Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Verify that RiOS provides automated support for account management. Navigate to the device Management Console Navigate to: Configure >> Security >> User Permissions Verify user permissions are defined here. If the account management is not set, this is a finding.
Configure RiOS account management functions. Navigate to the device Management Console, then Navigate to: Configure >> Security >> User Permissions Set values for the user account. Click "Save" to save these settings permanently.
Verify RiOS is configured to protect the confidentiality and integrity of system information at rest. Navigate to the Device Management Console Set the "Username" to "admin" Set the "Password" to "password" Click "Log In" If login occurs and administrative access is allowed, this is a finding.
Configure RiOS to protect the confidentiality and integrity of system information at rest. Navigate to the Device Management Console Set the "Username" to "admin" Set the "Password" to "password" Click "Log In" Navigate to Configure >> My Account Select "Change Password" Enter new password in "New Password:" Enter new password in "Confirm New Password" Click "Apply" Navigate to the top right of the screen and click "Logout" to exit the current session Navigate to the Device Management Console Set the "Username" to "admin" Set the "Password" to the new password Click "Log In" Verify that the administrator obtains access to the Device Management Console Home Page Navigate to the top right of the screen and click "Logout" to exit the current session
Verify that RiOS is configured to the assigned privilege level for each administrator. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Verify the privilege level values for Shark and Monitor If all privileges for the Shark and Monitor accounts are not set to Deny, this is a finding.
Configure RiOS to enforce assigned privilege level for each administrator in accordance with site documented requirements. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Remove all values of "Roles and Permissions" for the Monitor and Shark accounts Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to generate a log event for account creation events. Create an account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user creation action exists in the event log, this is a finding.
Configure RiOS to generate a log event for account creation events. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info
Verify that RiOS is configured to generate a log event for account creation events. Create an account Modify this user account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user creation action exists in the event log, this is a finding.
Configure RiOS to generate a log event for account creation events. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" (The actual level for these messages is Notifications; however, other settings in this STIG call for the Info level and only one can be selected.)
Verify that RiOS is configured to generate a log event for account creation events. Create an account To disable an account Navigate to the device Management Console, then Navigate to: Configure >> Security >> User >> Permissions Deselect Enable Account Click "Apply" Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click Go Delete the account that was created If no event record for the user disabling action exists in the event log, this is a finding.
Configure RiOS to generate a log event for account disabling actions. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" Under Configuration, set minimum severity to Info.
Verify that RiOS is configured to generate a log event for account creation events. Create an account To disable an account Navigate to the device Management Console, then Navigate to: Configure >> Security >> User >> Permissions Select the account to be removed Click Remove Selected Account Navigate to the device Management Console, then Navigate to: Reports >> Diagnostics >> System Logs Enter the account name into the filter and click "Go" Delete the account that was created. If no event record for the user removal action exists in the event log, this is a finding.
Configure RiOS to generate a log event for account disabling actions. Navigate to the device Management Console, then Navigate to: Configure >> System Settings >> Logging Under Configuration, set minimum severity to Info Click "Save" Under Configuration, set minimum severity to Info.
Verify that RiOS captures an SNMP trap for user creation events that can be sent to the ISSO and designated administrators by the SNMP server. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Verify that an SMTP Server is defined Verify that an SMTP Port is defined Verify that "Report Events via Email" is checked and that at least one email address is defined Verify that "Report Failures via Email" is checked and that at least one email address is defined If an email for the ISSO and the system administrator accounts are not defined, this is a finding.
Configure RiOS to capture an SNMP trap for user creation events that can be sent to the ISSO and designated administrators by the SNMP server. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Enter an SMTP Server name Enter n SMTP Port number Check "Report Events via Email" and enter at least one email address Check "Report Failures via Email" and enter at least one email address
Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.
Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to v3 Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to SHA SHA Key: <enter the SHA key> Set "Security Level:" to Auth/Priv Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.
Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.
Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to v3 Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to SHA SHA Key: <enter the SHA key> Set "Security Level:" to Auth/Priv Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.
Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.
Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to "v3" Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to "SHA" SHA Key: <enter the SHA key> Set "Security Level:" to Auth/Priv Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.
Verify that RiOS is configured to the assigned privilege level for each administrator. Navigate to the device CLI Type: show rbm users Verify that the privilege level is correct for each administrator -- or -- Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Verify that the privilege level is correct for each administrator If the privilege level settings are not in accordance with applicable policy, this is a finding.
Configure RiOS to enforce assigned privilege level for each administrator. Navigate to the device CLI Type: rbm user <username> role <role> permissions <permissions> Set the value of username, role, and permissions according to the privilege level of the applicable policy Type: write memory to save the current configuration settings to memory -- or -- Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Set the values of 'Roles and Permissions' according to the privilege level in accordance with applicable policy Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory
Verify the device generates a log event when commands are executed. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Under Logging Configurations, verify Minimum Severity is set to Info If the Standard Mandatory DoD Notice and Consent Banner does not exist on this page, this is a finding.
Since all commands on the device are privileged commands, the following command ensures execution of commands are sent to the Syslog Server. Navigate to the Device Management Console Navigate to Configure >> System Settings >> Logging Under "Remote Log Servers", click "Add a New Log Server" Enter the server IP address Under Logging Configurations >> Minimum Severity, select "Info" Click "Add" Add an IP and Minimum Severity level for the backup Syslog server.
Verify that RiOS is configured to limit the number of invalid logon attempts during a 15 minute period to 3. Login to the device console to access the command line interface (CLI) Type: show authentication policy Verify that "Maximum unsuccessful logins before account lockout:" is set to "3" Verify that "Wait before account unlock:" is set to "900" seconds If "Maximum unsuccessful logins before account lockout" is not set to "3" and/or "Wait before account unlock" is not set to "900" seconds, this is a finding.
Configure RiOS to limit the number of invalid logon attempts to 3 during a 15 minute period. Login to the device console to access the command line interface (CLI) Type: enable Type: conf t Type: authentication policy template strong Scroll down to "Maximum unsuccessful logins before account lockout:" and type "3" Under "Wait before account unlock:" and type "900" Seconds Type: write memory
Verify that RiOS is configured to limit the number of invalid logon attempts during a 15 minute period to 3. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Login Attempts Before Lockout:" is set to "3" Verify that "Timeout for User Login After Lockout (seconds)" is set to "900" If "Login Attempts Before Lockout" is not set to "3" and/or "Timeout for User Login After Lockout (seconds)" is not set to "900", this is a finding.
Configure RiOS to limit the number of invalid logon attempts to 3 during a 15 minute period. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Login Attempts Before Lockout:" to "3" Set the value of "Timeout for User Login After Lockout (seconds);" to "900" Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to limit the number of unsuccessful login attempts during a 15-minute period to 3. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Login Attempts Before Lockout:" is set to "3" Verify that "Timeout for User Login After Lockout (seconds)" is set to "900" If "Login Attempts Before Lockout" is not set to "3" and/or "Timeout for User Login After Lockout (seconds)" is not set to "900", this is a finding.
Configure RiOS to limit the number of unsuccessful login attempts to 3 during a 15-minute period. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Login Attempts Before Lockout:" to "3" Set the value of "Timeout for User Login After Lockout (seconds);" to "900" Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device. Navigate to the device Management Console Navigate to Configure >> System Settings >> Announcements Verify that the Standard Mandatory DoD Notice and Consent Banner is contained in the Logon Message If the Standard Mandatory DoD Notice and Consent Banner does not exist on this page, this is a finding.
Configure RiOS to display the Standard Mandatory DoD Notice and Consent Banner. Navigate to the Device Management Console Navigate to Configure >> System Settings >> Announcement Cut and past the DoD banner into the Logon Message box: You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. Click "Apply" to save the changes Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to limit the number of concurrent sessions to one (1) for each administrator account and/or administrator account type. This requirement does not apply to the Admin account. Navigate to the device CLI Type: enable Type: show username <user-other-than-admin> detailed Verify that "Maximum Logins" is set to "1" If "Maximum Logins" is not set to "1", this is a finding.
Configure the number of concurrent sessions to an organization define number for each administrator account and/or administrator type account. Navigate to the device CLI Type: enable Type: conf t Type: authentication policy user <user name> max-logins 1 Type: write memory Settings are now saved to memory.
Verify that RiOS is configured to terminate a network administrator's session after a trigger event such as inactivity timeout. Navigate to the device CLI Type: enable Type: show web Verify that "Inactivity Timeout:" is set to the organizations defined condition If no triggers are required by the organization, this is a finding.
Configure RiOS to automatically terminate a network administrator's session after a trigger event such as an inactivity timeout. Navigate to the device CLI Type: enable Type: conf t Type: web auto-logout <organization defined condition in minutes> Type: write memory Type: exit Type: show web Verify that "Inactivity Timeout:" represents the value entered above. Type: exit
Verify that RiOS is configured to generate audit records containing the full-text recording of privileged commands Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Verify that "Minimum Severity" is set to "info" If the "Minimum Severity" is not set to "info", this is a finding.
Configure RiOS to generate audit records containing the full-text recording of privileged commands Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Set "Minimum Severity" to "info" Click "Apply" Navigate to the top of the screen and click "Save"
Verify that RiOS is configured to generate an immediate real-time alert for all audit failure events requiring real-time alerts. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Verify that an SMTP Server is defined Verify that an SMTP Port is defined Verify that "Report Events via Email" is checked and that at least one email address is defined Verify that "Report Failures via Email" is checked and that at least one email address is defined If no email accounts are defined, this is a finding.
Configure RiOS to generate an immediate real-time alert for all audit failure events requiring real-time alerts. Navigate to the device Management Console Navigate to Configure >> System Settings >> Email Enter an SMTP Server name Enter n SMTP Port number Check "Report Events via Email" and enter at least one email address Check "Report Failures via Email" and enter at least one email address
Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.
Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to "v3" Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to "SHA" SHA Key: <enter the SHA key> Set "Security Level:" to "Auth/Priv" Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently.
Verify that RiOS is configured select UTC. Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Verify that "UTC" is selected If no NTP Servers are visible after the command "show ntp all" or on "Requested Servers", this is a finding.
Configure RiOS enable UTC. Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Select "UTC" for the Time Zone Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to protect audit information from any type of unauthorized read access. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the view icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.
Configure RiOS to protect audit information from any type of unauthorized read access. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user. Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to protect audit information from unauthorized modification. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.
Configure RiOS to protect audit information from unauthorized modification. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user. Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to protect audit information from unauthorized deletion. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.
Configure RiOS to protect audit information from unauthorized deletion. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to protect audit tools from unauthorized access. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.
Configure RiOS to protect audit tools from unauthorized access. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user. Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to protect audit tools from unauthorized deletion. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the "View" icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.
Configure RiOS to protect audit tools from unauthorized deletion. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory
Verify that RiOS is configured to off-load audit records (logs) onto a different system than the system being audited. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Verify that "Remote Log Servers" contains IP addresses for all available log servers View "Per-Process Logging" section to see if a process or severity has been configured. Note: This only affects the system log, not the user type facilities. If a filter has been added in 'Per-Process Logging" which prevents the capture of DoD-defined auditable events, this is a finding. If "Remote Log Servers" is empty and no remote log servers are configured, this is a finding.
Configure RiOS to off-load audit records onto a different system than the system being audited. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Click on "Add a New Log Server" Set "Server IP" to the IP address of the remote log server Set "Minimum Severity" to Info In the Pre-Process Logging area, Click Remote Selected if any of the filtered processes violate the capture of DoD-defined auditable events. Click "Add" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS restricts permission to select auditable event to authorized administrators. Navigate to the device Management Console Navigate to: Configure >> Security >> User Permissions Verify the "Deny" attribute is selected for "Basic Diagnostics", "TCP Dumps", "Reports" permissions If the "Deny" attribute is not set for users who are not authorized access to configure auditable events, this is a finding.
Configure RiOS permission for auditable events. Navigate to the device Management Console, then Navigate to: Configure >> Security >> User Permissions Select the user For "Basic Diagnostics", "TCP Dumps", "Reports". Click the "Deny" attribute Click "Save" to save these settings permanently
Verify that RiOS is configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions. Navigate to the device CLI Type: enable Type: show ntp all Verify that at least two NTP Servers are configured -- or -- Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Verify that at least two servers are configured in the section "Requested Servers" If no NTP Servers are visible after the command 'show ntp all' or on "Requested Servers", this is a finding.
Configure RiOS to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions. Navigate to the device CLI Type: enable Type: conf t Type: ntp server <hostname | ip address> Type: ntp server <hostname | ip address> enable Configure 2 NTP Servers Type: ntp enable Type: write memory -- or -- Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Click "Add a New NTP Server" Set the value of "Hostname or IP Address" to the required NTP Server Set the value of "Enabled/Disabled" to "Enabled" Click "Add" Configure 2 NTP Servers Click "Use NTP Time Synchronization" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to audit the enforcement actions used to restrict access associated with changes to the device. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Verify that "Minimum Severity" is set to "info" If the minimum severity is not set to "info", this is a finding.
Configure RiOS to audit the enforcement actions used to restrict access associated with changes to the device. Navigate to the device Management Console Navigate to Configure >> System Settings >> Logging Set "Minimum Severity" to "info" Click "Apply" Navigate to the top of the screen and click "Save"
Verify authentication policy is enabled. Navigate to the device Management Console Navigate to: Configure >> Security >> Password Policy Verify the "Enable Account Control" is selected If "Enable Account Control" is not set, this is a finding.
Enable RiOS authentication policy. Navigate to the device Management Console, then Navigate to: Configure >> Security >> Password Policy Select "Enable Account Control" Set values for the user account Click "Save" to save these settings permanently
Verify that RiOS is configured to employ automated mechanisms to centrally manage authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Verify that "TACACS+ Servers" has at least one server defined -- or -- Navigate to Configure >> Security >> RADIUS Verify that "RADIUS Servers" has at least one server defined If no servers exist in "TACACS+ Servers" or "RADIUS Servers", this is a finding.
Configure RiOS to employ automated mechanisms to centrally manage authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Click "Add a TACACS+ Server" Set "Hostname or IP Address" to the hostname or IP address of the TACACS+ server Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently -- or -- Navigate to Configure >> Security >> RADIUS Click "Add a RADIUS Server" Set "Hostname or IP Address" to the hostname or IP address of the RADIUS server Set the value of "Authentication Port" to the appropriate value Set the value of "Authentication Type" to "CHAP" Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to employ automated mechanisms to centrally apply authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Verify that "TACACS+ Servers" has at least one server defined -- or -- Navigate to Configure >> Security >> RADIUS Verify that "RADIUS Servers" has at least one server defined If no servers exist in "TACACS+ Servers" or "RADIUS Servers", this is a finding.
Configure RiOS to employ automated mechanisms to centrally apply authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Click "Add a TACACS+ Server" Set "Hostname or IP Address" to the hostname or IP address of the TACACS+ server Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently. -- or -- Navigate to Configure >> Security >> RADIUS Click "Add a RADIUS Server" Set "Hostname or IP Address" to the hostname or IP address of the RADIUS server Set the value of "Authentication Port" to the appropriate value Set the value of "Authentication Type" to "CHAP" Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to employ automated mechanisms to centrally verify authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Verify that "TACACS+ Servers" has at least one server defined -- or -- Navigate to Configure >> Security >> RADIUS Verify that "RADIUS Servers" has at least one server defined If no servers exist in "TACACS+ Servers" or "RADIUS Servers", this is a finding.
Configure RiOS to employ automated mechanisms to centrally verify authentication settings. Navigate to the device Management Console Navigate to Configure >> Security >> TACACS+ Click "Add a TACACS+ Server" Set "Hostname or IP Address" to the hostname or IP address of the TACACS+ server Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently -- or -- Navigate to Configure >> Security >> RADIUS Click "Add a RADIUS Server" Set "Hostname or IP Address" to the hostname or IP address of the RADIUS server Set the value of "Authentication Port" to the appropriate value Set the value of "Authentication Type" to "CHAP" Set "Enabled" Click "Add" Click "Set a Global Default Key" Set the value of "Global Key" to the required value Set the value of "Confirm Global Key" to the required value Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments. Navigate to the device Management Console Navigate to Configure >> Security >> Management ACL Verify that this page contains all unnecessary and/or nonsecure functional, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments. Verify that "Enable Management ACL" is checked. If no PPSM CAL or vulnerability assessment information is presented on this page or "Enable Management ACL" is not checked, this is a finding.
Configure RiOS to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services , as defined in the PPSM CAL and vulnerability assessments. Navigate to the device Management Console Navigate to Configure >> Security >> Management ACL Click "Add a New Rule" Set the values in "Management ACL Settings" to match requirements defined in the PPSM CAL and vulnerability assessments Check the field "Enable Management ACL" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is backed up when system configuration changes are made to the device by interviewing the site representative and checking any existing backup log. Evidence may also be provided by the date of the last back up. Navigate to the device Management Console Navigate to Configure >> Configurations Verify that the table for "Configuration" and "Date" contains backup configurations If there are no entries under "Configuration" and "Date", this is a finding.
When changes are made to the system configuration, using the following procedure for backing up the device. Navigate to the device Management Console Navigate to Configure >> Configurations Set the value of "New Configuration Name:" to the naming standards for the organization backups Click "Save" Verify that the saved configuration shows up under "Configuration" and the "Date" is the current date and time
Verify that RiOS is configured to implement replay resistant authentication mechanisms for network access to privileged accounts. Navigate to the device CLI Type: enable Type: show config full Type: Spacebar to tab through the configuration Verify that the following commands are contained in the configuration "no web http enable" "web https enable" "no web ssl protocol sslv3" "no web ssl protocol tlsv1" "web ssl protocol tlsv1.1" "web ssl protocol tlsv1.2" If all of the above configurations are not defined as listed, this is a finding.
Configure RiOS to implement replay resistant authentication mechanisms for network access to privileged accounts. Navigate to the device CLI Type: enable Type: conf t Type: no web http enable Type: web https enable Type: no web ssl protocol sslv3 Type: no web ssl protocol tlsv1 Type: web ssl protocol tlsv1.1 Type: web ssl protocol tlsv1.2 Type: write memory Type: exit Type: exit
Verify that RiOS is configured to authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (network management portion of the requirement). Navigate to the device CLI Type: enable Type: show configuration full Verify that 'no telnet-server enable' is in the configuration Verify that 'ssh server enable' is set in the configuration Verify that 'web enable' is in the configuration Verify that 'no web http enable' is in the configuration Verify that 'web https enable' is in the configuration If any one of the above settings is missing from the configuration, this is a finding.
Configure RiOS to Authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (network management portion of the requirement). Navigate to the device CLI Type: enable Type: config t Type: no telnet-server enable Type: ssh server enable Type: ssh server allowed-cyphers aes128-cbc, 3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr Type: web enable Type: no web http enable Type: web https enable Type: write memory Type: exit Type: exit
Verify that RiOS is configured to authenticate SNMP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (SNMP portion of the requirement). Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that at least one "Host" is defined under "Trap Receivers" Verify that the "Host" defined under "Trap Receivers" is set for "Version" v3 Verify that "Enable SNMP Traps" is set If no "Host" exists under "Trap Receivers or the "Host" is not "Version" v3 and/or "Enable SNMP Traps" is not set, this is a finding.
Configure RiOS to authenticate SNMP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (SNMP portion of the requirement). Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver" to the IP address of the trap receiver Set "Destination Port" to the listening port on the trap receiver Set "Receiver Type" to v3 Set "Remote User" to the SNMP user on the trap receiver Set "Authentication" to "Supply a Key" Set "Authentication Protocol" to "MD5" or "SHA" Set "Security Level" to "AuthPriv" Set "Privacy Protocol" to "AES" Set "Privacy" to "Same as Authentication Key" Set "MD5/SHA Key" to the proper authentication key Set "Enable Receiver" Click "Add" Click "Enable SNMP Traps" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently.
Verify that RiOS is configured to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement). Navigate to the device CLI Type: enable Type: show ntp all Verify that at least two NTP Servers are configured Type: show ntp authentication Verify the "Trusted Keys" are defined for use with NTP -- or -- Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Verify that at least two servers are configured in the section "Requested Servers" If no NTP Servers are visible after the command 'show ntp all' or on "Requested Servers", this is a finding.
Configure RiOS to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement). Navigate to the device CLI Type: enable Type: conf t Type: ntp server <hostname | ip address> Type: ntp server <hostname | ip address> Type: ntp authentication key <key id> secret 7 <encrypted string> Type: ntp authentication trustedkeys <key id> Configure 2 NTP Servers Type: ntp enable Type: write memory -- or -- Navigate to the device Management Console Navigate to Configure >> System Settings >> Date and Time Click "Add a New NTP Authentication Key" Set the value of "Key ID" to the required setting (1 to 65534) Set the value of "Key Type" to MD5 or SHA Set the value of "Secret" to the required setting for the NTP server Click "Add" Click '"Add" a New NTP Server' Set the value of "Hostname or IP Address" to the required NTP Server Set the value of "Version" to 3 or 4 depending on the ntp server Set the value of "Key ID" to a value on the trusted key list Set the value of "Enabled/Disabled" to "Enabled" Click "Add" Configure 2 NTP Servers Click "Use NTP Time Synchronization" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to enforce a minimum 15-character password length. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Password Length:" is set to "15" If "Minimum Password Length:" is not set to "15", this is a finding.
Configure RiOS to enforce a minimum 15-character password length. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Password Length:" to "15" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to enforce password complexity that requires at least one upper-case character. Navigate to the device Management Console Navigate to Configure >> Security>Password Policy Verify that "Minimum Uppercase Characters:" is set to "1" If "Minimum Uppercase Characters:" is not set to "1", this is a finding.
Configure RiOS to enforce a password complexity that requires at least one upper-case character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Uppercase Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to enforce password complexity that requires at least one lower-case character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Lowercase Characters:" is set to "1" If "Minimum Lowercase Characters:" is not set to "1", this is a finding.
Configure RiOS to enforce a password complexity that requires at least one lower-case character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Lowercase Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to enforce password complexity that requires at least one numeric character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Numerical Characters:" is set to "1" If "Minimum Numerical Characters:" is not set to "1", this is a finding.
Configure RiOS to enforce a password complexity that requires at least one numerical character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Numerical Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to enforce password complexity that requires at least one special character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Special Characters:" is set to "1" If "Minimum Special Characters:" is not set to "1", this is a finding.
Configure RiOS to enforce a password complexity that requires at least one special character. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Special Characters:" to "1" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to require that when a password is changed, the characters are changed in at least 15 of the positions within the password. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Character Difference Between Passwords:" is set to "15" If "Minimum Character Difference Between Passwords:" is not set to "15", this is a finding.
Configure RiOS to require that when a password is changed, the characters are changed in at least 15 of the positions within the password. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Character Difference Between Passwords:" to "15" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to enforce a 60-day maximum password lifetime restriction. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Days Before Password Expires:" is set to "60" If "Days Before Password Expires:" is not set to "60", this is a finding.
Configure RiOS to enforce a 60-day maximum password lifetime. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Days Before Password Expires:" to "60" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to prohibit password reuse for a minimum of five generations. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Verify that "Minimum Interval for Password Reuse:" is set to "5" If "Minimum Interval for Password Reuse:" is not set to "5", this is a finding.
Configure RiOS to prohibit password reuse for a minimum of five generations. Navigate to the device Management Console Navigate to Configure >> Security >> Password Policy Set the value of "Minimum Interval for Password Reuse:" to "5" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is licensed to use FIPS 140-2 cryptographic modules. Navigate to the device CLI Type: enable Type: config t Type: show licenses Verify installation of a FIPS License Type: show web ssl cipher Verify that the web ssl cipher string is: "TLSv1.2+FIPS:kRSA+FIPS:!eNULL:!aNULL" If a FIPS license is not present and the web ssl cipher string is not set properly, this is a finding.
Configure RiOS to be licenses to use FIPS 140-2 cryptographic modules. Navigate to the device CLI Type: enable Type: config t Type: license install <license-string> Type: web ssl cipher TLSv1.2+FIPS:kRSA+FIPS:!eNULL:!aNULL Type: write memory Verify license installation Type: show licenses Type: show web ssl cipher
Verify that RiOS is configured so that performing maintenance functions is restricted to authorized personnel only. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Verify that only authorized personnel have the permissions to perform maintenance functions If user permissions for authorized personnel are not set to authorize maintenance functions, this is a finding.
Configure RiOS to restrict use of maintenance functions to authorized personnel only. Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Click "Add New User Account" under "Role Based Accounts" Set User Permissions of authorized personnel to allow performance of maintenance functions Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: show configuration full Verify that "no telnet-server enable" is in the configuration Verify that "ssh server enable" is set in the configuration Verify that "web enable" is in the configuration Verify that "no web http enable" is in the configuration Verify that "web https enable" is in the configuration If any one of the above settings is missing from the configuration, this is a finding.
Configure RiOS to implement cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: config t Type: no telnet-server enable Type: ssh server enable Type: ssh server allowed-cyphers aes128-cbc, 3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr Type: web enable Type: no web http enable Type: web https enable Type: write memory Type: exit Type: exit
Verify that RiOS is configured to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: show configuration full Verify that "no telnet-server enable" is in the configuration Verify that "ssh server enable" is set in the configuration Verify that "web enable" is in the configuration Verify that "no web http enable" is in the configuration Verify that "web https enable" is in the configuration If any one of the above settings is missing from the configuration, this is a finding.
Configure RiOS to implement cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications. Navigate to the device CLI Type: enable Type: config t Type: no telnet-server enable Type: ssh server enable Type: ssh server allowed-cyphers aes128-cbc, 3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr Type: web enable Type: no web http enable Type: web https enable Type: write memory Type: exit Type: exit
Verify that RiOS is configured to terminate a device management session at the end of the session, or after 10 minutes of inactivity. Navigate to the device CLI Type: enable Type: show web Verify that "Inactivity Timeout:" is set to "10" minutes -- or -- Navigate to the device Management Console Navigate to Configure >> Security >> Web Settings Verify that "Web Inactivity Timeout (minutes):" is set to "10" If "Inactivity Timeout" or "Web Inactivity Timeout (minutes)" is not set to "10", this is a finding.
Configure RiOS to terminate a device management session at the end of the session, or after 10 minutes of inactivity. Navigate to the device CLI Type: enable Type: conf t Type: web auto-logout 10 Type: write memory -- or -- Navigate to the device Management Console Navigate to Configure >> Security >> Web Settings Set the value of "Web Inactivity Timeout (minutes):" to "10" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider. Navigate to the device Management Console Navigate to Configure >> Optimization >> Certificate Authorities Verify that DoD Root Certificates are listed on this page If no DoD Root CA Certificates are listed on this page, this is a finding.
Configure RiOS to use public key certificates from an appropriate certificate policy through an approved service provider. Navigate to the device Management Console Navigate to Configure >> Optimization >> Certificate Authorities Click "Add a New Certificate Authority" Select "Local File" and "Browse" Navigate to your local DoD CA Root Certificates and select a certificate Click "Add" Repeat Click "Add a New Certificate Authority" down to Click "Add" for each DoD Root Certificate Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to generate unique session identifiers using a FIPS 140-2 approved random number generator. Navigate to the device CLI Type: enable Type: conf t Type: show fips status Verify that "FIPS Mode: Enabled" is displayed on the console If "FIPS Mode: Enabled" is not displayed on the console, this is a finding.
Configure RiOS is configured to generate unique session identifiers using a FIPS 140-2 approved random number generator. Navigate to the device CLI Type: enable Type: conf t Type: fips enable Type: write memory Type: reload Type: show fips status Verify that "FIPS Mode: Enabled" is displayed on the screen. Type: exit Type: exit
Verify that RIOS is configured to protect against or limit the effects of all know types of Denial of Service (DoS) attacks on the device management network. Navigate to the device Management Console Navigate to Configure >> Security >> Management ACL Verify that there is a rule to limit management access from authorized devices and that the interface is set to other than an in-path interface Verify that "Enable Management ACL" is checked If Management ACLs are not defined to limit access to identified or known devices and/or a management interface is not defined that is different from the in-path interface and/or "Enable Management ACL" is not checked, this is a finding.
Configure RiOS to protect against or limit the effects of all known types of Denial of Service (DoS) attacks on the network device management network. Navigate to the device Management Console Navigate to Configure >> Security >> Management ACL Click "Add a New Rule" Set "Action" to "Allow" Set "Service" to "HTTPS" Set "Source Network" to Management device network Set "Interface" to the interface used for network management Set "Description" to enable ease of management Click "Add" Click "Add a New Rule" and repeat all actions for SSH Click "Enable Management ACL" Click "Apply" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS uses automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Verify that Host Servers are defined in the section "Trap Receivers" If there are no Host Servers defined in "Trap Receivers", this is a finding.
Configure RiOS to use automated mechanisms to alert security personnel to threats identified by authoritative sources. Navigate to the device Management Console Navigate to Configure >> System Settings >> SNMP Basic Click "Add a New Trap Receiver" Set "Receiver IP Address" to the address of the trap receiver Set "Destination Port:" to the port that the Trap Receiver is listening on Set "Receiver Type:" to "v3" Set "Remote User:" to the user name on the Trap Receiver Set "Authentication:" to <Supply a key based> Set "Authentication Protocol:" to "SHA" SHA Key: <enter the SHA key> Set "Security Level:" to "Auth/Priv" Set "Privacy Protocol:" to "AES" Set "Privacy:" to Select "same as Authentication Key" Set "Enable Receiver" Click "Add" Navigate to the top of the web page and click "Save" to save these settings permanently
Verify that RiOS is configured to reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the view icon next to each user name Verify that the Control "Basic Diagnostics" is set according to the authorization level of the user If the control "Basic Diagnostics" is not set according to the authorization level of the user, this is a finding.
Configure RiOS to reveal error messages only to authorized individuals (ISSO, ISSM, and SA). Navigate to the device Management Console Navigate to Configure >> Security >> User Permissions Select the user name that needs to have modified permissions Set the control "Basic Diagnostics" according to the authorization level of the user Click "Apply" Navigate to the top of the web page and click "Save" to write changes to memory
This STIG is sunset and no longer updated. Compare the version running to the supported version by the vendor. If the system is using an unsupported version from the vendor, this is a finding.
Upgrade to a version supported by the vendor.