Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
In the ICS Web UI, navigate to Users >> Resource Policies >> VPN Tunneling >> Access Control. 1. Verify that an Access Control Policy exists. 2. Verify the Access Control Policy is not configured to allows all IPv4/IPv6 addresses or all TCP/UDP ports. If the ICS does not use one or more Access Control Policies to restrict inbound and outbound traffic compliance with the sites documented information flow control policy, this is a finding.
Establish Access Control policy in accordance with the site's system security plan. Policies will vary based on security policies and architecture. In the ICS Web UI, navigate to Users >> Resource Policies >> VPN Tunneling >> Access Control. 1. Click "New Policy". 2. Enter a name. 3. Under IPv4 Resources, add all allowed ports and protocols required for users. Examples provided below: - For ICMP configure the following: icmp://10.0.0.0/255.255.255.0 to allow ICMP communications for the 10.0.0.0/24 subnet. - For TCP configure the following: tcp://*:80,443 to allow TCP communications for all IPv4 addresses going to TCP port 80 and 443 (web traffic). - For UDP configure the following: udp://10.0.0.0/255.255.255.0:53,123 to allow UDP communications for the 10.0.0.0/24 IPv4 addresses going to UDP port 53 (DNS) and 123 (NTP). 4. Under IPv6 Resources, add all allowed ports and protocols required for users. Examples provided below: - For ICMP configure the following: icmpv6://[2001:db8:1::/64] to allow ICMPv6 communications for the 2001:db8:1::/64 subnet. - For TCP configure the following: tcp://[*]:80,443 to allow TCP communications for all IPv6 addresses going to TCP port 80 and 443 (web traffic). - For UDP configure the following: udp://[2001:db8:2::/64]:53,123 to allow UDP communications for the 2001:db8:2::/64 IPv6 addresses going to UDP port 53 (DNS) and 123 (NTP). 5. For FQDN, add specific URLs to allow, if needed. 6. Select "Policy applies to SELECTED roles" and select the role that remote access VPN users are assigned. If there are multiple, select each one and click "Add". 7. Click "Allow Access". 8. Click "Save Changes".
Determine if the network device is configured to present a DOD-approved banner that is formatted in accordance with DTM-08-060. Verify the remote access VPN user access sign-in notice is configured and displayed. This may or may not be the same as the admin portal. 1. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Notifications. Verify the use of the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't". 2. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Policies. 3. Click the "*/" (or whatever custom URL is used for remote access VPN user access). Under "Configure SignIn Notifications", if the "Pre-Auth Sign-in Notification" is not checked, or if the previously mentioned notification text is not assigned to this policy, this is a finding.
Configured to present a DOD-approved banner that is formatted in accordance with DTM-08-060. Configure the remote access VPN user access sign-in notice. This may or may not be the same as the admin portal. In the ICS Web UI, navigate to Authentication >> Signing In >> Sign-In Notifications. 1. Click "New Notification". 2. For name, type: "DOD Notice and Consent". 3. In the text box type the following: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: - The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. - At any time, the USG may inspect and seize data stored on this IS. - Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. - This IS includes security measures (e.g., authentication and access controls) to protect USG interests -- not for your personal benefit or privacy. - Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". 4. Click "Save Changes". 5. Go to Authentication >> Signing In >> Sign-In Policies. 6. Click the "*/" (or whatever custom URL is used for remote access VPN user access). 7. Under "Configure SignIn Notifications", check the box for "Pre-Auth Sign-in Notification" in the drop-down menu, and assign the notification titled "DOD Notice and Consent".
In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. If using the default user realm, click "User". Otherwise, click the configured user realm that will be used for user remote access VPN using DOD CAC authentication. 2. Click the "Authentication Policy" tab, then click "Limits". If the ICS does not limit the number of concurrent sessions for user accounts to "1", this is a finding.
In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. If using the default user realm, click "User". Otherwise, click the configured user realm that will be used for user remote access VPN using DOD CAC authentication. 2. Click the "Authentication Policy" tab, then click "Limits". 3. In "Maximum number of sessions per user", type the number "1". 4. Click "Save Changes".
Determine if the ICS uses TLS 1.2 to protect remote access transmissions. In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under Allowed SSL and TLS Version, verify "Accept only TLS 1.2 (maximize security)" is checked. 2. Navigate to System >> Configuration >> Outbound SSL Options. 3. Under Allowed SSL and TLS Version, verify "Accept only TLS 1.2 (maximize security)" is checked. If the ICS does not use TLS 1.2, at a minimum, this is a finding.
Configure the ICS to uses TLS 1.2 to protect remote access transmissions. In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under Allowed SSL and TLS Version, check the box for "Accept only TLS 1.2 (maximize security)". 2. Click "Save Changes". 3. Click "Proceed" for acceptance of Cipher Change. Navigate to System >> Configuration >> Outbound SSL Options. 1. Under Allowed SSL and TLS Version, check the box for "Accept only TLS 1.2 (maximize security)". 2. Click "Save Changes". 3. Click "Proceed" for acceptance of Cipher Change.
In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. Under "Select Events to Log", verify all items are checked. If the ICS must be configured to generate log records containing information investigate the events, this is a finding.
In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. 1. Under "Select Events to Log", check all items. 2. Set the standard filer. 3. Click "Add". 4. Click "Save Changes". Note: If the site uses SNMP, the configuration can be used in conjunction with this requirement which is recommended. By default, SNMP is disabled. The device only supports Simple Network Management Protocol version 3 (SNMPv3) in a DOD configuration. The device supports queries only, traps only, or both when enabling SNMP. Refer to SRG-NET-000335-VPN-001270 for configuration.
In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. View "General" tab, under Servers >> Authentication. Verify a certificate authentication server is configured. 3. View "General" tab, under Servers >> Directory/Attribute. Verify there is an entry defined. 4. View "Role Mapping" tab, under "when users meet these conditions", verify "Group" is used with the local user active directory group selected and assigned to the role that was created. If the ICS does not use DOD PKI for network access to nonprivileged accounts, this is a finding.
Configure an authentication server for the user realm. In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. In the "General" tab, under Servers >> Authentication. 3. Click "New Servers". Under "server type", select Certificate Server >> New Server. 4. Type a Name, then under User Name template type this exactly: <certAttr.altname.UPN> 5. Click "Save Changes". 6. Navigate to Authentication >> Auth Servers. 7. Click "New Servers". Under "server type", select LDAP Server >> New Server. 8. Type a name for the primary LDAP server domain. 9. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. LDAP port: 636 (this is for LDAPS). 11. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 12. Backup LDAP Port1: 636. 13. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 14. LDAP Server Type: Active Directory. 15. Connection: LDAPS. 16. Ensure "Validate Server Certificate" is checked. 17. Connection Timeout: 15. 18. Search Timeout: 60. 19. Scroll down to the bottom and click "Save Changes". Click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing, ensure that the step for Device Certificates and Trusted Server CAs were completed, as this will cause LDAPS certificate issues. 20. Under "authentication required", click the box for "Authentication required" to search LDAP. 21. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=DOD,DC=mil 22. Enter the service account's password. 23. Under "Finding user entries", add the base DN of the domain as an example format: DC=DOD,DC=mil 24. Under "filter", use this specific attribute configuration: userPrincipalName=<USER> 25. Under "group membership", add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=DOD,DC=mil 26. Under "filter", use the following: cn=<GROUPNAME> 27. Under "member attribute", use the following: member. 28. Click "Save Changes". 29. In the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 30. Under "attributes", click "New", Type: userPrincipalName, and click "Save Changes". 31. Under "groups", click "Search". In the search box, type the group name used for user logins. 32. Check the box next to the group that is found and click "Add Selected". 33. Repeat these steps for all various groups needed for various user/computer roles on the ICS system. 34. Click "Save Changes".
In the ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. View "General" tab, under Servers >> Authentication. Verify a certificate authentication server is configured. 3. View "General" tab, under Servers >> Directory/Attribute. Verify there is an entry defined. 4. View "Role Mapping" tab, under "when users meet these conditions", verify "Group" is used with the local user active directory group selected and assigned to the role that was created. If the ICS does not use DOD PKI for network access to nonprivileged accounts, this is a finding.
Configure the user realm to use DOD PKI and the site's authentication servers. A sign-in policy is then applied in accordance with the site's access configuration. The focus for this requirement is on the path so the installation of the device certificates is not included. In the ICS Web UI, navigate to Authentication >> Auth Servers. 1. Click "New Servers". Under "server type", select Certificate Server >> New Server. 2. Type a Name. Under User Name template type this exactly: <certAttr.altname.UPN> 3. Click "Save Changes". 4. Navigate to Authentication >> Auth Servers. 5. Click "New Servers". Under "server type", select LDAP Server >> New Server. 6. Type a name for the primary LDAP server domain. 7. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 8. LDAP port: 636 (this is for LDAPS). 9. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. Backup LDAP Port1: 636. 11. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 12. LDAP Server Type: Active Directory. 13. Connection: LDAPS. 14. Ensure Validate Server Certificate is checked. 15. Connection Timeout: 15. 16. Search Timeout: 60. 17. Scroll down to the bottom and click "Save Changes". Click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing, ensure that the step for Device Certificates and Trusted Server CAs were completed as this will cause LDAPS certificate issues. 18. Under authentication required, click the box for Authentication required to search LDAP. 19. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=DOD,DC=mil 20. Enter the service account's password. 21. Under "Finding user entries", add the base DN of the domain as an example format: DC=DOD,DC=mil 22. Under "filter", use this specific attribute configuration: userPrincipalName=<USER> 23. Under "group membership", add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=DOD,DC=mil 24. Under "filter", use the following: cn=<GROUPNAME> 25. Under "member attribute", use the following: member. 26. Click "Save Changes". 27. Now back in the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 28. Under "attributes", click "New", Type: userPrincipalName, and click "Save Changes". 29. Under "groups", click "Search". In the search box, type the group name used for user logins. 30. Check the box next to the group that is found and click "Add Selected". 31. Repeat these steps for all various groups needed for various user/computer roles on the ICS system. In the ICS Web UI, navigate to Users >> Users Realms. 1. Click the user realm being used for remote access VPN logins. 2. Under "servers", go to "Authentication" and select the certificate authentication realm created that included the customized User template of <certAttr.altname.UPN>. 3. Under "Directory/Attribute", select the previously created LDAP server. 4. Check the box for "Enable dynamic policy evaluation". 5. Check both the "Refresh roles" and "refresh resource policies". 6. Click "Save Changes". 7. Go to the "Role Mapping" tab. 8. Click "New Rule". 9. Select "Rule based on Group Membership" and click "Update". 10. Type a name for this rule. 11. Select "is". 12. Type the group name exactly as it appears as the CN LDAP attribute. 13. Select the role needed for these VPN logins. 14. Click "Save Changes".
In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click the first DOD client CA. 2. Verify the item "Use OCSP with CRL fallback" is selected under the "Client certificate status checking" setting. 3. Check each client certificate CA. Verify the setting "Use OCSP with CRL fallback" is selected. For PKI-based authentication, if the ICS does not validate certificates by constructing a certification path (which includes revocation status information) to an accepted trust anchor, this is a finding.
Configure status checking on the ICS. The focus for this requirement is on the path, so the installation of the device certificates is not included. In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click the first DOD client CA. 2. Enable "Use OCSP with CRL fallback" under "Client certificate status checking". 3. Repeat these steps for every remaining client certificate CA.
Verify the user role being used for CAC/PKI token VPN client logins is configured with a session timeout. In the ICS Web UI, navigate to Administrators >> Users Roles >> User Roles. 1. Click the configured user role being used for CAC/PKI token VPN client logins. 2. Click the "Session Options" tab. In the "Session Lifetime" section, if Idle Timeout is not set to "10", this is a finding.
Configure the user role being used for CAC/PKI token VPN client logins with a session timeout. In the ICS Web UI, navigate to Administrators >> Users Roles >> User Roles. 1. Click the configured user role being used for CAC/PKI token VPN client logins. 2. Click the "Session Options" tab. 3. In the "Session Lifetime" section, set the Idle Timeout to "10". 4. Click "Save Changes".
Verify user access log events are being sent to the central log server. In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. 1. Under "Select Events to Log", verify all items are checked. 2. Under "Syslog Servers", verify redundant server name/IP address, facility of LOCAL0, type TLS, and the source interface are defined. If the ICS must be configured to send admin log data to redundant central log server, this is a finding.
Direct user access log events to the central log server. In the ICS Web UI, navigate to System >> Log/Monitoring >> User Access >> Settings. 1. Under "Select Events to Log", check all items. 2. Under "Syslog Servers", add an IP address/server name/IP. 3. Set the facility to "LOCAL0". 4. Set type to "TLS". 5. If a client cert is required for the syslog server, select the client certificate to use for the syslog traffic. If none exists, import the DOD-signed client key pair to the ICS under System >> Configuration >> Certificates >> Client Auth Certificates. 6. Set the standard filer. 7. Set the source interface as either the management or internal interface. 8. Click "Add". 9. Click "Save Changes". 10. Repeat these steps to add a redundant syslog server for user log events.
If SNMP is used, verify the configuration is compliant. If SNMP is not used, this is not a finding. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. 1. Under "Agent Properties", verify "SNMP Traps" is checked. 2. Under "SNMP Version data", verify "v3" is selected. 3. Under "User 1", verify a user configuration in AuthPriv is using at least SHA and CFB-AES-128. 4. Verify "Optional Traps Critical and Major Log Events" are checked. 5. Verify the SNMP server IPv4/IPv6 address is configured under "SNMP Trap Servers". If SNMP is incorrectly configured, this is a finding.
Event logs are also updated to local logs by default in addition to the central syslog server. However, if the site uses SNMP, the following must be configured since SNMP is disabled by default. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. 1. Under "SNMP Version data", select "v3". 2. Under "Agent Properties", check "SNMP Traps". 3. Under "Agent Properties", configure a System Name, Location, and Contact. 4. Under "User 1", type in a valid username. Select "AuthPriv". - The auth protocol must be set to at least SHA. Type the Auth Password. - The priv protocol must be set to at least CFB-AES-128. Type in the priv password. 5. Under "Trap Thresholds", ensure "Check Frequency" is 180 seconds, "Log Capacity" is 75%, "Users" is 100%, "Physical Memory" is 0%, "Swap Memory" is 0%, "Disk" is 75%, "CPU" is 0%, and "Meeting Users" is 100%. 6. Under "Optional Traps", check the boxes for "Critical and Major Log Events". 7. Under "SNMP Trap Servers", configure an IPv4/IPv6 address for the valid trap server/receiver, type in the port (default is 162), and select the user to use (use the user from step #4 above).
Verify client certificates are installed and assigned to applicable user/computer realm to enable client authentication for all remote clients. In the Ivanti ICS Web UI, navigate to Users >> User Realms >> User Realms. 1. Click the user realm that is currently being used on the ICS for standard remote access VPN logins. 2. In the "General" tab, under Servers >> Authentication, verify it is defined with a certificate authenticate server. 3. In the "General" tab, under Servers >> Directory/Attribute, verify "none" is not displayed. 4. In the "Role Mapping" tab, under "when users meet these conditions", verify "Group" must be used, and the local site's administrator active directory group must be selected and assigned to the role that was created. If the ICS is not configured to authenticate all client devices before establishing a connection, this is a finding.
Configure client certificates and enable them on an appropriate user/computer realm to enable client authentication. In the Ivanti ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Server CAs. 1. Click "Import Trusted Server CAs". 2. Import the Active Directory root CA certificate by clicking "Browse", selecting the certificate file, and clicking "Import Certificate". 3. Repeat these steps for the intermediate CA certificate. NOTE: these certificates could be DOD-signed CA certificates, or they could be internal private CA certificates. Import certificates based on the use case of the site. In the Ivanti ICS Web UI, navigate to System >> Configuration >> Certificates >> Trusted Client CAs. 1. Click "Import CA Certificate". 2. Import the DOD Client CAC root CA certificate by clicking "Browse", selecting the certificate file, and clicking "Import Certificate" (e.g., "DOD Root CA 3"). 3. Repeat these steps for the intermediate/issuing CAC CA certificate (e.g., "DOD ID CA 59"). 4. Repeat these steps for each intermediate CAC CA certificate. 5. Click the Root CA certificate that was imported. 6. Under client certificate status checking, ensure the following is set: - Use OCSP with CRL Fallback. - "Trusted for client Authentication" must be checked. 7. Optionally, if the network the site is in must use a local OCSP repeater/responder, go to OCSP settings. Otherwise, move on to the Device Certificates. 8. Click "OSCP options". Use "Manually Configured" responders. 9. Enter the URL for the primary and backup OCSP responder. 10. Optionally, if the OCSP responder requires request signing and nonce usage, select those here. In the Ivanti ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates. 1. Click "New CSR". 2. Under Common Name, ensure this has the FQDN for the ICS server, then fill out all other items. 3. If using RSA, select "2048". If using ECC, select "P-384". IMPORTANT NOTE: If the remote access VPN is carrying classified data, the certificate and key being used by ICS MUST be an ECC P-384 key pair. 4. Click "Create CSR". Export the CSR and import it into the DOD site's Registration Authority (RA). Ensure that Subject Alternative Names (SANs) are created for all FQDNs, server names, and cluster names on the web enrollment form. 5. Once the certificate is approved, download it and import it in this same section of the ICS. In the Ivanti ICS Web UI, navigate to Authentication >> Auth Servers 1. Click "New Servers". Under "server type", select Certificate Server >> New Server. 2. Type a Name. Under User Name template type this exactly: <certAttr.altname.UPN> 3. Click "Save Changes". 4. Navigate to Authentication >> Auth Servers. 5. Click "New Servers". Under "server type", select LDAP Server >> New Server. 6. Type a name for the primary LDAP server domain. 7. LDAP server: the FQDN of the server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 8. LDAP port: 636 (this is for LDAPS). 9. Backup LDAP Server1: the FQDN of the secondary server (an IP address may cause an error as the LDAP server certificate might not have an IP in the SAN field). 10. Backup LDAP Port1: 636. 11. If a third LDAP server is needed, add this and the port info under Backup LDAP Server2 and Backup LDAP Port2. 12. LDAP Server Type: Active Directory. 13. Connection: LDAPS. 14. Ensure Validate Server Certificate is checked. 15. Connection Timeout: 15. 16. Search Timeout: 60. 17. Scroll down to the bottom and click "Save Changes". Click "Test Settings" to ensure valid communications are possible. NOTE: If there are failures in this testing ensure that the step for Device Certificates and Trusted Server CAs were completed, as this will cause LDAPS certificate issues. 18. Under authentication required, click the box for "Authentication required" to search LDAP. 19. Enter the service account's Admin DN using this as an example format: CN=PCS.SVC,OU=IVANTI,DC=DOD,DC=mil 20. Enter the service account's password. 21. Under "Finding user entries", add the base DN of the domain as an example format: DC=DOD,DC=mil 22. Under "filter", use this specific attribute configuration: userPrincipalName=<USER> 23. Under "group membership", add the base DN of where admin users that will access, using this as an example format: OU=IVANTI,DC=DOD,DC=mil 24. Under "filter", use the following: cn=<GROUPNAME> 25. Under "member attribute", use the following: member 26. Click Save "Changes". 27. Now back in the same LDAP server configuration screen, scroll down and click the "Server Catalog" hyperlink. 28. Under "attributes", click "New", Type: userPrincipalName, and click "Save Changes". 29. Under "groups", click "Search". In the search box, type the group name used for admin logins. 30. Check the box next to the group that is found and click "Add Selected". 31. Repeat these steps for all various groups needed for various roles on the ICS system. For example, groups for auditors, ISSOs, NOC, SOC, Viewer, etc. 32. Click "Save Changes". In the Ivanti ICS Web UI, navigate to Users >> Users Realms. 1. Click the user realm being used for remote access VPN logins. 2. Under "servers", go to "Authentication" and select the certificate authentication realm created that included the customized User template of <certAttr.altname.UPN>. 3. Under "Directory/Attribute", select the previously created LDAP server. 4. Check the box for "Enable dynamic policy evaluation". 5. Check both the "Refresh roles" and "refresh resource policies". 6. Click "Save Changes". 7. Go to the "Role Mapping" tab. 8. Click "New Rule". 9. Select "Rule based on Group Membership" and click "Update". 10. Type a name for this rule. 11. Select "is". 12. Type the group name exactly as it appears as the CN LDAP attribute. 13. Select the role needed for these VPN logins. 14. Click "Save Changes". In the Ivanti ICS Web UI, navigate to Authentication >> Sign-in >> Sign-in Policies. 1. Create a New URL or edit the */ URL (depending on the site). NOTE: it is recommended to create a new sign-in URL until this configuration is fully tested to ensure there is still web UI reachability in the troubleshooting process. 2. Under authentication realm, click the "User picks from a list of authentication realms". 3. Click "Save Changes". Test and verify the connection with CAC/Alt Token and LDAPS by attempting a remote access VPN web UI login using the token or CAC and entering the sign-in URL. Once successful, the user will click on the ICS client for completing the login connection.
If the ICS VPN Gateway is not being used to carry classified data (e.g., Secret, Top Secret, etc.), this is Not Applicable. 1. Navigate to System >> Configuration >> Inbound SSL Options. Verify that under "Allowed Encryption Strength", if "SuiteB - Accept only SuiteB ciphers" is checked. 2. Navigate to System >> Configuration >> Certificates >> Device Certificates. Verify the certificate being used by the ICS is an ECC P-384 Public Key. If the ICS is not configured to use only SuiteB ciphers with ECC P-384 keys for transporting classified traffic, this is a finding.
In the ICS Web UI, navigate to System >> Configuration >> Certificates >> Device Certificates. 1. Click "New CSR". 2. Add a Common Name in FQDN format. 3. Add a Country code of "US". 4. Under key type, select "ECC". 5. Under the key length, select "P-384". 6. Click "Create CSR". 7. Copy the Base 64/PEM encoded certificate request that is shown on the screen and paste it to a text file. Ensure the file has the file suffix of .csr. 8. Go through the local RA process for DOD Web Server certificate requests. Ensure that SANs are added to the certificate by the issuing CA to include the hostname, cluster names, and all FQDNs. 9. Once the certificate is provided by the CA, go to System >> Configuration >> Certificates >> Device Certificates. 10. Click "Browse" and select the certificate file issued by the CA. Then click "Import". 11. Click "Save Changes". 12. Click on the imported certificate. 13. On the "Internal Port", click "add" for the cluster internal VIP and <Internal Port>. 14. On the "External Port" click "add" for the cluster external VIP and <External Port>. 15. Check the box for "Management Port". 16. Under "Certificate Status Checking", click the box for "Use CRLs". 17. Click "Save Changes". In the ICS Web UI, navigate to System >> Configuration >> Inbound SSL Options. 1. Under "Allowed Encryption Strength", click "SuiteB - Accept only SuiteB ciphers". 2. Click "Save Changes" and accept the cipher suite changes.
In the ICS Web UI, navigate to Users >> Resource Policies >> Split Tunneling Networks. If there are any split-tunnel network policies, this is a finding.
In the ICS Web UI, navigate to Users >> Resource Policies >> Split Tunneling Networks. 1. If there are any split-tunnel network policies configured, select all of them and delete them. 2. If the split tunneling policies are needed for debugging or testing only, ensure the role being applied is only for the debugging or test group.
In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. Under "User 1", if a user configuration in AuthPriv is not using at least SHA and CFB-AES-128, this is a finding.
Only the relevant portion of the SNMP configuration is highlighted here. In the ICS Web UI, navigate to System >> Log/Monitoring >> SNMP. 1. Under "User 1", type in a valid username. Select "AuthPriv". The priv protocol must be set to at least CFB-AES-128. 2. Type in the priv password.