Remote Access Server STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- H
- CCI
- Version
- NET0230
- Vuln IDs
-
- V-3012
- Rule IDs
-
- SV-3012r6_rule
Checks: C-3456r1_chk
Interview the network administrator and attempt to logon to several devices.
Fix: F-3037r2_fix
Ensure all communication devices are in compliance with password policy.
- RMF Control
- Severity
- M
- CCI
- Version
- NET0340
- Vuln IDs
-
- V-3013
- Rule IDs
-
- SV-3013r11_rule
Checks: C-3474r4_chk
Review the device configuration or request that the administrator to login to the device and observe the terminal. Verify that either Option A or Option B (for systems with sever character limitations) of the Standard Mandatory DoD Notice and Consent Banner is displayed at log. The required banner verbiage follows and must be displayed verbatim: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. If the system is incapable of displaying the required banner verbiage due to its size, a smaller banner must be used. The mandatory verbiage follows: “I've read & consent to terms in IS user agreem't. .
Fix: F-3038r4_fix
Configure all management ports and interfaces to the network device to display the DoD mandated warning banner verbiage at login regardless of the means of connection or communication. The required banner verbiage that must be displayed verbatim is as follows: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. If the system is incapable of displaying the required banner verbiage due to its size, a smaller banner must be used. The mandatory verbiage follows: “I've read & consent to terms in IS user agreem't.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-RAS-030
- Vuln IDs
-
- V-19843
- Rule IDs
-
- SV-22006r1_rule
Checks: C-7468r1_chk
Visually inspect location of modems to determine compliance.
Fix: F-7662r1_fix
Ensure that all modems are physically protected.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-RAS-010
- Vuln IDs
-
- V-19844
- Rule IDs
-
- SV-22007r1_rule
Checks: C-25068r1_chk
Review the configuration for the RAS. Verify that PPP is used as the communication protocol that enables a remote computer to connect to a network over standard asynchronous serial lines.
Fix: F-20518r1_fix
Ensure the RAS is configured to accept only communications protocols that use an accepted method of encryption to authenticate the remote node (e.g. CHAP with MD5 or MS-CHAP with MD4).
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-RAS-020
- Vuln IDs
-
- V-19845
- Rule IDs
-
- SV-22008r2_rule
Checks: C-25069r1_chk
Review the configuration for the RAS . Verify use of an approved encryption algorithm if PPP is used for remote access.
Fix: F-20519r1_fix
Ensure that an accepted method of encryption to authenticate the remote node is used (e.g. CHAP with MD5 or MS-CHAP with MD4).
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-RAS-040
- Vuln IDs
-
- V-19846
- Rule IDs
-
- SV-22009r1_rule
Checks: C-25070r1_chk
Request that the IAO/NSO provide the list for visual inspection.
Fix: F-20520r1_fix
Ensure an accurate listing of all RAS modems is maintained.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-RAS-050
- Vuln IDs
-
- V-19847
- Rule IDs
-
- SV-22010r2_rule
Checks: C-25071r1_chk
To verify, check the configuration of the RAS or the remote access policy server.
Fix: F-20521r1_fix
Ensure that if callback procedures are used, then upon establishment of the callback connection, the communications device will require the user to authenticate to the system.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-RAS-060
- Vuln IDs
-
- V-19848
- Rule IDs
-
- SV-22011r2_rule
Checks: C-25072r1_chk
Inspect the configuration of the RAS dial-up lines by using the RAS configuration screens. Verify the modem lines are configured for single line operation and multiplexing is not selected as an option available to the user or the system.
Fix: F-20522r1_fix
Ensure that all modem lines are restricted to single line operation.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-RAS-080
- Vuln IDs
-
- V-19849
- Rule IDs
-
- SV-22012r2_rule
Checks: C-25073r1_chk
Interview the network administrator. Verify the modem lines are configured as required with no special features.
Fix: F-20523r1_fix
Ensure that all modem lines are not configured to allow users to use special calling features.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-RAS-090
- Vuln IDs
-
- V-19850
- Rule IDs
-
- SV-22013r1_rule
Checks: C-25074r1_chk
Interview the network administrator. Verify the modem lines are configured as required.
Fix: F-20524r1_fix
Ensure all modem lines are not configured to assign either dial-in or dial-out usage for each line but not both.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-RAS-070
- Vuln IDs
-
- V-19851
- Rule IDs
-
- SV-22014r2_rule
Checks: C-25075r1_chk
Interview the IAO and ask to see a copy of the logs.
Fix: F-20525r2_fix
Maintain and review call logs. Audit records should be stored for a period of 1 year.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-NET-060
- Vuln IDs
-
- V-21529
- Rule IDs
-
- SV-23743r1_rule
Checks: C-23370r1_chk
Inspect the configuration of the VPN or RAS gateway and verify that it is does not provide NAT services to the remote access end points.
Fix: F-22325r1_fix
Ensure that the remote access gateway is not configured to provide NAT services for remote access connections.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-010
- Vuln IDs
-
- V-21538
- Rule IDs
-
- SV-23753r1_rule
Checks: C-25810r1_chk
Review the PKI certificate menu in the device configuration to see if DoD PKI has been implement. The certificate used with contain "DoD". If a certificate is used but it is not DoD-approved, this as a finding.
Fix: F-22328r1_fix
If PKI is used for DEVICE authentication then ensure that a DoD approved certificate is installed. If the device does not have the option to replace the default manufacturer certificate, then the product should be replaced.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-020
- Vuln IDs
-
- V-21540
- Rule IDs
-
- SV-23755r1_rule
Checks: C-25813r1_chk
Ask if digital certificates are generated by the remote access gateway for device authentication. Examine the authentication configuration using the management interface of the remote access gateway. Verify that the key length and hashing algorithm used conform to DoD requirements.
Fix: F-19932r1_fix
If digital certificates are generated by the remote access solution for device authentication, then the key length and hashing algorithm used must conform to DoD requirements.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-NET-030
- Vuln IDs
-
- V-21541
- Rule IDs
-
- SV-23759r1_rule
Checks: C-25814r1_chk
Work with the system administrator to verify that device authentication is implemented. Also, verify that mutual authentication between the remote access gateway and the endpoint is implemented.
Fix: F-22329r1_fix
Ensure device authentication and mutual authentication between the remote access gateway and the endpoint is implemented.
- RMF Control
- Severity
- H
- CCI
- Version
- SRC-NET-040
- Vuln IDs
-
- V-21582
- Rule IDs
-
- SV-23841r2_rule
Checks: C-25850r1_chk
View the vendor documentation or device configuration to verify that the device is capable of generating certificate-signing requests and using DoD-approved PKI digital certificates when available.
Fix: F-19145r1_fix
Ensure all devices which provide remote access services are capable of generating certificate-signing requests and using DoD-approved PKI digital certificates when available.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-050
- Vuln IDs
-
- V-21583
- Rule IDs
-
- SV-23842r1_rule
Checks: C-25851r1_chk
Verify that an authentication server is required to access the remote access server by reviewing the currently running configuration. The remote access server will be configured to redirect user authentication requests to the authentication server.
Fix: F-19146r1_fix
The system administrator will configure the TACACS+, Radius or Diameter server with remote access accounts and user passwords. The remote access server will be configured to redirect user authentication requests to the authentication server.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-070
- Vuln IDs
-
- V-21584
- Rule IDs
-
- SV-23843r1_rule
Checks: C-25852r1_chk
Review the remote access gateway (RAS or VPN) configuration. Verify that resources and priviledges are assigned to groups not individual users. Verify that the user groups are defined on the authentication server unless not technologically feasible.
Fix: F-22354r1_fix
Ensure the default network access control policy is modified to restrict remote access based on group policy rather than configured for each individual user.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-080
- Vuln IDs
-
- V-21585
- Rule IDs
-
- SV-23844r1_rule
Checks: C-25853r1_chk
Work with the SA to examine the RAS. Verify the setting for the number of concurrent end user remote sessions is not set to a value which means unlimited. Value set should be reasonable based on local policy.
Fix: F-22355r1_fix
Ensure the setting for the number of conncurrent end user remote sessions is set to a resonable value and is not unlimited.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-090
- Vuln IDs
-
- V-21586
- Rule IDs
-
- SV-23845r2_rule
Checks: C-25854r1_chk
Work with the SA to examine the policies for the host integrity setting. Ensure there are settings and policies applicable to the listed compliance areas. Verify the following settings: - Sensitivity of information accessed such as public, non-public, administrator, classified; - Authentication method used (PKI, password, open); - User identification and authorization; - Type of user such as mobile, teleworker from home, remote DoD site enclave user, or contractor site; - Endpoint type and location (laptop, PDA, virtual, managed/unmanaged; - Other (browser type, day/time, accessed resource type).
Fix: F-22356r1_fix
Ensure remote access host integrity check is compliant.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-100
- Vuln IDs
-
- V-21587
- Rule IDs
-
- SV-23846r1_rule
Checks: C-25855r1_chk
Interview the site representative and review network or operating system SRR or self-assessment documentation.
Fix: F-19952r1_fix
Ensure remote users do not have permissions to access databases, files, and configuration management applications resident on the remote access gateway.