F-32492r539406_fix
Enable info-center feature on the HP FlexFabric Switch: [HP] info-center enable Note: By default, the information center is enabled.