Remote Access VPN STIG
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-NET-060
- Vuln IDs
-
- V-21529
- Rule IDs
-
- SV-23743r1_rule
Checks: C-23370r1_chk
Inspect the configuration of the VPN or RAS gateway and verify that it is does not provide NAT services to the remote access end points.
Fix: F-22325r1_fix
Ensure that the remote access gateway is not configured to provide NAT services for remote access connections.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-010
- Vuln IDs
-
- V-21538
- Rule IDs
-
- SV-23753r1_rule
Checks: C-25810r1_chk
Review the PKI certificate menu in the device configuration to see if DoD PKI has been implement. The certificate used with contain "DoD". If a certificate is used but it is not DoD-approved, this as a finding.
Fix: F-22328r1_fix
If PKI is used for DEVICE authentication then ensure that a DoD approved certificate is installed. If the device does not have the option to replace the default manufacturer certificate, then the product should be replaced.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-020
- Vuln IDs
-
- V-21540
- Rule IDs
-
- SV-23755r1_rule
Checks: C-25813r1_chk
Ask if digital certificates are generated by the remote access gateway for device authentication. Examine the authentication configuration using the management interface of the remote access gateway. Verify that the key length and hashing algorithm used conform to DoD requirements.
Fix: F-19932r1_fix
If digital certificates are generated by the remote access solution for device authentication, then the key length and hashing algorithm used must conform to DoD requirements.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-NET-030
- Vuln IDs
-
- V-21541
- Rule IDs
-
- SV-23759r1_rule
Checks: C-25814r1_chk
Work with the system administrator to verify that device authentication is implemented. Also, verify that mutual authentication between the remote access gateway and the endpoint is implemented.
Fix: F-22329r1_fix
Ensure device authentication and mutual authentication between the remote access gateway and the endpoint is implemented.
- RMF Control
- Severity
- H
- CCI
- Version
- SRC-NET-040
- Vuln IDs
-
- V-21582
- Rule IDs
-
- SV-23841r2_rule
Checks: C-25850r1_chk
View the vendor documentation or device configuration to verify that the device is capable of generating certificate-signing requests and using DoD-approved PKI digital certificates when available.
Fix: F-19145r1_fix
Ensure all devices which provide remote access services are capable of generating certificate-signing requests and using DoD-approved PKI digital certificates when available.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-050
- Vuln IDs
-
- V-21583
- Rule IDs
-
- SV-23842r1_rule
Checks: C-25851r1_chk
Verify that an authentication server is required to access the remote access server by reviewing the currently running configuration. The remote access server will be configured to redirect user authentication requests to the authentication server.
Fix: F-19146r1_fix
The system administrator will configure the TACACS+, Radius or Diameter server with remote access accounts and user passwords. The remote access server will be configured to redirect user authentication requests to the authentication server.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-070
- Vuln IDs
-
- V-21584
- Rule IDs
-
- SV-23843r1_rule
Checks: C-25852r1_chk
Review the remote access gateway (RAS or VPN) configuration. Verify that resources and priviledges are assigned to groups not individual users. Verify that the user groups are defined on the authentication server unless not technologically feasible.
Fix: F-22354r1_fix
Ensure the default network access control policy is modified to restrict remote access based on group policy rather than configured for each individual user.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-080
- Vuln IDs
-
- V-21585
- Rule IDs
-
- SV-23844r1_rule
Checks: C-25853r1_chk
Work with the SA to examine the RAS. Verify the setting for the number of concurrent end user remote sessions is not set to a value which means unlimited. Value set should be reasonable based on local policy.
Fix: F-22355r1_fix
Ensure the setting for the number of conncurrent end user remote sessions is set to a resonable value and is not unlimited.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-090
- Vuln IDs
-
- V-21586
- Rule IDs
-
- SV-23845r2_rule
Checks: C-25854r1_chk
Work with the SA to examine the policies for the host integrity setting. Ensure there are settings and policies applicable to the listed compliance areas. Verify the following settings: - Sensitivity of information accessed such as public, non-public, administrator, classified; - Authentication method used (PKI, password, open); - User identification and authorization; - Type of user such as mobile, teleworker from home, remote DoD site enclave user, or contractor site; - Endpoint type and location (laptop, PDA, virtual, managed/unmanaged; - Other (browser type, day/time, accessed resource type).
Fix: F-22356r1_fix
Ensure remote access host integrity check is compliant.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-NET-100
- Vuln IDs
-
- V-21587
- Rule IDs
-
- SV-23846r1_rule
Checks: C-25855r1_chk
Interview the site representative and review network or operating system SRR or self-assessment documentation.
Fix: F-19952r1_fix
Ensure remote users do not have permissions to access databases, files, and configuration management applications resident on the remote access gateway.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-VPN-010
- Vuln IDs
-
- V-21588
- Rule IDs
-
- SV-23847r1_rule
Checks: C-25856r1_chk
Interview the IAO and examine the configuration of a VPN client.
Fix: F-22357r1_fix
Implement tunnel-all mode.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-VPN-020
- Vuln IDs
-
- V-21589
- Rule IDs
-
- SV-23848r1_rule
Checks: C-25857r1_chk
Visually inspect the VPN gateway to verify that the VPN device is configured. NOTE: The VPN device will be configured with two interfaces. Remote users use the external interface while internal communications are sent using the internal interface.
Fix: F-22358r1_fix
Ensure the VPN gateway is configured with two interfaces and does not allow direct communication.
- RMF Control
- Severity
- M
- CCI
- Version
- SRC-VPN-030
- Vuln IDs
-
- V-21590
- Rule IDs
-
- SV-23849r1_rule
Checks: C-25858r1_chk
Verify by inspecting the configuration of the firewall or the remote access gateway. Verify the TLS protocol is used.
Fix: F-22359r1_fix
Ensure that remote access gateway and the clients is using a secure protocol.
- RMF Control
- Severity
- L
- CCI
- Version
- SRC-VPN-040
- Vuln IDs
-
- V-21591
- Rule IDs
-
- SV-23850r1_rule
Checks: C-25859r1_chk
Inpect the configuration by viewing the VPN configuration screen in the management workstaion. Verify the VPN attributes are compliant. NOTE: The channel will be configured for phase one IKE exchange type. Additionally the following have not been configured: FIPS 140-2 encryption algorithm (e.g., AES); Integrity protection algorithm is FIPS compliant (e.g., HMAC-SHA-1); and the Authentication method will be digital signatures or PKI.
Fix: F-22360r1_fix
Ensure tthe IPSEC VPN is configured as requried by the policy.