Virtual Private Network (VPN) Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +81 −81
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 81
- V-207184 Medium The VPN Gateway must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.
- V-207185 Medium The Remote Access VPN Gateway and/or client must display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the network.
- V-207186 Medium The Remote Access VPN Gateway and/or client must enforce a policy to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-207187 Medium The publicly accessible VPN Gateway must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
- V-207188 Low The VPN Gateway must notify the user, upon successful logon (access), of the number of unsuccessful logon (access) attempts since the last successful logon (access).
- V-207189 Medium The VPN Gateway must limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number.
- V-207190 High The TLS VPN Gateway must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission.
- V-207191 Medium The remote access VPN Gateway must use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions.
- V-207192 Medium The VPN Gateway must be configured to use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.
- V-207193 High The IPsec VPN must implement a FIPS 140-2 validated Diffie-Hellman (DH) group.
- V-207194 Medium If the site-to-site VPN implementation uses L2TP, L2TPv3 sessions must be authenticated prior to transporting traffic.
- V-207195 Low The VPN Gateway must generate log records containing information to establish what type of events occurred.
- V-207196 Low The VPN Gateway must generate log records containing information to establish when (date and time) the events occurred.
- V-207197 Medium The VPN Gateway must generate log records containing information that establishes the identity of any individual or process associated with the event.
- V-207198 Medium The VPN Gateway must generate log records containing information to establish where the events occurred.
- V-207199 Low The VPN Gateway must generate log records containing information to establish the source of the events.
- V-207200 Medium The VPN Gateway must produce log records containing information to establish the outcome of the events.
- V-207201 Low The VPN Gateway must protect log information from unauthorized read access if all or some of this data is stored locally.
- V-207202 Medium The VPN Gateway log must protect audit information from unauthorized modification when stored locally.
- V-207203 Medium The VPN Gateway must protect audit information from unauthorized deletion when stored locally.
- V-207204 Medium The VPN Gateway must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-207205 Medium The IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations.
- V-207206 Medium The Remote Access VPN Gateway must be configured to prohibit Point-to-Point Tunneling Protocol (PPTP) and L2F.
- V-207207 Medium For site-to-site VPN implementations, the L2TP protocol must be blocked or denied at the security boundary with the private network so unencrypted L2TP packets cannot traverse into the private network of the enclave.
- V-207208 Medium The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-207209 High The VPN Gateway must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.
- V-207210 Medium The VPN Client must implement multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-207211 Medium The TLS VPN must be configured to use replay-resistant authentication mechanisms for network access to non-privileged accounts.
- V-207212 Medium The IPsec VPN Gateway must use anti-replay mechanisms for security associations.
- V-207213 Medium The VPN Gateway must uniquely identify all network-connected endpoint devices before establishing a connection.
- V-207214 Medium The VPN Gateway, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-207215 Medium The site-to-site VPN, when using PKI-based authentication for devices, must enforce authorized access to the corresponding private key.
- V-207216 Medium The Remote Access VPN Gateway must use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication.
- V-207217 Medium The VPN Gateway must map the authenticated identity to the user account for PKI-based authentication.
- V-207218 Medium The VPN Gateway must use FIPS-validated SHA-1 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (
- V-207219 Medium The VPN Gateway must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- V-207220 Medium The VPN Gateway must be configured to route sessions to an IDPS for inspection.
- V-207221 Low The VPN Gateway must terminate all network connections associated with a communications session at the end of the session.
- V-207222 Medium The VPN Gateway must use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.
- V-207223 High The IPsec VPN Gateway must use Internet Key Exchange (IKE) with SHA-1 or greater to protect the authenticity of communications sessions.
- V-207224 Medium The VPN Gateway must invalidate session identifiers upon user logoff or other session termination.
- V-207225 Medium The VPN Gateway must recognize only system-generated session identifiers.
- V-207226 Medium The VPN Gateway must generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
- V-207227 Medium The VPN Gateway must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- V-207228 Medium The VPN Gateway must be configured to perform an organization-defined action if the audit reveals unauthorized activity.
- V-207229 Medium The VPN Gateway administrator accounts or security policy must be configured to allow the system administrator to immediately disconnect or disable remote access to devices and/or users when needed.
- V-207230 High The IPsec VPN Gateway must use AES encryption for the Internet Key Exchange (IKE) proposal to protect confidentiality of remote access sessions.
- V-207231 Medium The VPN Gateway must transmit organization-defined access authorization information using FIPS 140-2-validated cryptography to a compliant authentication server, which enforces access control decisions.
- V-207232 Low The VPN Gateway must notify the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access).
- V-207233 Medium The VPN Gateway must provide centralized management and configuration of the content to be captured in log records generated by all network components.
- V-207234 Medium The VPN Gateway must off-load audit records onto a different system or media than the system being audited.
- V-207235 Medium The VPN Gateway must generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or
- V-207236 Medium When communications with the Central Log Server is lost, the VPN Gateway must continue to queue traffic log records locally.
- V-207237 Medium The IPsec VPN Gateway must renegotiate the security association after 8 hours or less, or an organization-defined period.
- V-207238 Medium The VPN Gateway must renegotiate the security association after 24 hours or less or as defined by the organization.
- V-207239 Medium The VPN Gateway must accept the Common Access Card (CAC) credential.
- V-207240 Medium The VPN Gateway must electronically verify the Common Access Card (CAC) credential.
- V-207241 Medium The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.
- V-207242 Medium The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
- V-207243 Medium The VPN Gateway must disable split-tunneling for remote clients VPNs.
- V-207244 Medium The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
- V-207245 High The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.
- V-207246 Medium The IPsec VPN Gateway must use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organizations sites or between a gateway and remote end-stations.
- V-207247 Medium For site-to-site VPN, for accounts using password authentication, the VPN Gateway must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- V-207248 Medium The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.
- V-207249 Medium The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.
- V-207250 Medium The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
- V-207251 Medium The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
- V-207252 High The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
- V-207253 High The VPN Gateway must not accept certificates that have been revoked when using PKI for authentication.
- V-207254 Medium The VPN Client logout function must be configured to terminate the session on/with the VPN Gateway.
- V-207255 Medium The VPN Client must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- V-207256 Medium For site-to-site VPN Gateway must store only cryptographic representations of Pre-shared Keys (PSKs).
- V-207257 High The IPsec VPN must use Advanced Encryption Standard (AES) encryption for the IPsec proposal to protect the confidentiality of remote access sessions.
- V-207258 Medium The TLS VPN Gateway that supports Government-only services must prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
- V-207259 Medium The TLS VPN Gateway that supports citizen- or business-facing network devices must prohibit client negotiation to SSL 2.0 or SSL 3.0.
- V-207260 Medium The VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
- V-207261 High The VPN Gateway must use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network.
- V-207262 High The IPsec VPN Gateway Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.
- V-207263 Medium The VPN Gateway must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.
- V-207264 Medium The VPN Gateway must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
Removed rules 81
- V-97041 Medium The VPN Gateway must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.
- V-97043 Medium The Remote Access VPN Gateway and/or client must display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the network.
- V-97045 Medium The Remote Access VPN Gateway and/or client must enforce a policy to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-97047 Medium The publicly accessible VPN Gateway must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
- V-97049 Low The VPN Gateway must notify the user, upon successful logon (access), of the number of unsuccessful logon (access) attempts since the last successful logon (access).
- V-97051 Medium The VPN Gateway must limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number.
- V-97053 High The TLS VPN Gateway must use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission.
- V-97055 Medium The remote access VPN Gateway must use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions.
- V-97057 Medium The VPN Gateway must be configured to use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.
- V-97059 High The IPsec VPN must implement a FIPS 140-2 validated Diffie-Hellman (DH) group.
- V-97061 Low The VPN Gateway must generate log records containing information to establish what type of events occurred.
- V-97063 Low The VPN Gateway must generate log records containing information to establish when (date and time) the events occurred.
- V-97065 Medium The VPN Gateway must generate log records containing information that establishes the identity of any individual or process associated with the event.
- V-97067 Medium The VPN Gateway must generate log records containing information to establish where the events occurred.
- V-97069 Low The VPN Gateway must generate log records containing information to establish the source of the events.
- V-97071 Medium The VPN Gateway must produce log records containing information to establish the outcome of the events.
- V-97073 Low The VPN Gateway must protect log information from unauthorized read access if all or some of this data is stored locally.
- V-97075 Medium The VPN Gateway log must protect audit information from unauthorized modification when stored locally.
- V-97077 Medium The VPN Gateway must protect audit information from unauthorized deletion when stored locally.
- V-97079 Medium The VPN Gateway must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-97081 Medium The IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations.
- V-97083 Medium The Remote Access VPN Gateway must be configured to prohibit Point-to-Point Tunneling Protocol (PPTP) and L2F.
- V-97085 Medium For site-to-site VPN implementations, the L2TP protocol must be blocked or denied at the security boundary with the private network so unencrypted L2TP packets cannot traverse into the private network of the enclave.
- V-97087 Medium The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- V-97089 High The VPN Gateway must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.
- V-97091 Medium The VPN Client must implement multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-97093 Medium The TLS VPN must be configured to use replay-resistant authentication mechanisms for network access to non-privileged accounts.
- V-97095 Medium The IPsec VPN Gateway must use anti-replay mechanisms for security associations.
- V-97097 Medium The VPN Gateway must uniquely identify all network-connected endpoint devices before establishing a connection.
- V-97099 Medium The VPN Gateway, when utilizing PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- V-97101 Medium The site-to-site VPN, when using PKI-based authentication for devices, must enforce authorized access to the corresponding private key.
- V-97103 Medium The Remote Access VPN Gateway must use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication.
- V-97113 Medium The VPN Gateway must map the authenticated identity to the user account for PKI-based authentication.
- V-97115 Medium The VPN Gateway must use FIPS-validated SHA-1 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- V-97117 Medium The VPN Gateway must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- V-97119 Medium The VPN Gateway must be configured to route sessions to an IDPS for inspection.
- V-97121 Low The VPN Gateway must terminate all network connections associated with a communications session at the end of the session.
- V-97123 Medium The VPN Gateway must use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.
- V-97125 High The IPsec VPN Gateway must use Internet Key Exchange (IKE) with SHA-1 or greater to protect the authenticity of communications sessions.
- V-97127 Medium The VPN Gateway must invalidate session identifiers upon user logoff or other session termination.
- V-97129 Medium The VPN Gateway must recognize only system-generated session identifiers.
- V-97131 Medium The VPN Gateway must generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
- V-97133 Medium The VPN Gateway must fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- V-97135 Medium The VPN Gateway must be configured to perform an organization-defined action if the audit reveals unauthorized activity.
- V-97137 Medium The VPN Gateway administrator accounts or security policy must be configured to allow the system administrator to immediately disconnect or disable remote access to devices and/or users when needed.
- V-97139 High The IPsec VPN Gateway must use AES encryption for the Internet Key Exchange (IKE) proposal to protect confidentiality of remote access sessions.
- V-97141 Medium The VPN Gateway must transmit organization-defined access authorization information using FIPS 140-2-validated cryptography to a compliant authentication server, which enforces access control decisions.
- V-97143 Low The VPN Gateway must notify the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access).
- V-97145 Medium The VPN Gateway must provide centralized management and configuration of the content to be captured in log records generated by all network components.
- V-97147 Medium The VPN Gateway must off-load audit records onto a different system or media than the system being audited.
- V-97149 Medium The VPN Gateway must generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- V-97151 Medium When communications with the Central Log Server is lost, the VPN Gateway must continue to queue traffic log records locally.
- V-97153 Medium The IPsec VPN Gateway must renegotiate the security association after 8 hours or less, or an organization-defined period.
- V-97155 Medium The VPN Gateway must renegotiate the security association after 24 hours or less or as defined by the organization.
- V-97157 Medium The VPN Gateway must accept Personal Identity Verification (PIV) credentials.
- V-97159 Medium The VPN Gateway must electronically verify Personal Identity Verification (PIV) credentials.
- V-97177 Medium The VPN Gateway must authenticate all network-connected endpoint devices before establishing a connection.
- V-97179 Medium The VPN Gateway must use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
- V-97181 Medium The VPN Gateway must disable split-tunneling for remote clients VPNs.
- V-97183 Medium The IPsec VPN Gateway must specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
- V-97185 High The VPN Gateway and Client must be configured to protect the confidentiality and integrity of transmitted information.
- V-97187 Medium The IPsec VPN Gateway must use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organizations sites or between a gateway and remote end-stations.
- V-97189 Medium For site-to-site VPN, for accounts using password authentication, the VPN Gateway must use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- V-97191 Medium The VPN Gateway must generate log records when successful and/or unsuccessful VPN connection attempts occur.
- V-97193 Medium The VPN Gateway must use a FIPS-validated cryptographic module to generate cryptographic hashes.
- V-97195 Medium The VPN Gateway must use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
- V-97197 Medium The IPsec VPN Gateway IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
- V-97199 High The IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
- V-97201 High The VPN Gateway must not accept certificates that have been revoked when using PKI for authentication.
- V-97203 Medium The VPN Client logout function must be configured to terminate the session on/with the VPN Gateway.
- V-97205 Medium The VPN Client must display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- V-97207 Medium For site-to-site VPN Gateway must store only cryptographic representations of Pre-shared Keys (PSKs).
- V-97209 High The IPsec VPN must use Advanced Encryption Standard (AES) encryption for the IPsec proposal to protect the confidentiality of remote access sessions.
- V-97211 Medium The TLS VPN Gateway that supports Government-only services must prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
- V-97213 Medium The TLS VPN Gateway that supports citizen- or business-facing network devices must prohibit client negotiation to SSL 2.0 or SSL 3.0.
- V-97215 Medium The VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
- V-97217 High The VPN Gateway must use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network.
- V-97219 High The IPsec VPN Gateway Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.
- V-97221 Medium The VPN Gateway must validate certificates used for Transport Layer Security (TLS) functions by performing RFC 5280-compliant certification path validation.
- V-97223 Medium The VPN Gateway must use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).
- V-97225 Medium If the site-to-site VPN implementation uses L2TP, L2TPv3 sessions must be authenticated prior to transporting traffic.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-VPN-000040
- Vuln IDs
-
- V-207184
- V-97041
- Rule IDs
-
- SV-207184r561344_rule
- SV-106179
Checks: C-7444r378173_chk
Verify the VPN Gateway has an inbound and outbound traffic security policy which is in compliance with information flow control policies (e.g., IPsec policy configuration). Review network device configurations and topology diagrams. Verify encapsulated or encrypted traffic received from other enclaves with different security policies terminate at the perimeter for filtering and content inspection by a firewall and IDPS before gaining access to the private network. If the VPN Gateway does not ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies, this is a finding.
Fix: F-7444r378174_fix
Configure the VPN Gateway to ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies (e.g., IPsec policy configuration). Also, configure the VPN gateway to forward encapsulated or encrypted traffic received from other enclaves with different security policies to the perimeter firewall and IDPS before traffic is passed to the private network.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-NET-000041-VPN-000110
- Vuln IDs
-
- V-207185
- V-97043
- Rule IDs
-
- SV-207185r561344_rule
- SV-106181
Checks: C-7445r378176_chk
If the user/remote client connection banner is the same as the banner configured as part of the NDM SRG, then this is not applicable. Determine if the network device is configured to present a DoD-approved banner that is formatted in accordance with DoD policy. If the Remote Access VPN Gateway or VPN client does not display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the network, this is a finding.
Fix: F-7445r378177_fix
Configure the Remote Access VPN to display the Standard Mandatory DoD Notice and Consent Banner in accordance with DoD policy before granting access to the device. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-NET-000042-VPN-000120
- Vuln IDs
-
- V-207186
- V-97045
- Rule IDs
-
- SV-207186r561344_rule
- SV-106183
Checks: C-7446r378179_chk
If the user/remote client connection banner is the same as the banner configured as part of the NDM SRG, then this is not applicable. Verify the ALG retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. If the Remote Access VPN Gateway and/or client does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
Fix: F-7446r378180_fix
Configure the Remote Access VPN Gateway and/or client to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- SRG-NET-000043-VPN-000130
- Vuln IDs
-
- V-207187
- V-97047
- Rule IDs
-
- SV-207187r561344_rule
- SV-106185
Checks: C-7447r378182_chk
Verify the publicly accessible VPN Gateway displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with DTM-08-060. Use the following verbiage for network elements that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If the publicly accessible VPN Gateway does not display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system, this is a finding.
Fix: F-7447r378183_fix
Configure the publicly accessible VPN Gateway to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-000053
- Version
- SRG-NET-000049-VPN-000150
- Vuln IDs
-
- V-207188
- V-97049
- Rule IDs
-
- SV-207188r561344_rule
- SV-106187
Checks: C-7448r378185_chk
Determine if the VPN Gateway is either configured to notify the administrator of the number of unsuccessful login attempts since the last successful login or configured to use an authentication server which would perform this function. If the administrator is not notified of the number of unsuccessful login attempts since the last successful login, this is a finding. If the VPN Gateway does not notify the user, upon successful logon (access), of the number of unsuccessful logon (access) attempts since the last successful logon (access), this is a finding.
Fix: F-7448r378186_fix
Configure the VPN Gateway to notify the user, upon successful logon (access), of the number of unsuccessful logon (access) attempts since the last successful logon (access).
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-NET-000053-VPN-000170
- Vuln IDs
-
- V-207189
- V-97051
- Rule IDs
-
- SV-207189r561344_rule
- SV-106189
Checks: C-7449r378188_chk
Inspect the VPN Gateway configuration. Verify the number of concurrent sessions for user accounts to 1 or to an organization-defined number (defined in the SSP). If the VPN Gateway does not limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number, this is a finding.
Fix: F-7449r378189_fix
Configure the VPN Gateway to limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number, as documented in the SSP.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000062-VPN-000200
- Vuln IDs
-
- V-207190
- V-97053
- Rule IDs
-
- SV-207190r561344_rule
- SV-106191
Checks: C-7450r378191_chk
Verify the TLS VPN Gateway is configured to use TLS 1.2 or higher to protect the confidentiality of sensitive data during transmission. If the TLS VPN Gateway does not use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission, this is a finding.
Fix: F-7450r378192_fix
Configure the TLS VPN Gateway to use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data for transmission.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000063-VPN-000210
- Vuln IDs
-
- V-207191
- V-97055
- Rule IDs
-
- SV-207191r561344_rule
- SV-106193
Checks: C-7451r378194_chk
Verify the remote access VPN Gateway uses a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions. If the remote access VPN Gateway does not use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions, this is a finding.
Fix: F-7451r378195_fix
Configure the remote access VPN Gateway to use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000063-VPN-000220
- Vuln IDs
-
- V-207192
- V-97057
- Rule IDs
-
- SV-207192r561344_rule
- SV-106195
Checks: C-7452r378197_chk
Verify the VPN Gateway uses IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions. If the VPN Gateway does not use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions, this is a finding.
Fix: F-7452r378198_fix
Configure the VPN Gateway to use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000074-VPN-000250
- Vuln IDs
-
- V-207193
- V-97059
- Rule IDs
-
- SV-207193r561344_rule
- SV-106197
Checks: C-7453r378200_chk
Verify all IKE proposals are set to use a FIPS-validated dh-group. View the IKE options dh-group option. If the IKE option is not set to a FIPS 140-2 validated dh-group, this is a finding.
Fix: F-7453r378201_fix
Configure the IPsec VPN to us the FIPS 140-2 DH group. The following command is an example of how to configure the IKE (phase 1) proposals. The following groups are allowed for use in DoD: DH Groups 14 (2048-bit MODP) - 19 (256-bit Random ECP), 20 (384-bit Random ECP), 5 (1536-bit MODP), 24 (2048-bit MODP with 256-bit POS).
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000075-VPN-000260
- Vuln IDs
-
- V-207194
- V-97225
- Rule IDs
-
- SV-207194r561344_rule
- SV-106363
Checks: C-7454r378203_chk
If L2TP communications protocol is not used, this is not applicable. Verify L2TPv3 sessions are configured to authenticate the traffic before transit. L2TPv3 sessions must be authenticated prior to transporting traffic. If L2TPv3 sessions do not require authentication, this is a finding.
Fix: F-7454r378204_fix
If the site-to-site VPN implementation uses L2TPv3, configure L2TPv3 sessions to authenticate the traffic before transit.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SRG-NET-000077-VPN-000280
- Vuln IDs
-
- V-207195
- V-97061
- Rule IDs
-
- SV-207195r561344_rule
- SV-106199
Checks: C-7455r378206_chk
Verify the VPN Gateway generates log records containing information to establish what type of events occurred. If the VPN Gateway does not generate log records containing information to establish what type of events occurred, this is a finding.
Fix: F-7455r378207_fix
Configure the VPN Gateway to generate log records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- SRG-NET-000078-VPN-000290
- Vuln IDs
-
- V-207196
- V-97063
- Rule IDs
-
- SV-207196r561344_rule
- SV-106201
Checks: C-7456r378209_chk
Configure the VPN Gateway generates log records containing information to establish when (date and time) the events occurred. If the VPN Gateway does not generate log records containing information to establish when (date and time) the events occurred, this is a finding.
Fix: F-7456r378210_fix
Configure the VPN Gateway to generate log records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-VPN-000300
- Vuln IDs
-
- V-207197
- V-97065
- Rule IDs
-
- SV-207197r561344_rule
- SV-106203
Checks: C-7457r378212_chk
Verify the VPN Gateway generates log records containing information that establishes the identity of any individual or process associated with the event. If the VPN Gateway does not generate log records containing information that establishes the identity of any individual or process associated with the event, this is a finding.
Fix: F-7457r378213_fix
Configure the VPN Gateway to generate log records containing information that establishes the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000088-VPN-000310
- Vuln IDs
-
- V-207198
- V-97067
- Rule IDs
-
- SV-207198r561344_rule
- SV-106205
Checks: C-7458r378215_chk
Verify the VPN Gateway generates log records containing information to establish where the events occurred. If the VPN Gateway does not generate log records containing information to establish where the events occurred, this is a finding.
Fix: F-7458r378216_fix
Configure the VPN Gateway to generates log records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-NET-000089-VPN-000330
- Vuln IDs
-
- V-207199
- V-97069
- Rule IDs
-
- SV-207199r561344_rule
- SV-106207
Checks: C-7459r378218_chk
Verify the VPN Gateway generates log records containing information to establish the source of the events. If the VPN Gateway does not generate log records containing information to establish the source of the events, this is a finding.
Fix: F-7459r378219_fix
Configure the VPN Gateway to generate log records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000091-VPN-000350
- Vuln IDs
-
- V-207200
- V-97071
- Rule IDs
-
- SV-207200r561344_rule
- SV-106209
Checks: C-7460r378221_chk
Examine the log configuration on the VPN Gateway or view several alert events on the organization's central audit server. Alternatively, examine the Central Log Server to see if it contains information about success or failure of client connection attempts or other events. If the traffic log entries do not include the success or failure of connection attempts and other events, this is a finding.
Fix: F-7460r378222_fix
Configure the VPN Gateway to generate log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the client connection attempts.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-000162
- Version
- SRG-NET-000098-VPN-000370
- Vuln IDs
-
- V-207201
- V-97073
- Rule IDs
-
- SV-207201r561344_rule
- SV-106211
Checks: C-7461r378224_chk
Verify the VPN Gateway protects log information from unauthorized read access if all or some of this data is stored locally. If the VPN Gateway does not protect log information from unauthorized read access if all or some of this data is stored locally, this is a finding.
Fix: F-7461r378225_fix
Configure the VPN Gateway to protect log information from unauthorized read access if all or some of this data is stored locally.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-VPN-000380
- Vuln IDs
-
- V-207202
- V-97075
- Rule IDs
-
- SV-207202r561344_rule
- SV-106213
Checks: C-7462r378227_chk
Verify the VPN Gateway log is configured to protect audit information from unauthorized modification when stored locally. The VPN Gateway log must protect audit information from unauthorized modification when stored locally, this is a finding.
Fix: F-7462r378228_fix
Configure the VPN Gateway log to protect audit information from unauthorized modification when stored locally. The method used depends on system architecture and design. Examples: ensuring log files receive the proper file system permissions and limiting log data locations.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-VPN-000390
- Vuln IDs
-
- V-207203
- V-97077
- Rule IDs
-
- SV-207203r561344_rule
- SV-106215
Checks: C-7463r378230_chk
Verify the VPN Gateway is configured to protect audit information from unauthorized deletion when stored locally. If the VPN Gateway does not protect audit information from unauthorized deletion when stored locally, this is a finding.
Fix: F-7463r378231_fix
Configure the VPN Gateway to protect audit information from unauthorized deletion when stored locally. Ensure log files receive the proper file system permissions and limiting log data locations.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000450
- Vuln IDs
-
- V-207204
- V-97079
- Rule IDs
-
- SV-207204r561344_rule
- SV-106217
Checks: C-7464r378233_chk
View the configured security services. Compare the services that are enabled, including the port, services, protocols, and functions. If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.
Fix: F-7464r378234_fix
Ensure functions, ports, protocols, and services identified on the PPSM CAL are not used for system services configuration. View the configured security services. Compare the services that are enabled, including the port, services, protocols, and functions. Consult the product knowledge base and configuration guides to determine the commands for disabling each port, protocols, services, or functions that is not in compliance with the PPSM CAL and vulnerability assessments.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000460
- Vuln IDs
-
- V-207205
- V-97081
- Rule IDs
-
- SV-207205r561344_rule
- SV-106219
Checks: C-7465r378236_chk
Verify the IPsec VPN Gateway uses IKEv2 for IPsec VPN security associations. If the IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations, this is a finding.
Fix: F-7465r378237_fix
Configure the IPsec VPN Gateway to use IKEv2 for IPsec VPN security associations.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000470
- Vuln IDs
-
- V-207206
- V-97083
- Rule IDs
-
- SV-207206r561344_rule
- SV-106221
Checks: C-7466r378239_chk
Verify the VPN Gateway is configured to prohibit PPTP and L2F. If the VPN Gateway does not be configured to prohibit PPTP and L2F, this is a finding.
Fix: F-7466r378240_fix
Configure the VPN Gateway to prohibit PPTP and L2F.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000480
- Vuln IDs
-
- V-207207
- V-97085
- Rule IDs
-
- SV-207207r561344_rule
- SV-106223
Checks: C-7467r378242_chk
If L2TP communications protocol is not used, this is not applicable. Verify the VPN Gateway or another network element (e.g., firewall) is configure to block or deny L2TP packets with a destination address within the private network of the enclave. If L2TP communications are allowed to cross the security boundary into the private network of the enclave, this is a finding.
Fix: F-7467r378243_fix
If L2TP is used for encapsulation, configure the VPN Gateway or other network element to block or deny this communications protocol unencrypted L2TP packets across the security boundary and into the private network of the enclave.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-VPN-000490
- Vuln IDs
-
- V-207208
- V-97087
- Rule IDs
-
- SV-207208r561344_rule
- SV-106225
Checks: C-7468r378245_chk
Verify the VPN Gateway is configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). If the VPN Gateway does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-7468r378246_fix
Configure the VPN Gateway to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- SRG-NET-000140-VPN-000500
- Vuln IDs
-
- V-207209
- V-97089
- Rule IDs
-
- SV-207209r561344_rule
- SV-106227
Checks: C-7469r378248_chk
Verify the VPN Gateway uses multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts. If the VPN Gateway does not use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts, this is a finding.
Fix: F-7469r378249_fix
Configure the VPN Gateway to use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001939
- Version
- SRG-NET-000145-VPN-000510
- Vuln IDs
-
- V-207210
- V-97091
- Rule IDs
-
- SV-207210r561344_rule
- SV-106229
Checks: C-7470r378251_chk
Verify the VPN Client implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the VPN Client does not implement multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-7470r378252_fix
Configure the VPN Client to implement multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-NET-000147-VPN-000520
- Vuln IDs
-
- V-207211
- V-97093
- Rule IDs
-
- SV-207211r561344_rule
- SV-106231
Checks: C-7471r378254_chk
Verify the TLS VPN Gateway is configured to use replay-resistant authentication mechanisms for network access to non-privileged accounts. If the TLS VPN is not configured to use replay-resistant authentication mechanisms for network access to non-privileged accounts, this is a finding.
Fix: F-7471r378255_fix
Configure the TLS VPN Gateway to use replay-resistant authentication mechanisms for network access to non-privileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- SRG-NET-000147-VPN-000530
- Vuln IDs
-
- V-207212
- V-97095
- Rule IDs
-
- SV-207212r561344_rule
- SV-106233
Checks: C-7472r378257_chk
Verify the IPsec VPN Gateway uses anti-replay mechanisms for security associations. If the IPsec VPN Gateway does not use anti-replay mechanisms for security associations, this is a finding.
Fix: F-7472r378258_fix
Configure the IPsec VPN Gateway to use anti-replay mechanisms for security associations.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-NET-000148-VPN-000540
- Vuln IDs
-
- V-207213
- V-97097
- Rule IDs
-
- SV-207213r561344_rule
- SV-106235
Checks: C-7473r378260_chk
Verify the VPN Gateway uniquely identifies all network-connected endpoint devices before establishing a connection. If the VPN Gateway does not uniquely identify all network-connected endpoint devices before establishing a connection, this is a finding.
Fix: F-7473r378261_fix
Configure the VPN Gateway to uniquely identify all network-connected endpoint devices before establishing a connection.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-NET-000164-VPN-000560
- Vuln IDs
-
- V-207214
- V-97099
- Rule IDs
-
- SV-207214r561344_rule
- SV-106237
Checks: C-7474r378263_chk
Verify the VPN Gateway to use PKI-based authentication that validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If PKI-based authentication does not validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor, this is a finding.
Fix: F-7474r378264_fix
Configure the VPN Gateway to use PKI-based authentication that validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-NET-000165-VPN-000570
- Vuln IDs
-
- V-207215
- V-97101
- Rule IDs
-
- SV-207215r561344_rule
- SV-106239
Checks: C-7475r378266_chk
If PKI-based authentication is not being used for device authentication, this is not applicable. Verify the site-to-site VPN that uses certificate-based device authentication uses a FIPS-compliant key management process. If the site-to-site VPN that uses certificate-based device authentication does not use a FIPS-compliant key management process, this is a finding.
Fix: F-7475r378267_fix
Configure the site-to-site VPN that uses certificate-based device authentication to use a FIPS-compliant key management process.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-NET-000166-VPN-000580
- Vuln IDs
-
- V-207216
- V-97103
- Rule IDs
-
- SV-207216r561344_rule
- SV-106241
Checks: C-7476r378269_chk
Verify the Remote Access VPN Gateway is configured to use a physically separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication. If the Remote Access VPN Gateway does not use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication, this is a finding.
Fix: F-7476r378270_fix
Configure the Remote Access VPN Gateway to use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-NET-000166-VPN-000590
- Vuln IDs
-
- V-207217
- V-97113
- Rule IDs
-
- SV-207217r561344_rule
- SV-106251
Checks: C-7477r378272_chk
Verify the VPN Gateway maps the authenticated identity to the user account for PKI-based authentication. If the VPN Gateway does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-7477r378273_fix
Configure the VPN Gateway to map the authenticated identity to the user account for PKI-based authentication.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-VPN-000600
- Vuln IDs
-
- V-207218
- V-97115
- Rule IDs
-
- SV-207218r561344_rule
- SV-106253
Checks: C-7478r378275_chk
Verify the VPN Gateway uses FIPS-validated SHA-1 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only). If the VPN Gateway does not use FIPS-validated SHA-1 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only), this is a finding.
Fix: F-7478r378276_fix
Configure the VPN Gateway to use FIPS-validated SHA-1 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification (legacy use only).
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-NET-000169-VPN-000610
- Vuln IDs
-
- V-207219
- V-97117
- Rule IDs
-
- SV-207219r561344_rule
- SV-106255
Checks: C-7479r378278_chk
Configure the VPN Gateway to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users). If the VPN Gateway does not uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users), this is a finding.
Fix: F-7479r378279_fix
Configure the VPN Gateway to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-VPN-000710
- Vuln IDs
-
- V-207220
- V-97119
- Rule IDs
-
- SV-207220r561344_rule
- SV-106257
Checks: C-7480r378281_chk
Verify the VPN Gateway routes sessions to an IDPS for inspection. If the VPN Gateway is not configured to route sessions to an IDPS for inspection, this is a finding.
Fix: F-7480r378282_fix
Configure the VPN Gateway to route sessions to an IDPS for inspection.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- SRG-NET-000213-VPN-000720
- Vuln IDs
-
- V-207221
- V-97121
- Rule IDs
-
- SV-207221r561344_rule
- SV-106259
Checks: C-7481r378284_chk
Verify the VPN Gateway terminates all network connections associated with a communications session at the end of the session. If the VPN Gateway does not terminate all network connections associated with a communications session at the end of the session, this is a finding.
Fix: F-7481r378285_fix
Configure the VPN Gateway to terminate all network connections associated with a communications session at the end of the session.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-VPN-000770
- Vuln IDs
-
- V-207222
- V-97123
- Rule IDs
-
- SV-207222r561344_rule
- SV-106261
Checks: C-7482r378287_chk
Verify the VPN Gateway uses FIPS 140-2 compliant mechanisms for authentication to a cryptographic module. If the VPN Gateway does not use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module, this is a finding.
Fix: F-7482r378288_fix
Configure the VPN Gateway to use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- SRG-NET-000230-VPN-000780
- Vuln IDs
-
- V-207223
- V-97125
- Rule IDs
-
- SV-207223r561344_rule
- SV-106263
Checks: C-7483r378290_chk
Verify the IPsec VPN Gateway uses IKE with SHA1 or greater to protect the authenticity of communications sessions. If the IPsec VPN Gateway is not configured to use IKE with SHA1 or greater to protect the authenticity of communications sessions, this is a finding.
Fix: F-7483r378291_fix
Configure the IPsec VPN Gateway to use IKE with SHA1 or greater to protect the authenticity of communications sessions.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-NET-000231-VPN-000790
- Vuln IDs
-
- V-207224
- V-97127
- Rule IDs
-
- SV-207224r561344_rule
- SV-106265
Checks: C-7484r378293_chk
Verify the VPN Gateway invalidates session identifiers upon user logoff or other session termination. If the VPN Gateway does not invalidate session identifiers upon user logoff or other session termination, this is a finding.
Fix: F-7484r378294_fix
Configure the VPN Gateway to invalidate session identifiers upon user logoff or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-NET-000233-VPN-000800
- Vuln IDs
-
- V-207225
- V-97129
- Rule IDs
-
- SV-207225r561344_rule
- SV-106267
Checks: C-7485r378296_chk
Verify the VPN Gateway recognizes only system-generated session identifiers. If the VPN Gateway does not recognize only system-generated session identifiers, this is a finding.
Fix: F-7485r378297_fix
Configure the VPN Gateway to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-NET-000234-VPN-000810
- Vuln IDs
-
- V-207226
- V-97131
- Rule IDs
-
- SV-207226r561344_rule
- SV-106269
Checks: C-7486r378299_chk
Verify the VPN Gateway generates unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm. If the VPN Gateway does not generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm, this is a finding.
Fix: F-7486r378300_fix
Configure the VPN Gateway to generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-VPN-000820
- Vuln IDs
-
- V-207227
- V-97133
- Rule IDs
-
- SV-207227r561344_rule
- SV-106271
Checks: C-7487r378302_chk
Verify the VPN Gateway is configured to fail to a secure state if system initialization fails, shutdown fails, or aborts fail. If the VPN Gateway does not fail to a secure state if system initialization fails, shutdown fails, or aborts fail, this is a finding.
Fix: F-7487r378303_fix
Configure the VPN Gateway to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-NET-000313-VPN-001050
- Vuln IDs
-
- V-207228
- V-97135
- Rule IDs
-
- SV-207228r561344_rule
- SV-106273
Checks: C-7488r378305_chk
Verify the VPN Gateway is configured to perform an organization-defined action if the audit reveals unauthorized activity. If the VPN Gateway does not be configured to perform an organization-defined action if the audit reveals unauthorized activity, this is a finding.
Fix: F-7488r378306_fix
Configure the VPN Gateway to be configured to perform an organization-defined action if the audit reveals unauthorized activity.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-NET-000314-VPN-001060
- Vuln IDs
-
- V-207229
- V-97137
- Rule IDs
-
- SV-207229r561344_rule
- SV-106275
Checks: C-7489r378308_chk
Configure the VPN Gateway for functionality, such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Configure authorized system administrator accounts to allow them to disconnect or disable remote access to remove user under circumstances defined in the VPN SSP. If the VPN Gateway administrator accounts or security policy is not configured to allow the system administrator to immediately disconnect or disable remote access to devices and/or users when needed, this is a finding.
Fix: F-7489r378309_fix
Configure the VPN Gateway for functionality, such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Configure authorized system administrator accounts to allow them to disconnect or disable remote access to remove user under circumstances defined in the VPN SSP.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000317-VPN-001090
- Vuln IDs
-
- V-207230
- V-97139
- Rule IDs
-
- SV-207230r561344_rule
- SV-106277
Checks: C-7490r378311_chk
Verify all IKE proposals are set to use the AES encryption algorithm. View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm for any IKE proposal is not set to use an AES algorithm, this is a finding.
Fix: F-7490r378312_fix
Configure the IPsec Gateway to use AES with IKE. The option on the IKE Phase 1 proposal may also be configured to use the aes-128-cbc, aes-192-cbc, or aes-256-cbc algorithms.
- RMF Control
- AC-24
- Severity
- M
- CCI
- CCI-002353
- Version
- SRG-NET-000320-VPN-001120
- Vuln IDs
-
- V-207231
- V-97141
- Rule IDs
-
- SV-207231r561344_rule
- SV-106279
Checks: C-7491r378314_chk
Verify the VPN Gateway transmits organization-defined access authorization information using FIPS 140-2-validated cryptography to a compliant authentication server, which enforces access control decisions. If the VPN Gateway does not transmit organization-defined access authorization information using FIPS 140-2-validated cryptography to a compliant authentication server, which enforces access control decisions, this is a finding.
Fix: F-7491r378315_fix
Configure the VPN Gateway to transmit organization-defined access authorization information using FIPS 140-2-validated cryptography to a compliant authentication server, which enforces access control decisions.
- RMF Control
- AC-9
- Severity
- L
- CCI
- CCI-002250
- Version
- SRG-NET-000330-VPN-001220
- Vuln IDs
-
- V-207232
- V-97143
- Rule IDs
-
- SV-207232r561344_rule
- SV-106281
Checks: C-7492r378317_chk
Verity the VPN Gateway notifies the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access). If the VPN Gateway does not notify the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access), this is a finding.
Fix: F-7492r378318_fix
Configure the VPN Gateway to notify the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access).
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001844
- Version
- SRG-NET-000333-VPN-001250
- Vuln IDs
-
- V-207233
- V-97145
- Rule IDs
-
- SV-207233r561344_rule
- SV-106283
Checks: C-7493r378320_chk
Verify the VPN Gateway provides centralized management and configuration of the content to be captured in log records generated by all network components. If the VPN Gateway does not provide centralized management and configuration of the content to be captured in log records generated by all network components, this is a finding.
Fix: F-7493r378321_fix
Configure the VPN Gateway to provide centralized management and configuration of the content to be captured in log records generated by all network components.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000334-VPN-001260
- Vuln IDs
-
- V-207234
- V-97147
- Rule IDs
-
- SV-207234r561344_rule
- SV-106285
Checks: C-7494r378323_chk
Verify the VPN Gateway off-loads log records onto a different system or media than the system being audited. If the VPN Gateway does not off-load audit records onto a different system or media than the system being audited, this is a finding.
Fix: F-7494r378324_fix
Configure the VPN Gateway to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-VPN-001270
- Vuln IDs
-
- V-207235
- V-97149
- Rule IDs
-
- SV-207235r561344_rule
- SV-106287
Checks: C-7495r378326_chk
Verify the VPN Gateway generates a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the VPN Gateway does not generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Fix: F-7495r378327_fix
Configure the VPN Gateway to generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001861
- Version
- SRG-NET-000336-VPN-001280
- Vuln IDs
-
- V-207236
- V-97151
- Rule IDs
-
- SV-207236r561344_rule
- SV-106289
Checks: C-7496r378329_chk
Verify that in the event that communications with the Central Log Server is lost, the VPN Gateway is configured to continue to queue traffic log records locally. If the VPN Gateway does not continue to queue traffic log records locally when communications with the Central Log Server is lost, this is a finding.
Fix: F-7496r378330_fix
Configure the VPN Gateway to continue to queue traffic log records locally when communications with the Central Log Server is lost.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-NET-000337-VPN-001290
- Vuln IDs
-
- V-207237
- V-97153
- Rule IDs
-
- SV-207237r561344_rule
- SV-106291
Checks: C-7497r378332_chk
Verify the IPsec VPN Gateway renegotiates the security association after 8 hours or less, or an organization-defined period. If the IPsec VPN Gateway does not renegotiate the security association after 8 hours or less, or an organization-defined period, this is a finding.
Fix: F-7497r378333_fix
Configure the IPsec VPN Gateway to renegotiate the security association after 8 hours or less, or an organization-defined period.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- SRG-NET-000337-VPN-001300
- Vuln IDs
-
- V-207238
- V-97155
- Rule IDs
-
- SV-207238r561344_rule
- SV-106293
Checks: C-7498r378335_chk
Verify the VPN Gateway renegotiates the security association after 24 hours or less or as defined by the organization. If the VPN Gateway does not renegotiate the security association after 24 hours or less or as defined by the organization, this is a finding.
Fix: F-7498r378336_fix
Configure the VPN Gateway to renegotiate the security association after 24 hours or less or as defined by the organization.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-NET-000341-VPN-001350
- Vuln IDs
-
- V-207239
- V-97157
- Rule IDs
-
- SV-207239r561344_rule
- SV-106295
Checks: C-7499r559885_chk
Verify the VPN Gateway accepts PIV credentials. If the VPN Gateway does not accept the CAC credential, this is a finding.
Fix: F-7499r559886_fix
Configure the VPN Gateway to accept the CAC credential.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-NET-000342-VPN-001360
- Vuln IDs
-
- V-207240
- V-97159
- Rule IDs
-
- SV-207240r561344_rule
- SV-106297
Checks: C-7500r559888_chk
Verify the VPN Gateway electronically verifies the CAC credential. If the VPN Gateway does not electronically verify Personal Identity Verification (PIV) credentials, this is a finding.
Fix: F-7500r559889_fix
Configure the VPN Gateway to electronically verify the CAC credential.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-VPN-001370
- Vuln IDs
-
- V-207241
- V-97177
- Rule IDs
-
- SV-207241r561344_rule
- SV-106315
Checks: C-7501r378344_chk
Verity the VPN Gateway authenticates all network-connected endpoint devices before establishing a connection. If the VPN Gateway does not authenticate all network-connected endpoint devices before establishing a connection, this is a finding.
Fix: F-7501r378345_fix
Configure the VPN Gateway to authenticate all network-connected endpoint devices before establishing a connection.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000352-VPN-001460
- Vuln IDs
-
- V-207242
- V-97179
- Rule IDs
-
- SV-207242r561344_rule
- SV-106317
Checks: C-7502r378347_chk
Verify the VPN Gateway uses an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network. If the VPN Gateway does not use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network, this is a finding.
Fix: F-7502r378348_fix
Configure the VPN Gateway to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002397
- Version
- SRG-NET-000369-VPN-001620
- Vuln IDs
-
- V-207243
- V-97181
- Rule IDs
-
- SV-207243r561344_rule
- SV-106319
Checks: C-7503r378350_chk
Verify the VPN Gateway disables split-tunneling for remote clients VPNs. If the VPN Gateway does not disable split-tunneling for remote clients VPNs, this is a finding.
Fix: F-7503r378351_fix
Configure the VPN Gateway to disable split-tunneling for remote clients VPNs.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VPN-001640
- Vuln IDs
-
- V-207244
- V-97183
- Rule IDs
-
- SV-207244r561344_rule
- SV-106321
Checks: C-7504r378353_chk
Verify the IPsec VPN Gateway specifies Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation. If the IPsec VPN Gateway does not specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation, this is a finding.
Fix: F-7504r378354_fix
Configure the IPsec VPN Gateway to specify Perfect Forward Secrecy (PFS) during Internet Key Exchange (IKE) negotiation.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VPN-001650
- Vuln IDs
-
- V-207245
- V-97185
- Rule IDs
-
- SV-207245r561344_rule
- SV-106323
Checks: C-7505r378356_chk
Verify the VPN Gateway and the remote access client are configured to protect the confidentiality and integrity of transmitted information. If VPN Gateway and Client does not protect the confidentiality and integrity of transmitted information, this is a finding.
Fix: F-7505r378357_fix
Configure the VPN Gateway and the remote access client to protect the confidentiality and integrity of transmitted information.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002423
- Version
- SRG-NET-000375-VPN-001690
- Vuln IDs
-
- V-207246
- V-97187
- Rule IDs
-
- SV-207246r561344_rule
- SV-106325
Checks: C-7506r378359_chk
Verify the IPsec VPN Gateway uses Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organizations sites or between a gateway and remote end-stations. If the IPsec VPN Gateway must use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organizations sites or between a gateway and remote end-stations, this is a finding.
Fix: F-7506r378360_fix
Configure the IPsec VPN Gateway to use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organizations sites or between a gateway and remote end-stations.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-NET-000400-VPN-001940
- Vuln IDs
-
- V-207247
- V-97189
- Rule IDs
-
- SV-207247r561344_rule
- SV-106327
Checks: C-7507r378362_chk
For accounts using password authentication, verify the VPN Gateway uses FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process. For accounts using password authentication, if the VPN Gateway does not use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process, this is a finding.
Fix: F-7507r378363_fix
For accounts using password authentication, configure the VPN Gateway to use FIPS-validated SHA-1 or later protocol to protect the integrity of the password authentication process.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-VPN-001980
- Vuln IDs
-
- V-207248
- V-97191
- Rule IDs
-
- SV-207248r561344_rule
- SV-106329
Checks: C-7508r378365_chk
Verify the VPN Gateway generates log records when successful and/or unsuccessful VPN connection attempts occur. If the VPN Gateway does not generate log records when successful and/or unsuccessful VPN connection attempts occur, this is a finding.
Fix: F-7508r378366_fix
Configure the VPN Gateway to generate log records when successful and/or unsuccessful VPN connection attempts occur.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VPN-002160
- Vuln IDs
-
- V-207249
- V-97193
- Rule IDs
-
- SV-207249r561344_rule
- SV-106331
Checks: C-7509r378368_chk
Verify the VPN Gateway uses a FIPS-validated cryptographic module to generate cryptographic hashes. If the VPN Gateway does not use a FIPS-validated cryptographic module to generate cryptographic hashes, this is a finding.
Fix: F-7509r378369_fix
Configure the VPN Gateway to use a FIPS-validated cryptographic module to generate cryptographic hashes.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VPN-002170
- Vuln IDs
-
- V-207250
- V-97195
- Rule IDs
-
- SV-207250r561344_rule
- SV-106333
Checks: C-7510r378371_chk
Verify the VPN Gateway uses a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality. If the VPN Gateway does not use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality, this is a finding.
Fix: F-7510r378372_fix
Configure the VPN Gateway to use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VPN-002180
- Vuln IDs
-
- V-207251
- V-97197
- Rule IDs
-
- SV-207251r561344_rule
- SV-106335
Checks: C-7511r378374_chk
Verify the IPsec VPN Gateway IKE uses a NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic. If the IPsec VPN Gateway IKE does not use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic, this is a finding.
Fix: F-7511r378375_fix
Configure the IPsec VPN Gateway IKE to use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VPN-002220
- Vuln IDs
-
- V-207252
- V-97199
- Rule IDs
-
- SV-207252r561344_rule
- SV-106337
Checks: C-7512r378377_chk
Verify the IKE protocol is specified for all IPsec VPNs. If the IKE protocol is not specified as an option on all VPN gateways, this is a finding.
Fix: F-7512r378378_fix
Configure the IPsec VPN Gateway to use IKE and IPsec VPN SAs.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VPN-002230
- Vuln IDs
-
- V-207253
- V-97201
- Rule IDs
-
- SV-207253r561344_rule
- SV-106339
Checks: C-7513r378380_chk
Verify the VPN Gateway does not accept certificates that have been revoked when using PKI for authentication. If the VPN Gateway accepts certificates that have been revoked when using PKI for authentication, this is a finding.
Fix: F-7513r378381_fix
Configure the VPN Gateway to not accept certificates that have been revoked when using PKI for authentication.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-NET-000518-VPN-002280
- Vuln IDs
-
- V-207254
- V-97203
- Rule IDs
-
- SV-207254r561344_rule
- SV-106341
Checks: C-7514r378383_chk
Verify the VPN Client logout function is configured to terminate the session on/with the VPN Gateway. If the VPN Client logout function does not terminate the session on/with the VPN Gateway, this is a finding.
Fix: F-7514r378384_fix
Configure the VPN Client logout log out function must be configured to terminate the session on/with the VPN Gateway.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-NET-000519-VPN-002290
- Vuln IDs
-
- V-207255
- V-97205
- Rule IDs
-
- SV-207255r561344_rule
- SV-106343
Checks: C-7515r378386_chk
Verify the VPN Client displays an explicit logout message to users indicating the reliable termination of authenticated communications sessions. If the VPN Client does not display an explicit logout message to users indicating the reliable termination of authenticated communications sessions, this is a finding.
Fix: F-7515r378387_fix
Configure the VPN Client to display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- SRG-NET-000522-VPN-002320
- Vuln IDs
-
- V-207256
- V-97207
- Rule IDs
-
- SV-207256r561344_rule
- SV-106345
Checks: C-7516r378389_chk
Verify the VPN Gateway stores only cryptographic representations of the PSK. If the VPN Gateway does not store only cryptographic representations of the PSK, this is a finding.
Fix: F-7516r378390_fix
Configure the VPN Gateway to store only cryptographic representations of the PSK.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000525-VPN-002330
- Vuln IDs
-
- V-207257
- V-97209
- Rule IDs
-
- SV-207257r561344_rule
- SV-106347
Checks: C-7517r378392_chk
Verify all Internet Key Exchange (IKE) proposals are set to use the AES encryption algorithm. View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm for any IPsec proposal is not set to use an AES algorithm, this is a finding.
Fix: F-7517r378393_fix
Configure the IPsec Gateway to use AES for the IPsec proposal. The following example commands configure the IPsec (phase 2) proposals. The option may also be configured to use the aes-128-cbc, aes-192-cbc, or aes-256-cbc algorithms.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000530-VPN-002340
- Vuln IDs
-
- V-207258
- V-97211
- Rule IDs
-
- SV-207258r561344_rule
- SV-106349
Checks: C-7518r378395_chk
Verify the TLS VPN Gateway that supports Government-only services prohibits client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0. If the TLS VPN Gateway that supports Government-only services does not prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0, this is a finding.
Fix: F-7518r378396_fix
Configure the TLS VPN Gateway that supports Government-only services to prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000540-VPN-002350
- Vuln IDs
-
- V-207259
- V-97213
- Rule IDs
-
- SV-207259r561344_rule
- SV-106351
Checks: C-7519r378398_chk
Verify the TLS VPN Gateway that supports citizen- or business-facing network devices prohibits client negotiation to SSL 2.0 or SSL 3.0. If the TLS VPN Gateway that supports citizen- or business-facing network devices does not prohibit client negotiation to SSL 2.0 or SSL 3.0, this is a finding.
Fix: F-7519r378399_fix
Configure the TLS VPN Gateway that supports citizen- or business-facing network devices to prohibit client negotiation to SSL 2.0 or SSL 3.0.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-NET-000550-VPN-002360
- Vuln IDs
-
- V-207260
- V-97215
- Rule IDs
-
- SV-207260r561344_rule
- SV-106353
Checks: C-7520r378401_chk
Verify the VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) is configured to use SNMPv3 to use FIPS-validated AES cipher block algorithm. If the VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) does not configure SNMPv3 to use FIPS-validated AES cipher block algorithm, this is a finding.
Fix: F-7520r378402_fix
The VPN Gateway that provides a Simple Network Management Protocol (SNMP) Network Management System (NMS) must configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000565-VPN-002390
- Vuln IDs
-
- V-207261
- V-97217
- Rule IDs
-
- SV-207261r561344_rule
- SV-106355
Checks: C-7521r378404_chk
Verify the VPN Gateway uses an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network. If the VPN Gateway does not use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network, this is a finding.
Fix: F-7521r378405_fix
Configure the VPN Gateway to use an approved High Assurance Commercial Solution for Classified (CSfC) cryptographic algorithm for remote access to a classified network.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000565-VPN-002400
- Vuln IDs
-
- V-207262
- V-97219
- Rule IDs
-
- SV-207262r561344_rule
- SV-106357
Checks: C-7522r378407_chk
Verify the IPsec VPN Gateway Internet Key Exchange (IKE) uses cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network. If the IPsec VPN Gateway Internet Key Exchange (IKE) does not use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network, this is a finding.
Fix: F-7522r378408_fix
Configure the IPsec VPN Gateway Internet Key Exchange (IKE) to use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-NET-000580-VPN-002410
- Vuln IDs
-
- V-207263
- V-97221
- Rule IDs
-
- SV-207263r561344_rule
- SV-106359
Checks: C-7523r378410_chk
Verify the VPN Gateway validates TLS certificates by performing RFC 5280-compliant certification path validation. If the VPN Gateway does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.
Fix: F-7523r378411_fix
Configure the VPN Gateway to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000585-VPN-002420
- Vuln IDs
-
- V-207264
- V-97223
- Rule IDs
-
- SV-207264r561344_rule
- SV-106361
Checks: C-7524r378413_chk
Verify the VPN Gateway uses FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use). If the VPN Gateway does not use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use), this is a finding.
Fix: F-7524r378414_fix
Configure the VPN Gateway to use FIPS-validated SHA-2 or higher hash function for digital signature generation and verification (non-legacy use).