IPSec VPN Gateway Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- L
- CCI
- Version
- NET1020
- Vuln IDs
-
- V-3000
- Rule IDs
-
- SV-3000r3_rule
Checks: C-3947r4_chk
Review the network device interface ACLs to verify all deny statements are logged.
Fix: F-3025r4_fix
Configure interface ACLs to log all deny statements.
- RMF Control
- Severity
- H
- CCI
- Version
- NET0230
- Vuln IDs
-
- V-3012
- Rule IDs
-
- SV-3012r2_rule
Checks: C-3456r3_chk
Review the network element configuration to determine if administrative access to the device requires some form of authentication—at a minimum a password is required.
Fix: F-3037r5_fix
Configure the network element so it will require a password to gain administrative access to the device.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0340
- Vuln IDs
-
- V-3013
- Rule IDs
-
- SV-3013r2_rule
Checks: C-3474r8_chk
Review the device configuration or request that the administrator login to the device and observe the terminal. Verify either Option A or Option B (for systems with character limitations) of the Standard Mandatory DoD Notice and Consent Banner is displayed at logon. The required banner verbiage follows and must be displayed verbatim: Option A You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Option B If the system is incapable of displaying the required banner verbiage due to its size, a smaller banner must be used. The mandatory verbiage follows: “I've read & consent to terms in IS user agreem't.”
Fix: F-3038r6_fix
Configure all management interfaces to the network device to display the DoD mandated warning banner verbiage at login regardless of the means of connection or communication. The required banner verbiage that must be displayed verbatim is as follows: Option A You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Option B If the system is incapable of displaying the required banner verbiage due to its size, a smaller banner must be used. The mandatory verbiage follows: “I've read & consent to terms in IS user agreem't.”
- RMF Control
- Severity
- M
- CCI
- Version
- NET1639
- Vuln IDs
-
- V-3014
- Rule IDs
-
- SV-3014r2_rule
Checks: C-3540r4_chk
Review the management connection for administrative access and verify the network element is configured to time-out the connection after 10 minutes or less of inactivity.
Fix: F-3039r4_fix
Configure the network element to ensure the timeout for unattended administrative access connections is no longer than 10 minutes.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0820
- Vuln IDs
-
- V-3020
- Rule IDs
-
- SV-3020r2_rule
Checks: C-3584r3_chk
Review the device configuration to ensure DNS servers have been defined if it has been configured as a client resolver (name lookup).
Fix: F-3045r2_fix
Configure the device to include DNS servers or disable domain lookup.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0890
- Vuln IDs
-
- V-3021
- Rule IDs
-
- SV-3021r2_rule
Checks: C-3586r6_chk
Review the device configuration and verify it is configured to only allow SNMP access from addresses belonging to the management network.
Fix: F-3046r3_fix
Configure the network element to only allow SNMP access from only addresses belonging to the management network.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0400
- Vuln IDs
-
- V-3034
- Rule IDs
-
- SV-3034r2_rule
Checks: C-3489r3_chk
Ensure authentication is implemented for IGP peers.
Fix: F-3059r3_fix
Configure authentication for all IGP peers.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1675
- Vuln IDs
-
- V-3043
- Rule IDs
-
- SV-3043r2_rule
Checks: C-3825r5_chk
Review the SNMP configuration of all managed nodes to ensure different community names (V1/2) or groups/users (V3) are configured for read-only and read-write access.
Fix: F-3068r2_fix
Configure the SNMP community strings on the network element and change them from the default values. SNMP community strings and user passwords must be unique and do not match any other network device passwords. Different community strings (V1/2) or groups (V3) must be configured for various levels of read and write access.
- RMF Control
- Severity
- H
- CCI
- Version
- NET0460
- Vuln IDs
-
- V-3056
- Rule IDs
-
- SV-3056r5_rule
Checks: C-3503r9_chk
Review the network device configuration and validate there are no group accounts configured for access.
Fix: F-3081r9_fix
Configure individual user accounts for each authorized person then remove any group accounts.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0465
- Vuln IDs
-
- V-3057
- Rule IDs
-
- SV-3057r3_rule
Checks: C-3504r6_chk
Review the accounts authorized for access to the network device. Determine if the accounts are assigned the lowest privilege level necessary to perform assigned duties. User accounts must be set to a specific privilege level which can be mapped to specific commands or a group of commands. Authorized accounts should have the greatest privilege level unless deemed necessary for assigned duties. If it is determined that authorized accounts are assigned to greater privileges than necessary, this is a finding.
Fix: F-3082r5_fix
Configure authorized accounts with the least privilege rule. Each user will have access to only the privileges they require to perform their assigned duties.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0470
- Vuln IDs
-
- V-3058
- Rule IDs
-
- SV-3058r3_rule
Checks: C-3505r4_chk
Review the organization's responsibilities list and reconcile the list of authorized account with those accounts defined for access to the network device. If an unauthorized account is configured for access to the device, this is a finding.
Fix: F-3083r5_fix
Remove any account configured for access to the network device that is not defined in the organization's responsibilities list.
- RMF Control
- Severity
- H
- CCI
- Version
- NET0600
- Vuln IDs
-
- V-3062
- Rule IDs
-
- SV-3062r3_rule
Checks: C-3508r3_chk
Review the network element configuration to determine if passwords are viewable.
Fix: F-3087r6_fix
Configure the network element to ensure passwords are not viewable when displaying configuration information.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1638
- Vuln IDs
-
- V-3069
- Rule IDs
-
- SV-3069r3_rule
Checks: C-3532r7_chk
Review the network device configuration to verify only secure protocols using FIPS 140-2 validated cryptographic modules are used for any administrative access. Some of the secure protocols used for administrative and management access are listed below. This list is not all inclusive and represents a sample selection of secure protocols. -SSHv2 -SCP -HTTPS -SSL -TLS If management connections are established using protocols without FIPS 140-2 validated cryptographic modules, this is a finding.
Fix: F-3094r5_fix
Configure the network device to use secure protocols with FIPS 140-2 validated cryptographic modules.
- RMF Control
- Severity
- L
- CCI
- Version
- NET1640
- Vuln IDs
-
- V-3070
- Rule IDs
-
- SV-3070r2_rule
Checks: C-3542r4_chk
Review the configuration to verify all attempts to access the device via management connection are logged.
Fix: F-3095r3_fix
Configure the device to log all access attempts to the device to establish a management connection for administrative access.
- RMF Control
- Severity
- L
- CCI
- Version
- NET1030
- Vuln IDs
-
- V-3072
- Rule IDs
-
- SV-3072r2_rule
Checks: C-3636r5_chk
IOS Procedure: With online editing, the "show running-config" command will only show the current running configuration settings, which are different from the IOS defaults. The "show startup-config" command will show the NVRAM startup configuration. Compare the two configurations to ensure they are synchronized. JUNOS Procedure: This will never be a finding. The active configuration is stored on flash as juniper.conf. A candidate configuration allows configuration changes while in configuration mode without initiating operational changes. The router implements the candidate configuration when it is committed; thereby, making it the new active configuration—at which time it will be stored on flash as juniper.conf and the old juniper.conf will become juniper.conf.1.
Fix: F-3097r4_fix
Add procedures to the standard operating procedure to keep the running configuration synchronized with the startup configuration.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0720
- Vuln IDs
-
- V-3078
- Rule IDs
-
- SV-3078r2_rule
Checks: C-3551r3_chk
Review all Cisco device configurations to verify service udp-small-servers and service tcp-small-servers are not found. Note: The TCP and UDP small servers are enabled by default on Cisco IOS Software Version 11.2 and earlier. They are disabled by default on Cisco IOS Software Versions 11.3 and later.
Fix: F-3103r4_fix
Change the device configuration to include the following IOS commands: no service tcp-small-servers and no service udp-small-servers for each device running an IOS version prior to 12.0. This is the default for IOS versions 12.0 and later (i.e., these commands will not appear in the running configuration.)
- RMF Control
- Severity
- L
- CCI
- Version
- NET0730
- Vuln IDs
-
- V-3079
- Rule IDs
-
- SV-3079r2_rule
Checks: C-3571r3_chk
Ensure finger has not been implemented in the configuration by verifying the vendor default and reviewing the configuration.
Fix: F-3104r3_fix
Disable the finger service.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0760
- Vuln IDs
-
- V-3080
- Rule IDs
-
- SV-3080r2_rule
Checks: C-3574r5_chk
IOS Procedure: Review the router configuration and verify the "boot network" and "service config" commands are not defined. Since version 12.0, these commands have been disabled by default. If configured, the "service config" command will be found right after the version, and the "boot network" command will be found between the boot-start-marker and boot-end-marker commands.
Fix: F-3105r4_fix
IOS Procedure: Disable configuration auto-loading by entering the "no boot network" and "no service config" commands.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0770
- Vuln IDs
-
- V-3081
- Rule IDs
-
- SV-3081r2_rule
Checks: C-3575r2_chk
Review the configuration to determine if source routing is enabled.
Fix: F-3106r2_fix
Configure the router to disable IP source routing.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0790
- Vuln IDs
-
- V-3083
- Rule IDs
-
- SV-3083r2_rule
Checks: C-3578r3_chk
IOS Procedure: IP directed broadcast is disabled by default in IOS version 12.0 and higher so the command "no ip directed-broadcast" will not be displayed in the running configuration—verify that the running configuration does not contain the command "ip directed-broadcast". For versions prior to 12.0 ensure the command "no ip directed-broadcast" is displayed in the running configuration. Directed broadcast can be enabled on internal facing interfaces to support services such as Wake-On-LAN. Case scenario may also include support for legacy applications where the content server and the clients do not support multicast. The content servers send streaming data using UDP broadcast. Used in conjunction with the ip multicast helper-map feature, broadcast data can be sent across a multicast topology. The broadcast streams are converted to multicast and vice versa at the first-hop routers and last-hop routers before entering leaving the multicast transit area respectively. The last-hop router must convert the multicast to broadcast. Hence, this interface must be configured to forward a broadcast packet (i.e. a directed broadcast address is converted to the all nodes broadcast address).
Fix: F-3108r3_fix
Change the router configuration files to disable IP directed broadcast on all interfaces.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0740
- Vuln IDs
-
- V-3085
- Rule IDs
-
- SV-3085r2_rule
Checks: C-3572r3_chk
Review the device configuration to determine that HTTP is not enabled for administrative access.
Fix: F-3110r4_fix
Configure the device to disable using HTTP (port 80) for administrative access.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0750
- Vuln IDs
-
- V-3086
- Rule IDs
-
- SV-3086r2_rule
Checks: C-3573r4_chk
Review the router configuration to verify the IOS command "no ip bootp server" is present.
Fix: F-3111r5_fix
Change the configuration to include the IOS command "no ip bootp server".
- RMF Control
- Severity
- H
- CCI
- Version
- NET0240
- Vuln IDs
-
- V-3143
- Rule IDs
-
- SV-3143r2_rule
Checks: C-40236r1_chk
Review the network element configuration to determine if the vendor default password is active.
Fix: F-35391r2_fix
Remove any vendor default passwords from the network element configuration.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0700
- Vuln IDs
-
- V-3160
- Rule IDs
-
- SV-3160r2_rule
Checks: C-3549r2_chk
Have the administrator display the OS version in operation. The OS must be current with related IAVMs addressed.
Fix: F-3185r2_fix
Update operating system and address all related IAVMs.
- RMF Control
- Severity
- H
- CCI
- Version
- NET1636
- Vuln IDs
-
- V-3175
- Rule IDs
-
- SV-3175r3_rule
Checks: C-3516r7_chk
Review the network device configuration to verify all management connections for administrative access require authentication.
Fix: F-3200r3_fix
Configure authentication for all management connections.
- RMF Control
- Severity
- H
- CCI
- Version
- NET1660
- Vuln IDs
-
- V-3196
- Rule IDs
-
- SV-3196r2_rule
Checks: C-3820r5_chk
Review the device configuration to verify it is configured to use SNMPv3 with both SHA authentication and privacy using AES encryption. If the site is using Version 1 or Version 2 with all of the appropriate patches and has developed a migration plan to implement the Version 3 Security Model, this finding can be downgraded to a Category II. To verify the appropriate patches on CISCO devices: Check the following IAVMs associated with SNMPv1: 1. 2001-B-0001 (V0005809) Cisco IOS Software SNMP Read-Write ILMI Community String Vulnerability 2. 2002-A-SNMP-001 (V0005835) Multiple Simple Network Management Protocol Vulnerabilities in Perimeter Devices (Cisco Security Advisory: Malformed SNMP Message-Handling Vulnerabilities) To verify the appropriate patches on other vendors refer to this web site: http://www.cert.org/advisories/CA-2002-03.html. If the targeted asset is running SNMPv3 and does not support SHA or AES, but the device is configured to use MD5 authentication and DES or 3DES encryption, then the finding can be downgraded to a Category III. If the site is using Version 1 or Version 2 and has installed all of the appropriate patches or upgrades to mitigate any known security vulnerabilities, this finding can be downgraded to a Category II. In addition, if the device does not support SNMPv3, this finding can be downgraded to a Category III provided all of the appropriate patches to mitigate any known security vulnerabilities have been applied and has developed a migration plan that includes the device upgrade to support Version 3 and the implementation of the Version 3 Security Model.
Fix: F-3221r3_fix
If SNMP is enabled, configure the network element to use SNMP Version 3 Security Model with FIPS 140-2 validated cryptography (i.e., SHA authentication and AES encryption).
- RMF Control
- Severity
- H
- CCI
- Version
- NET1665
- Vuln IDs
-
- V-3210
- Rule IDs
-
- SV-3210r2_rule
Checks: C-3822r5_chk
Review the network element configuration and verify if either of the SNMP community strings “public” or “private” is being used.
Fix: F-3235r4_fix
Configure unique SNMP community strings replacing the default community strings.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0440
- Vuln IDs
-
- V-3966
- Rule IDs
-
- SV-3966r3_rule
Checks: C-3502r4_chk
Review the network device configuration to determine if an authentication server is defined for gaining administrative access. If so, there must be only one account configured locally for an emergency. Verify the username and password for the emergency account is contained within a sealed envelope kept in a safe.
Fix: F-3899r4_fix
Configure the device to only allow one local account for emergency access and store the credentials in a secret manner.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1624
- Vuln IDs
-
- V-3967
- Rule IDs
-
- SV-3967r2_rule
Checks: C-3511r3_chk
Review the configuration and verify a session using the console port will time out after 10 minutes or less of inactivity.
Fix: F-3900r4_fix
Configure the timeout for idle console connection to 10 minutes or less.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0894
- Vuln IDs
-
- V-3969
- Rule IDs
-
- SV-3969r3_rule
Checks: C-3942r9_chk
Review the network device configuration and verify SNMP community strings are read-only when using SNMPv1, v2c, or basic v3 (no authentication or privacy). Write access may be used if authentication is configured when using SNMPv3. If write-access is used for SNMP versions 1, 2c, or 3-noAuthNoPriv mode and there is no documented approval by the IAO, this is a finding.
Fix: F-3902r7_fix
Configure the network device to allow for read-only SNMP access when using SNMPv1, v2c, or basic v3 (no authentication or privacy). Write access may be used if authentication is configured when using SNMPv3.
- RMF Control
- Severity
- H
- CCI
- Version
- NET1623
- Vuln IDs
-
- V-4582
- Rule IDs
-
- SV-4582r3_rule
Checks: C-3510r4_chk
Review the network device's configuration and verify authentication is required for console access.
Fix: F-4515r4_fix
Configure authentication for console access on the network device.
- RMF Control
- Severity
- L
- CCI
- Version
- NET1021
- Vuln IDs
-
- V-4584
- Rule IDs
-
- SV-4584r2_rule
Checks: C-3950r3_chk
Review the network element’s configuration to ensure all messages up to and including severity level 6 (informational) are logged and sent to a syslog server. Severity Level Message Type 0 Emergencies 1 Alerts 2 Critical 3 Errors 4 Warning 5 Notifications 6 Informational 7 Debugging
Fix: F-4517r2_fix
Configure the network element to log all messages except debugging and send all log data to a syslog server.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1637
- Vuln IDs
-
- V-5611
- Rule IDs
-
- SV-5611r2_rule
Checks: C-3527r4_chk
Review the configuration and verify management access to the device is allowed only from hosts within the management network.
Fix: F-5522r3_fix
Configure an ACL or filter to restrict management access to the device from only the management network.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1645
- Vuln IDs
-
- V-5612
- Rule IDs
-
- SV-5612r2_rule
Checks: C-3534r4_chk
Review the configuration and verify the timeout is set for 60 seconds or less. The SSH service terminates the connection if protocol negotiation (that includes user authentication) is not complete within this timeout period.
Fix: F-5523r4_fix
Configure the network element so it will require a secure shell timeout of 60 seconds or less.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1646
- Vuln IDs
-
- V-5613
- Rule IDs
-
- SV-5613r2_rule
Checks: C-3538r4_chk
Review the configuration and verify the number of unsuccessful SSH login attempts is set at 3.
Fix: F-5524r7_fix
Configure the network element to require a maximum number of unsuccessful SSH login attempts at 3.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0722
- Vuln IDs
-
- V-5614
- Rule IDs
-
- SV-5614r2_rule
Checks: C-3552r3_chk
IOS Procedure: Review all Cisco router and switch configurations to verify that the service pad command is not found.
Fix: F-5525r4_fix
IOS Procedure: Change the configuration to include the following commands: no service pad
- RMF Control
- Severity
- L
- CCI
- Version
- NET0724
- Vuln IDs
-
- V-5615
- Rule IDs
-
- SV-5615r2_rule
Checks: C-3559r4_chk
IOS Procedure: Review the device configuration to verify the "service tcp-keepalives-in" command is configured.
Fix: F-5526r6_fix
IOS Procedure: Change the configuration to include the "service tcp-keepalives-in" command.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0726
- Vuln IDs
-
- V-5616
- Rule IDs
-
- SV-5616r2_rule
Checks: C-3562r4_chk
IOS Procedure: Review the device configuration to verify that identification support is not enabled via "ip identd" global command. It is disabled by default.
Fix: F-5527r4_fix
IOS Procedure: Disable identification support by configuring the global "no ip identd" command.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0781
- Vuln IDs
-
- V-5618
- Rule IDs
-
- SV-5618r2_rule
Checks: C-3577r5_chk
IOS Procedure: Review the configuration and verify that the "ip gratuitous-arps" global command is not configured. It is disabled by default in release 12.3 and above.
Fix: F-5529r4_fix
The administrator must ensure the device configuration does not include the "ip gratuitous-arp" command.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0965
- Vuln IDs
-
- V-5646
- Rule IDs
-
- SV-5646r4_rule
Checks: C-3604r8_chk
Review the device configuration to determine if threshold filters or timeout periods are set for dropping excessive half-open TCP connections. For timeout periods, the time should be set to 10 seconds or less. If the device can not be configured for 10 seconds or less, it should be set to the least amount of time allowable in the configuration. Threshold filters will need to be determined by the organization for optimal filtering.
Fix: F-5557r6_fix
Configure the device to drop half-open TCP connections through threshold filtering or timeout periods.
- RMF Control
- Severity
- L
- CCI
- Version
- NET1629
- Vuln IDs
-
- V-7011
- Rule IDs
-
- SV-7365r2_rule
Checks: C-3513r3_chk
Review the configuration and verify the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected.
Fix: F-6614r3_fix
Disable the auxiliary port. If used for out-of-band administrative access, the port must be connected to a secured modem providing encryption and authentication.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0422
- Vuln IDs
-
- V-14667
- Rule IDs
-
- SV-15301r2_rule
Checks: C-12696r3_chk
Review key expirations. When configuring authentication for routing protocols that provide key chains, configure two rotating keys with overlapping expiration dates, both with 180-day expirations.
Fix: F-14125r3_fix
The IAO or SA will ensure a key has an expiration of 180 days or less.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0744
- Vuln IDs
-
- V-14669
- Rule IDs
-
- SV-15313r2_rule
Checks: C-12779r4_chk
Review the device configuration and verify there are no BSDr commands (e.g., rsh, rlogin, rcp, rdump, rrestore, and rdist) enabled.
Fix: F-14130r4_fix
Configure the device to disable BSDr command services.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0813
- Vuln IDs
-
- V-14671
- Rule IDs
-
- SV-15327r2_rule
Checks: C-12793r5_chk
Review the device configuration and verify it is authenticating the NTP messages received from the NTP server or peer. Authentication must be performed using either PKI (supported in NTP v4) or SHA-1 hashing algorithm. If SHA-1 is not supported by both the NTP client and server, then MD5 can be used.
Fix: F-14132r1_fix
Configure the device to authenticate all received NTP messages using either PKI (supported in NTP v4) or SHA-1 hashing algorithm. If SHA-1 is not supported by this client or the NTP peer or server, then MD5 can be used.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0897
- Vuln IDs
-
- V-14672
- Rule IDs
-
- SV-15336r2_rule
Checks: C-12802r3_chk
The router must use its loopback or OOB management interface address as the source address when originating TACACS+ or RADIUS traffic.
Fix: F-14134r4_fix
Configure the router to use its loopback or OOBM interface address as the source address when originating TACACS+ or RADIUS traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0898
- Vuln IDs
-
- V-14673
- Rule IDs
-
- SV-15339r2_rule
Checks: C-12805r3_chk
Review the configuration and verify the loopback interface address is used as the source address when originating syslog traffic. If the device is managed from an OOB management network, the OOB interface must be used instead.
Fix: F-14135r3_fix
Configure the router to use its loopback or OOB management interface address as the source address when originating syslog traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0899
- Vuln IDs
-
- V-14674
- Rule IDs
-
- SV-15342r2_rule
Checks: C-12808r3_chk
Review the configuration and verify the loopback interface address is used as the source address when originating NTP traffic. If the device is managed from an OOB management network, the OOB interface must be used instead.
Fix: F-14136r3_fix
Configure the router to use its loopback or OOB management interface address as the source address when originating NTP traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0900
- Vuln IDs
-
- V-14675
- Rule IDs
-
- SV-15345r2_rule
Checks: C-12811r3_chk
Review the configuration and verify the loopback interface address is used as the source address when originating SNMP traffic. If the device is managed from an OOB management network, the OOB interface must be used instead.
Fix: F-14137r3_fix
Configure the router to use its loopback or OOB management interface address as the source address when originating SNMP traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0901
- Vuln IDs
-
- V-14676
- Rule IDs
-
- SV-15348r2_rule
Checks: C-12814r3_chk
Review the configuration and verify the loopback interface address is used as the source address when originating NetFlow traffic. If the device is managed from an OOB management network, the OOB interface must be used instead.
Fix: F-14138r2_fix
Configure the router to use its loopback or OOB management interface address as the source address when originating NetFlow traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0902
- Vuln IDs
-
- V-14677
- Rule IDs
-
- SV-15351r3_rule
Checks: C-12818r5_chk
Review the device configuration to verify the loopback interface address is used as the source address when originating TFTP or FTP traffic. If the device is managed from an OOB management network, the OOB interface must be used instead.
Fix: F-14139r6_fix
Configure the network device to use a loopback or OOB management interface address as the source address when originating TFTP or FTP traffic.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0903
- Vuln IDs
-
- V-14681
- Rule IDs
-
- SV-15357r2_rule
Checks: C-12824r2_chk
Review the configuration and verify iBGP peering uses the router's loopback interface address as the source address.
Fix: F-14148r2_fix
Ensure the router’s loopback address is used as the source address for iBGP peering.
- RMF Control
- Severity
- M
- CCI
- Version
- NET1647
- Vuln IDs
-
- V-14717
- Rule IDs
-
- SV-15459r2_rule
Checks: C-12924r6_chk
Review the configuration and verify SSH Version 1 is not being used for administrative access.
Fix: F-14184r3_fix
Configure the network element to use SSH version 2.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0433
- Vuln IDs
-
- V-15432
- Rule IDs
-
- SV-16259r2_rule
Checks: C-14439r4_chk
Verify an authentication server is required to access the device and that there are two or more authentication servers defined.
Fix: F-15096r2_fix
Ensure an authentication server is required to access the device and that there are two or more authentication servers defined.
- RMF Control
- Severity
- H
- CCI
- Version
- NET0441
- Vuln IDs
-
- V-15434
- Rule IDs
-
- SV-16261r2_rule
Checks: C-14441r3_chk
Review the emergency account configured on the network element and verify that it has been assigned to a privilege level that will enable the administrator to perform necessary administrative functions when the authentication server is not online.
Fix: F-15098r6_fix
Assign a privilege level to the emergency account to allow the administrator to perform necessary administrative functions when the authentication server is not online.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0991
- Vuln IDs
-
- V-17821
- Rule IDs
-
- SV-19075r2_rule
Checks: C-19238r3_chk
The managed network element’s OOBM interface must be configured with an IP address from the address space belonging to the OOBM network. After determining which interface is connected to the OOBM access switch, review the managed device configuration and verify the interface has been assigned an address from the local management address block.
Fix: F-17736r1_fix
Configure the managed network element’s OOBM interface with an IP address from the address space belonging to the OOBM network.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0992
- Vuln IDs
-
- V-17822
- Rule IDs
-
- SV-19076r2_rule
Checks: C-19239r4_chk
Step 1: Verify the managed interface has an inbound and outbound ACL or filter. Step 2: Verify the ingress ACL blocks all transit traffic—that is, any traffic not destined to the router itself. In addition, traffic accessing the managed elements should be originated at the NOC. Step 3: Verify the egress ACL blocks any traffic not originated by the managed element.
Fix: F-17737r1_fix
If the management interface is a routed interface, it must be configured with both an ingress and egress ACL. The ingress ACL should block any transit traffic, while the egress ACL should block any traffic that was not originated by the managed network elements.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0993
- Vuln IDs
-
- V-17823
- Rule IDs
-
- SV-19077r2_rule
Checks: C-19240r6_chk
Review the configuration to verify the management interface is configured as passive for the IGP instance for the managed network. Depending on the platform and routing protocol, this may simply require that the interface or its IP address is not included in the IGP configuration.
Fix: F-17738r2_fix
Configure the management interface as passive for the IGP instance configured for the managed network. Depending on the platform and routing protocol, this may simply require that the interface or its IP address is not included in the IGP configuration.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0966
- Vuln IDs
-
- V-19188
- Rule IDs
-
- SV-21027r2_rule
Checks: C-23115r4_chk
Determine if control plane protection has been implemented on the device by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class.
Fix: F-19812r1_fix
Implement control plane protection by classifying traffic types based on importance levels and configure filters to restrict and rate limit the traffic punted to the route processor as according to each class.
- RMF Control
- Severity
- L
- CCI
- Version
- NET0812
- Vuln IDs
-
- V-23747
- Rule IDs
-
- SV-28651r2_rule
Checks: C-3581r3_chk
Review the configuration and verify two NTP servers have been defined.
Fix: F-3044r1_fix
Specify two NTP server IP addresses on the device to be used to request time from.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-010
- Vuln IDs
-
- V-30939
- Rule IDs
-
- SV-40981r1_rule
Checks: C-39599r2_chk
Review the VPN gateway configuration to determine if there are any IPSec crypto maps enabled in manual mode. The crypto map will specify that it is manual and will define the remote peer, what traffic is to be protected, as well as the cipher key and encryption algorithm to be used for encrypting the IP packets.
Fix: F-34748r1_fix
Configure the VPN gateway to use IKE for establishing all IPSec security associations. An ISAKMP policy must be configured to define the IKE security association which will include the peer, the authentication method, encryption suite, and Diffie-Hellman group.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-020
- Vuln IDs
-
- V-30941
- Rule IDs
-
- SV-40983r1_rule
Checks: C-39601r1_chk
Review the VPN gateway configuration to determine if either username/password or certificate-based authentication is used. The authentication method will be defined on the ISAKMP policy that has been configured for IKE Phase I negotiation.
Fix: F-34751r1_fix
Configure the VPN gateway to authenticate the remote end-point prior to establishing an IPSec session. The authentication method will be defined on the ISAKMP policy used to establish an IKE security association.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-030
- Vuln IDs
-
- V-30943
- Rule IDs
-
- SV-40985r1_rule
Checks: C-39603r1_chk
Review the VPN gateway configuration to determine if certificate-based authentication is used. The authentication method will be defined on the ISAKMP policy that has been configured for IKE Phase I negotiation.
Fix: F-34752r1_fix
Configure the VPN gateway to use certificate-based authentication for IPSec peers and clients. The authentication method will be defined on the ISAKMP policy used to establish an IKE security association.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-040
- Vuln IDs
-
- V-30944
- Rule IDs
-
- SV-40986r1_rule
Checks: C-39605r2_chk
Review the VPN gateway configuration to determine if a CA trust point has been configured. The CA trust point will contain the URL of the CA in which the gateway has enrolled with. Verify this is a DoD or DoD-approved CA. This will ensure the gateway has enrolled and received a certificate from a trusted CA. A remote end-point’s certificate will always be validated by the gateway by verifying the signature of the CA on the certificate using the CA’s public key, which is contained in the gateways certificate it received at enrollment.
Fix: F-34753r2_fix
Configure the VPN gateway to enroll with a DoD-approved Certificate Authority.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-250
- Vuln IDs
-
- V-30945
- Rule IDs
-
- SV-40987r1_rule
Checks: C-39604r1_chk
Review all ISAKMP client configuration groups used to push policy to remote software clients and determine if the software client allows the users to save their logon password locally on the remote PC. Note: This vulnerability is only applicable if certificate-based authentication is not implemented.
Fix: F-34754r1_fix
Configure the ISAKMP client configuration groups used to push policy to remote software clients to disable the ability for users to save their logon password locally on the remote PC.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-240
- Vuln IDs
-
- V-30946
- Rule IDs
-
- SV-40988r1_rule
Checks: C-39606r5_chk
Review all ISAKMP client configuration groups used to push policy to remote software clients and determine if the software client will display a DoD approved warning banner prior to allowing access to the VPN. Verify either Option A or Option B (for clients with character limitations) of the Standard Mandatory DoD Notice and Consent Banner is displayed at logon. The required banner verbiage follows and must be displayed verbatim: Option A You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Option B If the client is incapable of displaying the required banner verbiage due to its size or the server is limited as to the banner to push to the client, a smaller banner must be used. The mandatory verbiage follows:“I've read & consent to terms in IS user agreem't.”
Fix: F-34755r1_fix
Configure the ISAKMP client configuration groups used to push policy to remote software clients to display a DoD approved warning banner prior to allowing access to the VPN.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-050
- Vuln IDs
-
- V-30947
- Rule IDs
-
- SV-40989r1_rule
Checks: C-39608r1_chk
Examine the CA trust point defined on the VPN gateway to determine if it references a CRL and that revocation check has been enabled. An alternate mechanism for checking the validity of a certificate is the use of the Online Certificate Status Protocol (OCSP). Unlike CRLs, which provide only periodic certificate status checks, OCSP can provide timely information regarding the status of a certificate.
Fix: F-34758r1_fix
Configure the CA trust point to enable certificate revocation check by referencing a CRL or via OCSP.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-230
- Vuln IDs
-
- V-30948
- Rule IDs
-
- SV-40990r1_rule
Checks: C-39607r1_chk
Review all ISAKMP client configuration groups used to push policy to remote software clients and determine if the software client will check for the presence of a personal firewall before enabling access to the VPN.
Fix: F-34757r1_fix
Configure the ISAKMP client configuration groups used to push policy to remote software clients to check for the presence of a personal firewall before enabling access to the VPN.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-060
- Vuln IDs
-
- V-30950
- Rule IDs
-
- SV-40992r1_rule
Checks: C-39610r1_chk
Examine all ISAKMP policies configured on the VPN gateway to determine what hash algorithm is being used for establishing an IKE Security Association.
Fix: F-34760r1_fix
Configure all ISAKMP policies to use SHA for IKE cryptographic hashing operations.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-220
- Vuln IDs
-
- V-30951
- Rule IDs
-
- SV-40993r1_rule
Checks: C-39609r1_chk
Review the ISAKMP client configuration groups used to push policy to remote clients and determine if split tunneling is allowed. Split tunneling is commonly enabled by specifying an access control list within the client’s group policy. The access control list specifies what traffic flows are protected; hence, any traffic to destinations not declared in the access control list is forwarded outside of the IPSec tunnel by the remote client. If there is no access control list specified within a client configuration group, then packets for all destinations are transported within the IPSec tunnel.
Fix: F-34759r1_fix
Disable split tunneling on all ISAKMP client configuration groups.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-070
- Vuln IDs
-
- V-30952
- Rule IDs
-
- SV-40994r1_rule
Checks: C-39612r1_chk
Examine all ISAKMP policies configured on the VPN gateway to determine what encryption algorithm is being used for establishing an IKE Security Association.
Fix: F-34762r1_fix
Configure all ISAKMP policies to use AES for IKE cryptographic encryption operations.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-210
- Vuln IDs
-
- V-30953
- Rule IDs
-
- SV-40995r1_rule
Checks: C-39613r2_chk
Review the remote VPN gateway interface configurations. All external-facing interfaces connected to an IP backbone network (i.e. NIPRNet) must have an IPSec crypto map bound to it or be the source of an IPSec-protected virtual tunnel interface. All inbound traffic must either map to a crypto map bound to a physical interface or be received via the virtual tunnel interface. Likewise, all outbound traffic must either map to a crypto map bound to a physical interface or be forwarded via the virtual tunnel interface. The remote VPN client can have WAN links connecting to other remote sites and the central sites. Traffic traversing these links does not need to be encrypted as they are part of the enclave’s private network.
Fix: F-34763r3_fix
Configure the VPN gateway at the remote site to ensure it receives all ingress traffic and forward all egress traffic via the IPSec tunnel. All inbound and outbound traffic must be considered interesting traffic for the IPSec crypto maps bound to the external interfaces. If IPSec-protected virtual tunnel interfaces are configured, all traffic must flow through them or other provisioned WAN links connecting the remote site to other sites belonging to the enclave.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-200
- Vuln IDs
-
- V-30954
- Rule IDs
-
- SV-40996r1_rule
Checks: C-39614r3_chk
Deploying the VPN gateway within a DMZ or service network will eliminate any risks associated with u-turn traffic. The traffic exiting the IPSec tunnel leaving the DMZ destined to either the private network or the NIPRNet/Internet will have to pass through the DMZ firewall and therefore, be subject to the applicable policy. If the VPN gateway is a firewall, which could be either on or outside the DMZ, review the configuration and verify it is not allowing traffic received from the IPSec tunnel to u-turn back out towards the NIPRNet/Internet. To allow traffic to u-turn, the firewall would have to be configured to NAT for the pool of remote client addresses on the outside interface (PAT the same global address), as well as a configuration statement to allow traffic to egress out the same interface in which the IPSec tunnel terminates—most implementations do not allow this by default. If the firewall is configured to allow a u-turn, then there must be another firewall upstream to inspect this outbound traffic or the traffic must be forwarded (policy based routed) towards the firewall or applicable proxy to perform the stateful inspection.
Fix: F-34764r2_fix
Deploy the VPN gateway within a DMZ or configure the device to not permit u-turn traffic. If it must allow u-turn traffic, then deploy a firewall upstream to inspect the outbound traffic.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-190
- Vuln IDs
-
- V-30955
- Rule IDs
-
- SV-40997r2_rule
Checks: C-39615r1_chk
Review all transform sets defined in IPSec profiles and crypto maps used for securing classified traffic to determine if they are compliant with Suite B requirements. According to NIST, AES with 128-bit keys, SHA-256, and ECDH and ECDSA using the 256-bit prime modulus elliptic curve (FIPS PUB 186-3) provide adequate protection for classified information up to SECRET level. AES with 356-bit keys, SHA-384, and Elliptic Curve Public Key Cryptography using the 384-bit prime modulus elliptic curve (FIPS PUB 186-3) provide adequate protection for classified information up to TOP SECRET level. Note: During the transition to the use of elliptic curve cryptography in ECDH and ECDSA, DH, DSA and RSA can be used with a 2048-bit modulus to protect classified information up to the SECRET level.
Fix: F-34765r1_fix
Configure transform sets used for transporting classified packets to be compliant with Suite B requirements.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-180
- Vuln IDs
-
- V-30956
- Rule IDs
-
- SV-40998r1_rule
Checks: C-39616r1_chk
Review all IPSec Security Associations configured globally or within IPSec profiles on the VPN gateway and determine if anti-replay is enabled. If anti-replay is not configured, determine if the feature is enabled by default.
Fix: F-34766r2_fix
Enable anti-replay on all IPSec security associations either within IPSec profiles or as a global command.
- RMF Control
- Severity
- L
- CCI
- Version
- NET-VPN-080
- Vuln IDs
-
- V-30957
- Rule IDs
-
- SV-40999r1_rule
Checks: C-39617r2_chk
Examine all ISAKMP profiles configured on the VPN gateway to verify aggressive mode has not been defined for IKE Phase 1 Security Association. Aggressive mode could also be configured globally which would make it applicable to all IKE sessions.
Fix: F-34767r2_fix
Configure the VPN gateway to ensure aggressive mode is disabled for all IKE Phase 1 security associations.
- RMF Control
- Severity
- L
- CCI
- Version
- NET-VPN-090
- Vuln IDs
-
- V-30959
- Rule IDs
-
- SV-41001r1_rule
Checks: C-39619r1_chk
Examine all ISAKMP policies configured on the VPN gateway to determine what Diffie-Hellman group is being used. Verify Group 2 or larger has been configured. If the group has not been configured, determine what the default for the VPN gateway is or enter the appropriate show command to display the policies. Group 1 is the default for many VPN gateways.
Fix: F-34769r1_fix
Configure the VPN gateway to ensure Diffie-Hellman Group 2 or larger is used.
- RMF Control
- Severity
- M
- CCI
- Version
- NET-VPN-100
- Vuln IDs
-
- V-30960
- Rule IDs
-
- SV-41002r1_rule
Checks: C-39621r2_chk
Review the VPN gateway configuration to determine if Perfect Forward Secrecy (PFS) is enabled. For most platforms, PFS is enabled by default. Examine all ISAKMP profiles and crypto maps to verify PFS is enabled.
Fix: F-34771r1_fix
Configure the VPN gateway to ensure PFS is enabled.
- RMF Control
- Severity
- L
- CCI
- Version
- NET-VPN-170
- Vuln IDs
-
- V-30961
- Rule IDs
-
- SV-41003r1_rule
Checks: C-39620r2_chk
Review all IPSec Security Associations configured globally or within IPSec profiles on the VPN gateway and examine the configured idle time. The idle time value must be 1 hour or less. If idle time is not configured, determine the default used by the gateway.
Fix: F-34770r1_fix
Configure an idle time value of 1 hour or less for all IPSec security associations either within IPSec profiles or as a global command.
- RMF Control
- Severity
- L
- CCI
- Version
- NET-VPN-160
- Vuln IDs
-
- V-30962
- Rule IDs
-
- SV-41004r1_rule
Checks: C-39622r1_chk
Review all IPSec Security Associations configured globally or within IPSec profiles on the VPN gateway and examine the configured lifetime. The lifetime value must be 8 hours or less. If they are not configured, determine the default that used by the gateway.
Fix: F-34772r1_fix
Configure a lifetime value of 8 hours or less for all IPSec security associations either within IPSec profiles or as a global command.
- RMF Control
- Severity
- L
- CCI
- Version
- NET-VPN-110
- Vuln IDs
-
- V-30963
- Rule IDs
-
- SV-41005r1_rule
Checks: C-39623r3_chk
Review the VPN gateway configuration to determine if Perfect Forward Secrecy (PFS) is enabled. If PFS is enabled, it must use DH Group 2. For most platforms, PFS is enabled by default using DH Group 1. Examine all ISAKMP profiles and crypto maps to verify PFS is enabled using DH Group 2.
Fix: F-34773r1_fix
Configure the VPN gateway to ensure Diffie-Hellman Group 2 or larger is used when enabling PFS.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-150
- Vuln IDs
-
- V-30964
- Rule IDs
-
- SV-41006r1_rule
Checks: C-39624r2_chk
Review all transform sets defined in IPSec profiles and crypto maps and verify ESP tunnel mode has been specified. If the mode is not configured, determine the default for the VPN gateway.
Fix: F-34774r1_fix
Configure all IPSec transform sets to use ESP tunnel mode.
- RMF Control
- Severity
- L
- CCI
- Version
- NET-VPN-120
- Vuln IDs
-
- V-30965
- Rule IDs
-
- SV-41007r1_rule
Checks: C-39625r1_chk
Review all ISAKMP policies configured on the VPN gateway and examine the configured lifetime. The lifetime value must be 24 hours or less. If they are not configured, determine the default that used by the gateway.
Fix: F-34776r1_fix
Configure a lifetime value of 24 hours or less for all ISAKMP polices.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-140
- Vuln IDs
-
- V-30966
- Rule IDs
-
- SV-41008r1_rule
Checks: C-39626r3_chk
Review all transform sets defined in IPSec profiles and crypto maps and verify that AES has been enabled for performing cryptographic encryption operations.
Fix: F-34775r2_fix
Configure all IPSec transform sets to use AES for performing cryptographic encryption operations.
- RMF Control
- Severity
- H
- CCI
- Version
- NET-VPN-130
- Vuln IDs
-
- V-30967
- Rule IDs
-
- SV-41009r1_rule
Checks: C-39627r2_chk
Review all transform sets defined in IPSec profiles and crypto maps and verify SHA has been enabled for performing cryptographic hashing operations.
Fix: F-34777r1_fix
Configure all IPSec transform sets to use SHA for performing cryptographic hashing operations.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0408
- Vuln IDs
-
- V-31285
- Rule IDs
-
- SV-41553r2_rule
Checks: C-12685r1_chk
Review the router configuration to determine if authentication is being used for all peers. A password or key should be defined for each BGP neighbor regardless of the autonomous system the peer belongs. Most vendors’ command lines use a neighbor statement or keyword to specify a BGP peer.
Fix: F-14123r1_fix
The administrator must configure the router to authenticate all BGP peers.