Virtual Private Network (VPN) Security Requirements Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +9 −12 ✎ 5
Comparison against the immediately-prior release (V2R6). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 9
- V-264328 Medium The VPN Gateway must employ organization-defined controls by type of denial of service (DoS) to achieve the DoS objective.
- V-264329 Medium The VPN Gateway must implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- V-264330 Medium The VPN Gateway must establish organization-defined alternate communications paths for system operations organizational command and control.
- V-264331 Medium The VPN Gateway must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- V-264332 Medium The VPN Gateway must configure OCSP to ensure revoked user certificates are prohibited from establishing an allowed session.
- V-264333 Medium The VPN Gateway must configure OCSP to ensure revoked machine certificates are prohibited from establishing an allowed session.
- V-264334 Medium The VPN Gateway providing authentication intermediary services must only accept end entity certificates (user or machine) issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of VPN sessions.
- V-264335 Medium The TLS VPN must be configured to limit authenticated client sessions to initial session source IP.
- V-264336 Medium The VPN Gateway must use Always On VPN connections for remote computing.
Removed rules 12
- V-207188 Low The VPN Gateway must notify the user, upon successful logon (access), of the number of unsuccessful logon (access) attempts since the last successful logon (access).
- V-207231 Medium The VPN Gateway must transmit organization-defined access authorization information using FIPS 140-2-validated cryptography to a compliant authentication server, which enforces access control decisions.
- V-207232 Low The VPN Gateway must notify the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access).
- V-207233 Medium The VPN Gateway must provide centralized management and configuration of the content to be captured in log records generated by all network components.
- V-207236 Medium When communications with the Central Log Server is lost, the VPN Gateway must continue to queue traffic log records locally.
- V-207246 Medium The IPsec VPN Gateway must use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organization's sites or between a gateway and remote end-stations.
- V-260890 Medium The VPN Gateway must implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- V-260891 Medium The VPN Gateway must configure OCSP to ensure revoked user certificates are prohibited from establishing an allowed session.
- V-260892 Medium The VPN Gateway must configure OCSP to ensure revoked machine certificates are prohibited from establishing an allowed session.
- V-260893 Medium The VPN Gateway providing authentication intermediary services must only accept end entity certificates (user or machine) issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of VPN sessions.
- V-260894 Medium The TLS VPN must be configured to limit authenticated client sessions to initial session source IP.
- V-260895 Medium The VPN Gateway must use Always On VPN connections for remote computing.
Content changes 5
- V-207210 Medium descriptioncheckfix The VPN Client must implement multifactor authentication for network access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-207211 Medium descriptioncheckfix The TLS VPN must be configured to use replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- V-207237 Medium description The VPN Gateway must renegotiate the IPsec security association (SA) after eight hours or less.
- V-207238 Medium description The VPN Gateway must renegotiate the IKE security association (SA) after eight hours or less.
- V-207256 Medium description For site-to-site, VPN Gateway must be configured to store only cryptographic representations of pre-shared Keys (PSKs).
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-VPN-000040
- Vuln IDs
-
- V-207184
- V-97041
- Rule IDs
-
- SV-207184r695317_rule
- SV-106179
Checks: C-7444r695316_chk
Verify the VPN Gateway has an inbound and outbound traffic security policy which is in compliance with information flow control policies (e.g., IPsec policy configuration). Review network device configurations and topology diagrams. Verify encapsulated or encrypted traffic received from other enclaves with different security policies terminate at the perimeter for filtering and content inspection by a firewall and IDPS before gaining access to the private network. If the IPsec VPN Gateway does not use Encapsulating Security Payload (ESP) in tunnel mode for establishing secured paths to transport traffic between the organizations sites or between a gateway and remote end-stations, this is a finding,
Fix: F-7444r378174_fix
Configure the VPN Gateway to ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies (e.g., IPsec policy configuration). Also, configure the VPN gateway to forward encapsulated or encrypted traffic received from other enclaves with different security policies to the perimeter firewall and IDPS before traffic is passed to the private network.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- SRG-NET-000041-VPN-000110
- Vuln IDs
-
- V-207185
- V-97043
- Rule IDs
-
- SV-207185r608988_rule
- SV-106181
Checks: C-7445r378176_chk
If the user/remote client connection banner is the same as the banner configured as part of the NDM SRG, then this is not applicable. Determine if the network device is configured to present a DoD-approved banner that is formatted in accordance with DoD policy. If the Remote Access VPN Gateway or VPN client does not display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the network, this is a finding.
Fix: F-7445r378177_fix
Configure the Remote Access VPN to display the Standard Mandatory DoD Notice and Consent Banner in accordance with DoD policy before granting access to the device. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- SRG-NET-000042-VPN-000120
- Vuln IDs
-
- V-207186
- V-97045
- Rule IDs
-
- SV-207186r608988_rule
- SV-106183
Checks: C-7446r378179_chk
If the user/remote client connection banner is the same as the banner configured as part of the NDM SRG, then this is not applicable. Verify the ALG retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. If the Remote Access VPN Gateway and/or client does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
Fix: F-7446r378180_fix
Configure the Remote Access VPN Gateway and/or client to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- SRG-NET-000043-VPN-000130
- Vuln IDs
-
- V-207187
- V-97047
- Rule IDs
-
- SV-207187r608988_rule
- SV-106185
Checks: C-7447r378182_chk
Verify the publicly accessible VPN Gateway displays the Standard Mandatory DoD Notice and Consent Banner before granting access to the system. The banner must be formatted in accordance with DTM-08-060. Use the following verbiage for network elements that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." If the publicly accessible VPN Gateway does not display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system, this is a finding.
Fix: F-7447r378183_fix
Configure the publicly accessible VPN Gateway to display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- SRG-NET-000053-VPN-000170
- Vuln IDs
-
- V-207189
- V-97051
- Rule IDs
-
- SV-207189r608988_rule
- SV-106189
Checks: C-7449r378188_chk
Inspect the VPN Gateway configuration. Verify the number of concurrent sessions for user accounts to 1 or to an organization-defined number (defined in the SSP). If the VPN Gateway does not limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number, this is a finding.
Fix: F-7449r378189_fix
Configure the VPN Gateway to limit the number of concurrent sessions for user accounts to 1 or to an organization-defined number, as documented in the SSP.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000062-VPN-000200
- Vuln IDs
-
- V-207190
- V-97053
- Rule IDs
-
- SV-207190r803417_rule
- SV-106191
Checks: C-7450r378191_chk
Verify the TLS VPN Gateway is configured to use TLS 1.2 or higher to protect the confidentiality of sensitive data during transmission. If the TLS VPN Gateway does not use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data during transmission, this is a finding.
Fix: F-7450r378192_fix
Configure the TLS VPN Gateway to use TLS 1.2, at a minimum, to protect the confidentiality of sensitive data for transmission.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000063-VPN-000210
- Vuln IDs
-
- V-207191
- V-97055
- Rule IDs
-
- SV-207191r803418_rule
- SV-106193
Checks: C-7451r378194_chk
Verify the remote access VPN Gateway uses a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions. If the remote access VPN Gateway does not use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions, this is a finding.
Fix: F-7451r378195_fix
Configure the remote access VPN Gateway to use a digital signature generated using FIPS-validated algorithms and an approved hash function to protect the integrity of remote access sessions.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000063-VPN-000220
- Vuln IDs
-
- V-207192
- V-97057
- Rule IDs
-
- SV-207192r916146_rule
- SV-106195
Checks: C-7452r916144_chk
Verify the VPN Gateway uses IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions. If the VPN Gateway does not use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions, this is a finding.
Fix: F-7452r916145_fix
Configure the VPN Gateway to use IPsec with SHA-2 at 384 bits or greater for hashing to protect the integrity of remote access sessions.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000074-VPN-000250
- Vuln IDs
-
- V-207193
- V-97059
- Rule IDs
-
- SV-207193r916149_rule
- SV-106197
Checks: C-7453r916147_chk
Verify all IKE proposals are set to use DH Group of 16 or greater for IKE Phase 1. View the IKE options dh-group option. If the IKE option is not set to use DH Group of 16 or greater for IKE Phase 1, this is a finding.
Fix: F-7453r916148_fix
Configure the IPsec VPN to use the DH Group of 16 or greater for IKE Phase 1.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- SRG-NET-000075-VPN-000260
- Vuln IDs
-
- V-207194
- V-97225
- Rule IDs
-
- SV-207194r608988_rule
- SV-106363
Checks: C-7454r378203_chk
If L2TP communications protocol is not used, this is not applicable. Verify L2TPv3 sessions are configured to authenticate the traffic before transit. L2TPv3 sessions must be authenticated prior to transporting traffic. If L2TPv3 sessions do not require authentication, this is a finding.
Fix: F-7454r378204_fix
If the site-to-site VPN implementation uses L2TPv3, configure L2TPv3 sessions to authenticate the traffic before transit.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- SRG-NET-000077-VPN-000280
- Vuln IDs
-
- V-207195
- V-97061
- Rule IDs
-
- SV-207195r608988_rule
- SV-106199
Checks: C-7455r378206_chk
Verify the VPN Gateway generates log records containing information to establish what type of events occurred. If the VPN Gateway does not generate log records containing information to establish what type of events occurred, this is a finding.
Fix: F-7455r378207_fix
Configure the VPN Gateway to generate log records containing information to establish what type of events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- SRG-NET-000078-VPN-000290
- Vuln IDs
-
- V-207196
- V-97063
- Rule IDs
-
- SV-207196r608988_rule
- SV-106201
Checks: C-7456r378209_chk
Configure the VPN Gateway generates log records containing information to establish when (date and time) the events occurred. If the VPN Gateway does not generate log records containing information to establish when (date and time) the events occurred, this is a finding.
Fix: F-7456r378210_fix
Configure the VPN Gateway to generate log records containing information to establish when (date and time) the events occurred.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-001487
- Version
- SRG-NET-000079-VPN-000300
- Vuln IDs
-
- V-207197
- V-97065
- Rule IDs
-
- SV-207197r608988_rule
- SV-106203
Checks: C-7457r378212_chk
Verify the VPN Gateway generates log records containing information that establishes the identity of any individual or process associated with the event. If the VPN Gateway does not generate log records containing information that establishes the identity of any individual or process associated with the event, this is a finding.
Fix: F-7457r378213_fix
Configure the VPN Gateway to generate log records containing information that establishes the identity of any individual or process associated with the event.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000132
- Version
- SRG-NET-000088-VPN-000310
- Vuln IDs
-
- V-207198
- V-97067
- Rule IDs
-
- SV-207198r608988_rule
- SV-106205
Checks: C-7458r378215_chk
Verify the VPN Gateway generates log records containing information to establish where the events occurred. If the VPN Gateway does not generate log records containing information to establish where the events occurred, this is a finding.
Fix: F-7458r378216_fix
Configure the VPN Gateway to generates log records containing information to establish where the events occurred.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- SRG-NET-000089-VPN-000330
- Vuln IDs
-
- V-207199
- V-97069
- Rule IDs
-
- SV-207199r608988_rule
- SV-106207
Checks: C-7459r378218_chk
Verify the VPN Gateway generates log records containing information to establish the source of the events. If the VPN Gateway does not generate log records containing information to establish the source of the events, this is a finding.
Fix: F-7459r378219_fix
Configure the VPN Gateway to generate log records containing information to establish the source of the events.
- RMF Control
- AU-3
- Severity
- M
- CCI
- CCI-000134
- Version
- SRG-NET-000091-VPN-000350
- Vuln IDs
-
- V-207200
- V-97071
- Rule IDs
-
- SV-207200r608988_rule
- SV-106209
Checks: C-7460r378221_chk
Examine the log configuration on the VPN Gateway or view several alert events on the organization's central audit server. Alternatively, examine the Central Log Server to see if it contains information about success or failure of client connection attempts or other events. If the traffic log entries do not include the success or failure of connection attempts and other events, this is a finding.
Fix: F-7460r378222_fix
Configure the VPN Gateway to generate log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the client connection attempts.
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-000162
- Version
- SRG-NET-000098-VPN-000370
- Vuln IDs
-
- V-207201
- V-97073
- Rule IDs
-
- SV-207201r608988_rule
- SV-106211
Checks: C-7461r378224_chk
Verify the VPN Gateway protects log information from unauthorized read access if all or some of this data is stored locally. If the VPN Gateway does not protect log information from unauthorized read access if all or some of this data is stored locally, this is a finding.
Fix: F-7461r378225_fix
Configure the VPN Gateway to protect log information from unauthorized read access if all or some of this data is stored locally.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- SRG-NET-000099-VPN-000380
- Vuln IDs
-
- V-207202
- V-97075
- Rule IDs
-
- SV-207202r608988_rule
- SV-106213
Checks: C-7462r378227_chk
Verify the VPN Gateway log is configured to protect audit information from unauthorized modification when stored locally. The VPN Gateway log must protect audit information from unauthorized modification when stored locally, this is a finding.
Fix: F-7462r378228_fix
Configure the VPN Gateway log to protect audit information from unauthorized modification when stored locally. The method used depends on system architecture and design. Examples: ensuring log files receive the proper file system permissions and limiting log data locations.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000164
- Version
- SRG-NET-000100-VPN-000390
- Vuln IDs
-
- V-207203
- V-97077
- Rule IDs
-
- SV-207203r608988_rule
- SV-106215
Checks: C-7463r378230_chk
Verify the VPN Gateway is configured to protect audit information from unauthorized deletion when stored locally. If the VPN Gateway does not protect audit information from unauthorized deletion when stored locally, this is a finding.
Fix: F-7463r378231_fix
Configure the VPN Gateway to protect audit information from unauthorized deletion when stored locally. Ensure log files receive the proper file system permissions and limiting log data locations.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000450
- Vuln IDs
-
- V-207204
- V-97079
- Rule IDs
-
- SV-207204r608988_rule
- SV-106217
Checks: C-7464r378233_chk
View the configured security services. Compare the services that are enabled, including the port, services, protocols, and functions. If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.
Fix: F-7464r378234_fix
Ensure functions, ports, protocols, and services identified on the PPSM CAL are not used for system services configuration. View the configured security services. Compare the services that are enabled, including the port, services, protocols, and functions. Consult the product knowledge base and configuration guides to determine the commands for disabling each port, protocols, services, or functions that is not in compliance with the PPSM CAL and vulnerability assessments.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000460
- Vuln IDs
-
- V-207205
- V-97081
- Rule IDs
-
- SV-207205r608988_rule
- SV-106219
Checks: C-7465r378236_chk
Verify the IPsec VPN Gateway uses IKEv2 for IPsec VPN security associations. If the IPsec VPN Gateway must use IKEv2 for IPsec VPN security associations, this is a finding.
Fix: F-7465r378237_fix
Configure the IPsec VPN Gateway to use IKEv2 for IPsec VPN security associations.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000470
- Vuln IDs
-
- V-207206
- V-97083
- Rule IDs
-
- SV-207206r608988_rule
- SV-106221
Checks: C-7466r378239_chk
Verify the VPN Gateway is configured to prohibit PPTP and L2F. If the VPN Gateway does not be configured to prohibit PPTP and L2F, this is a finding.
Fix: F-7466r378240_fix
Configure the VPN Gateway to prohibit PPTP and L2F.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- SRG-NET-000132-VPN-000480
- Vuln IDs
-
- V-207207
- V-97085
- Rule IDs
-
- SV-207207r608988_rule
- SV-106223
Checks: C-7467r378242_chk
If L2TP communications protocol is not used, this is not applicable. Verify the VPN Gateway or another network element (e.g., firewall) is configure to block or deny L2TP packets with a destination address within the private network of the enclave. If L2TP communications are allowed to cross the security boundary into the private network of the enclave, this is a finding.
Fix: F-7467r378243_fix
If L2TP is used for encapsulation, configure the VPN Gateway or other network element to block or deny this communications protocol unencrypted L2TP packets across the security boundary and into the private network of the enclave.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- SRG-NET-000138-VPN-000490
- Vuln IDs
-
- V-207208
- V-97087
- Rule IDs
-
- SV-207208r608988_rule
- SV-106225
Checks: C-7468r378245_chk
Verify the VPN Gateway is configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users). If the VPN Gateway does not uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users), this is a finding.
Fix: F-7468r378246_fix
Configure the VPN Gateway to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- SRG-NET-000140-VPN-000500
- Vuln IDs
-
- V-207209
- V-97089
- Rule IDs
-
- SV-207209r954210_rule
- SV-106227
Checks: C-7469r378248_chk
Verify the VPN Gateway uses multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts. If the VPN Gateway does not use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts, this is a finding.
Fix: F-7469r378249_fix
Configure the VPN Gateway to use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.
- RMF Control
- Severity
- M
- CCI
- CCI-004046
- Version
- SRG-NET-000145-VPN-000510
- Vuln IDs
-
- V-207210
- V-97091
- Rule IDs
-
- SV-207210r984299_rule
- SV-106229
Checks: C-7470r984297_chk
Verify the VPN Client implements multifactor authentication for network access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access. If the VPN Client does not implement multifactor authentication for network access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-7470r984298_fix
Configure the VPN Client to implement multifactor authentication for network access to nonprivileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-NET-000147-VPN-000520
- Vuln IDs
-
- V-207211
- V-97093
- Rule IDs
-
- SV-207211r984302_rule
- SV-106231
Checks: C-7471r984300_chk
Verify the TLS VPN Gateway is configured to use replay-resistant authentication mechanisms for network access to nonprivileged accounts. If the TLS VPN is not configured to use replay-resistant authentication mechanisms for network access to nonprivileged accounts, this is a finding.
Fix: F-7471r984301_fix
Configure the TLS VPN Gateway to use replay-resistant authentication mechanisms for network access to nonprivileged accounts.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SRG-NET-000147-VPN-000530
- Vuln IDs
-
- V-207212
- V-97095
- Rule IDs
-
- SV-207212r984303_rule
- SV-106233
Checks: C-7472r378257_chk
Verify the IPsec VPN Gateway uses anti-replay mechanisms for security associations. If the IPsec VPN Gateway does not use anti-replay mechanisms for security associations, this is a finding.
Fix: F-7472r378258_fix
Configure the IPsec VPN Gateway to use anti-replay mechanisms for security associations.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- SRG-NET-000148-VPN-000540
- Vuln IDs
-
- V-207213
- V-97097
- Rule IDs
-
- SV-207213r608988_rule
- SV-106235
Checks: C-7473r378260_chk
Verify the VPN Gateway uniquely identifies all network-connected endpoint devices before establishing a connection. If the VPN Gateway does not uniquely identify all network-connected endpoint devices before establishing a connection, this is a finding.
Fix: F-7473r378261_fix
Configure the VPN Gateway to uniquely identify all network-connected endpoint devices before establishing a connection.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-NET-000164-VPN-000560
- Vuln IDs
-
- V-207214
- V-97099
- Rule IDs
-
- SV-207214r608988_rule
- SV-106237
Checks: C-7474r378263_chk
Verify the VPN Gateway to use PKI-based authentication that validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor. If PKI-based authentication does not validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor, this is a finding.
Fix: F-7474r378264_fix
Configure the VPN Gateway to use PKI-based authentication that validates certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000186
- Version
- SRG-NET-000165-VPN-000570
- Vuln IDs
-
- V-207215
- V-97101
- Rule IDs
-
- SV-207215r608988_rule
- SV-106239
Checks: C-7475r378266_chk
If PKI-based authentication is not being used for device authentication, this is not applicable. Verify the site-to-site VPN that uses certificate-based device authentication uses a FIPS-compliant key management process. If the site-to-site VPN that uses certificate-based device authentication does not use a FIPS-compliant key management process, this is a finding.
Fix: F-7475r378267_fix
Configure the site-to-site VPN that uses certificate-based device authentication to use a FIPS-compliant key management process.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-NET-000166-VPN-000580
- Vuln IDs
-
- V-207216
- V-97103
- Rule IDs
-
- SV-207216r608988_rule
- SV-106241
Checks: C-7476r378269_chk
Verify the Remote Access VPN Gateway is configured to use a physically separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication. If the Remote Access VPN Gateway does not use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication, this is a finding.
Fix: F-7476r378270_fix
Configure the Remote Access VPN Gateway to use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- SRG-NET-000166-VPN-000590
- Vuln IDs
-
- V-207217
- V-97113
- Rule IDs
-
- SV-207217r608988_rule
- SV-106251
Checks: C-7477r378272_chk
Verify the VPN Gateway maps the authenticated identity to the user account for PKI-based authentication. If the VPN Gateway does not map the authenticated identity to the user account for PKI-based authentication, this is a finding.
Fix: F-7477r378273_fix
Configure the VPN Gateway to map the authenticated identity to the user account for PKI-based authentication.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- SRG-NET-000168-VPN-000600
- Vuln IDs
-
- V-207218
- V-97115
- Rule IDs
-
- SV-207218r803427_rule
- SV-106253
Checks: C-7478r803425_chk
Verify the VPN Gateway uses FIPS-validated SHA-2 or higher. If the VPN Gateway does not use FIPS-validated SHA-2 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification, this is a finding.
Fix: F-7478r803426_fix
Configure the VPN Gateway to use FIPS-validated SHA-2 or higher hash function to protect the integrity of hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, hash-only applications, and digital signature verification.
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- SRG-NET-000169-VPN-000610
- Vuln IDs
-
- V-207219
- V-97117
- Rule IDs
-
- SV-207219r608988_rule
- SV-106255
Checks: C-7479r378278_chk
Configure the VPN Gateway to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users). If the VPN Gateway does not uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users), this is a finding.
Fix: F-7479r378279_fix
Configure the VPN Gateway to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- SRG-NET-000205-VPN-000710
- Vuln IDs
-
- V-207220
- V-97119
- Rule IDs
-
- SV-207220r608988_rule
- SV-106257
Checks: C-7480r378281_chk
Verify the VPN Gateway routes sessions to an IDPS for inspection. If the VPN Gateway is not configured to route sessions to an IDPS for inspection, this is a finding.
Fix: F-7480r378282_fix
Configure the VPN Gateway to route sessions to an IDPS for inspection.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- SRG-NET-000213-VPN-000720
- Vuln IDs
-
- V-207221
- V-97121
- Rule IDs
-
- SV-207221r971530_rule
- SV-106259
Checks: C-7481r378284_chk
Verify the VPN Gateway terminates all network connections associated with a communications session at the end of the session. If the VPN Gateway does not terminate all network connections associated with a communications session at the end of the session, this is a finding.
Fix: F-7481r378285_fix
Configure the VPN Gateway to terminate all network connections associated with a communications session at the end of the session.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-VPN-000770
- Vuln IDs
-
- V-207222
- V-97123
- Rule IDs
-
- SV-207222r608988_rule
- SV-106261
Checks: C-7482r378287_chk
Verify the VPN Gateway uses FIPS 140-2 compliant mechanisms for authentication to a cryptographic module. If the VPN Gateway does not use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module, this is a finding.
Fix: F-7482r378288_fix
Configure the VPN Gateway to use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- SRG-NET-000230-VPN-000780
- Vuln IDs
-
- V-207223
- V-97125
- Rule IDs
-
- SV-207223r916152_rule
- SV-106263
Checks: C-7483r916150_chk
Verify the IPsec VPN Gateway uses IKE with SHA-2 at 384 bits or greater to protect the authenticity of communications sessions. If the IPsec VPN Gateway is not configured to use IKE with SHA-2 at 384 bits or greater to protect the authenticity of communications sessions, this is a finding.
Fix: F-7483r916151_fix
Configure the IPsec VPN Gateway to use IKE with SHA-2 at 384 bits or greater to protect the authenticity of communications sessions.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001185
- Version
- SRG-NET-000231-VPN-000790
- Vuln IDs
-
- V-207224
- V-97127
- Rule IDs
-
- SV-207224r608988_rule
- SV-106265
Checks: C-7484r378293_chk
Verify the VPN Gateway invalidates session identifiers upon user logoff or other session termination. If the VPN Gateway does not invalidate session identifiers upon user logoff or other session termination, this is a finding.
Fix: F-7484r378294_fix
Configure the VPN Gateway to invalidate session identifiers upon user logoff or other session termination.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001664
- Version
- SRG-NET-000233-VPN-000800
- Vuln IDs
-
- V-207225
- V-97129
- Rule IDs
-
- SV-207225r608988_rule
- SV-106267
Checks: C-7485r378296_chk
Verify the VPN Gateway recognizes only system-generated session identifiers. If the VPN Gateway does not recognize only system-generated session identifiers, this is a finding.
Fix: F-7485r378297_fix
Configure the VPN Gateway to recognize only system-generated session identifiers.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- SRG-NET-000234-VPN-000810
- Vuln IDs
-
- V-207226
- V-97131
- Rule IDs
-
- SV-207226r803431_rule
- SV-106269
Checks: C-7486r378299_chk
Verify the VPN Gateway generates unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm. If the VPN Gateway does not generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm, this is a finding.
Fix: F-7486r378300_fix
Configure the VPN Gateway to generate unique session identifiers using FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001190
- Version
- SRG-NET-000235-VPN-000820
- Vuln IDs
-
- V-207227
- V-97133
- Rule IDs
-
- SV-207227r608988_rule
- SV-106271
Checks: C-7487r378302_chk
Verify the VPN Gateway is configured to fail to a secure state if system initialization fails, shutdown fails, or aborts fail. If the VPN Gateway does not fail to a secure state if system initialization fails, shutdown fails, or aborts fail, this is a finding.
Fix: F-7487r378303_fix
Configure the VPN Gateway to fail to a secure state if system initialization fails, shutdown fails, or aborts fail.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002314
- Version
- SRG-NET-000313-VPN-001050
- Vuln IDs
-
- V-207228
- V-97135
- Rule IDs
-
- SV-207228r856701_rule
- SV-106273
Checks: C-7488r378305_chk
Verify the VPN Gateway is configured to perform an organization-defined action if the audit reveals unauthorized activity. If the VPN Gateway does not be configured to perform an organization-defined action if the audit reveals unauthorized activity, this is a finding.
Fix: F-7488r378306_fix
Configure the VPN Gateway to be configured to perform an organization-defined action if the audit reveals unauthorized activity.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-002322
- Version
- SRG-NET-000314-VPN-001060
- Vuln IDs
-
- V-207229
- V-97137
- Rule IDs
-
- SV-207229r856702_rule
- SV-106275
Checks: C-7489r378308_chk
Configure the VPN Gateway for functionality, such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Configure authorized system administrator accounts to allow them to disconnect or disable remote access to remove user under circumstances defined in the VPN SSP. If the VPN Gateway administrator accounts or security policy is not configured to allow the system administrator to immediately disconnect or disable remote access to devices and/or users when needed, this is a finding.
Fix: F-7489r378309_fix
Configure the VPN Gateway for functionality, such as automatic disconnect (or user-initiated disconnect) in case of adverse information based on an indicator of compromise or attack. Configure authorized system administrator accounts to allow them to disconnect or disable remote access to remove user under circumstances defined in the VPN SSP.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000317-VPN-001090
- Vuln IDs
-
- V-207230
- V-97139
- Rule IDs
-
- SV-207230r987747_rule
- SV-106277
Checks: C-7490r378311_chk
Verify all IKE proposals are set to use the AES encryption algorithm. View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm for any IKE proposal is not set to use an AES algorithm, this is a finding.
Fix: F-7490r378312_fix
Configure the IPsec Gateway to use AES with IKE. The option on the IKE Phase 1 proposal may also be configured to use the aes-128-cbc, aes-192-cbc, or aes-256-cbc algorithms.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- SRG-NET-000334-VPN-001260
- Vuln IDs
-
- V-207234
- V-97147
- Rule IDs
-
- SV-207234r856706_rule
- SV-106285
Checks: C-7494r378323_chk
Verify the VPN Gateway off-loads log records onto a different system or media than the system being audited. If the VPN Gateway does not off-load audit records onto a different system or media than the system being audited, this is a finding.
Fix: F-7494r378324_fix
Configure the VPN Gateway to off-load audit records onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- SRG-NET-000335-VPN-001270
- Vuln IDs
-
- V-207235
- V-97149
- Rule IDs
-
- SV-207235r878129_rule
- SV-106287
Checks: C-7495r378326_chk
Verify the VPN Gateway generates a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server. If the VPN Gateway does not generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server, this is a finding.
Fix: F-7495r378327_fix
Configure the VPN Gateway to generate a log record or an SNMP trap that can be forwarded as an alert to, at a minimum, the SCA and ISSO, of all log failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002036
- Version
- SRG-NET-000337-VPN-001290
- Vuln IDs
-
- V-207237
- V-97153
- Rule IDs
-
- SV-207237r987783_rule
- SV-106291
Checks: C-7497r962223_chk
Verify the VPN Gateway renegotiates the IPsec security association after eight hours or less.
Fix: F-7497r962224_fix
Configure the VPN Gateway to renegotiate the IPsec security association after eight hours or less.
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002036
- Version
- SRG-NET-000337-VPN-001300
- Vuln IDs
-
- V-207238
- V-97155
- Rule IDs
-
- SV-207238r987783_rule
- SV-106293
Checks: C-7498r962226_chk
Verify the VPN Gateway renegotiates the IKE security association after eight hours or less. If the VPN Gateway does not renegotiate the IKE security association after eight hours or less, this is a finding.
Fix: F-7498r962227_fix
Configure the VPN Gateway to renegotiate the IKE security association after eight hours or less.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SRG-NET-000341-VPN-001350
- Vuln IDs
-
- V-207239
- V-97157
- Rule IDs
-
- SV-207239r856712_rule
- SV-106295
Checks: C-7499r856711_chk
Verify the VPN Gateway accepts PIV credentials. If the VPN Gateway does not accept the CAC credential, this is a finding.
Fix: F-7499r573753_fix
Configure the VPN Gateway to accept the CAC credential.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001954
- Version
- SRG-NET-000342-VPN-001360
- Vuln IDs
-
- V-207240
- V-97159
- Rule IDs
-
- SV-207240r856714_rule
- SV-106297
Checks: C-7500r856713_chk
Verify the VPN Gateway electronically verifies the CAC credential. If the VPN Gateway does not electronically verify Personal Identity Verification (PIV) credentials, this is a finding.
Fix: F-7500r573756_fix
Configure the VPN Gateway to electronically verify the CAC credential.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001958
- Version
- SRG-NET-000343-VPN-001370
- Vuln IDs
-
- V-207241
- V-97177
- Rule IDs
-
- SV-207241r856715_rule
- SV-106315
Checks: C-7501r378344_chk
Verity the VPN Gateway authenticates all network-connected endpoint devices before establishing a connection. If the VPN Gateway does not authenticate all network-connected endpoint devices before establishing a connection, this is a finding.
Fix: F-7501r378345_fix
Configure the VPN Gateway to authenticate all network-connected endpoint devices before establishing a connection.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000352-VPN-001460
- Vuln IDs
-
- V-207242
- V-97179
- Rule IDs
-
- SV-207242r878132_rule
- SV-106317
Checks: C-7502r378347_chk
Verify the VPN Gateway uses an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network. If the VPN Gateway does not use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network, this is a finding.
Fix: F-7502r378348_fix
Configure the VPN Gateway to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002397
- Version
- SRG-NET-000369-VPN-001620
- Vuln IDs
-
- V-207243
- V-97181
- Rule IDs
-
- SV-207243r856717_rule
- SV-106319
Checks: C-7503r378350_chk
Verify the VPN Gateway disables split-tunneling for remote clients VPNs. If the VPN Gateway does not disable split-tunneling for remote clients VPNs, this is a finding.
Fix: F-7503r378351_fix
Configure the VPN Gateway to disable split-tunneling for remote clients VPNs.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VPN-001640
- Vuln IDs
-
- V-207244
- V-97183
- Rule IDs
-
- SV-207244r916233_rule
- SV-106321
Checks: C-7504r916153_chk
Verify the IPsec VPN Gateway specifies PFS during IKE negotiation. If the IPsec VPN Gateway does not specify PFS during IKE negotiation, this is a finding.
Fix: F-7504r916154_fix
Configure the IPsec VPN Gateway to specify PFS during IKE negotiation.
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SRG-NET-000371-VPN-001650
- Vuln IDs
-
- V-207245
- V-97185
- Rule IDs
-
- SV-207245r856719_rule
- SV-106323
Checks: C-7505r378356_chk
Verify the VPN Gateway and the remote access client are configured to protect the confidentiality and integrity of transmitted information. If VPN Gateway and Client does not protect the confidentiality and integrity of transmitted information, this is a finding.
Fix: F-7505r378357_fix
Configure the VPN Gateway and the remote access client to protect the confidentiality and integrity of transmitted information.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- SRG-NET-000400-VPN-001940
- Vuln IDs
-
- V-207247
- V-97189
- Rule IDs
-
- SV-207247r916235_rule
- SV-106327
Checks: C-7507r803433_chk
For accounts using password authentication, verify the VPN Gateway uses SHA-2 or later protocol to protect the integrity of the password authentication process. For accounts using password authentication, if the VPN Gateway does not use SHA-2 or later protocol to protect the integrity of the password authentication process, this is a finding.
Fix: F-7507r803434_fix
For accounts using password authentication, configure the VPN Gateway to use SHA-2 or later protocol to protect the integrity of the password authentication process.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SRG-NET-000492-VPN-001980
- Vuln IDs
-
- V-207248
- V-97191
- Rule IDs
-
- SV-207248r608988_rule
- SV-106329
Checks: C-7508r378365_chk
Verify the VPN Gateway generates log records when successful and/or unsuccessful VPN connection attempts occur. If the VPN Gateway does not generate log records when successful and/or unsuccessful VPN connection attempts occur, this is a finding.
Fix: F-7508r378366_fix
Configure the VPN Gateway to generate log records when successful and/or unsuccessful VPN connection attempts occur.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VPN-002160
- Vuln IDs
-
- V-207249
- V-97193
- Rule IDs
-
- SV-207249r856722_rule
- SV-106331
Checks: C-7509r378368_chk
Verify the VPN Gateway uses a FIPS-validated cryptographic module to generate cryptographic hashes. If the VPN Gateway does not use a FIPS-validated cryptographic module to generate cryptographic hashes, this is a finding.
Fix: F-7509r378369_fix
Configure the VPN Gateway to use a FIPS-validated cryptographic module to generate cryptographic hashes.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VPN-002170
- Vuln IDs
-
- V-207250
- V-97195
- Rule IDs
-
- SV-207250r856723_rule
- SV-106333
Checks: C-7510r378371_chk
Verify the VPN Gateway uses a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality. If the VPN Gateway does not use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality, this is a finding.
Fix: F-7510r378372_fix
Configure the VPN Gateway to use a FIPS-validated cryptographic module to implement encryption services for unclassified information requiring confidentiality.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- SRG-NET-000510-VPN-002180
- Vuln IDs
-
- V-207251
- V-97197
- Rule IDs
-
- SV-207251r856724_rule
- SV-106335
Checks: C-7511r378374_chk
Verify the IPsec VPN Gateway IKE uses a NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic. If the IPsec VPN Gateway IKE does not use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic, this is a finding.
Fix: F-7511r378375_fix
Configure the IPsec VPN Gateway IKE to use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- SRG-NET-000512-VPN-002220
- Vuln IDs
-
- V-207252
- V-97199
- Rule IDs
-
- SV-207252r608988_rule
- SV-106337
Checks: C-7512r378377_chk
Verify the IKE protocol is specified for all IPsec VPNs. If the IKE protocol is not specified as an option on all VPN gateways, this is a finding.
Fix: F-7512r378378_fix
Configure the IPsec VPN Gateway to use IKE and IPsec VPN SAs.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002363
- Version
- SRG-NET-000518-VPN-002280
- Vuln IDs
-
- V-207254
- V-97203
- Rule IDs
-
- SV-207254r856725_rule
- SV-106341
Checks: C-7514r378383_chk
Verify the VPN Client logout function is configured to terminate the session on/with the VPN Gateway. If the VPN Client logout function does not terminate the session on/with the VPN Gateway, this is a finding.
Fix: F-7514r378384_fix
Configure the VPN Client logout log out function must be configured to terminate the session on/with the VPN Gateway.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002364
- Version
- SRG-NET-000519-VPN-002290
- Vuln IDs
-
- V-207255
- V-97205
- Rule IDs
-
- SV-207255r856726_rule
- SV-106343
Checks: C-7515r378386_chk
Verify the VPN Client displays an explicit logout message to users indicating the reliable termination of authenticated communications sessions. If the VPN Client does not display an explicit logout message to users indicating the reliable termination of authenticated communications sessions, this is a finding.
Fix: F-7515r378387_fix
Configure the VPN Client to display an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
- RMF Control
- Severity
- M
- CCI
- CCI-004062
- Version
- SRG-NET-000522-VPN-002320
- Vuln IDs
-
- V-207256
- V-97207
- Rule IDs
-
- SV-207256r984307_rule
- SV-106345
Checks: C-7516r378389_chk
Verify the VPN Gateway stores only cryptographic representations of the PSK. If the VPN Gateway does not store only cryptographic representations of the PSK, this is a finding.
Fix: F-7516r378390_fix
Configure the VPN Gateway to store only cryptographic representations of the PSK.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- SRG-NET-000525-VPN-002330
- Vuln IDs
-
- V-207257
- V-97209
- Rule IDs
-
- SV-207257r916158_rule
- SV-106347
Checks: C-7517r916156_chk
Verify all Internet Key Exchange (IKE) proposals are set to use the AES256 or greater encryption algorithm. View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm for any IPsec proposal is not set to use an AES256 or greater algorithm, this is a finding.
Fix: F-7517r916157_fix
Configure the IPsec Gateway to use AES256 or greater for the IPsec proposal.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000530-VPN-002340
- Vuln IDs
-
- V-207258
- V-97211
- Rule IDs
-
- SV-207258r608988_rule
- SV-106349
Checks: C-7518r378395_chk
Verify the TLS VPN Gateway that supports Government-only services prohibits client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0. If the TLS VPN Gateway that supports Government-only services does not prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0, this is a finding.
Fix: F-7518r378396_fix
Configure the TLS VPN Gateway that supports Government-only services to prohibit client negotiation to TLS 1.1, TLS 1.0, SSL 2.0, or SSL 3.0.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- SRG-NET-000540-VPN-002350
- Vuln IDs
-
- V-207259
- V-97213
- Rule IDs
-
- SV-207259r608988_rule
- SV-106351
Checks: C-7519r378398_chk
Verify the TLS VPN Gateway that supports citizen- or business-facing network devices prohibits client negotiation to SSL 2.0 or SSL 3.0. If the TLS VPN Gateway that supports citizen- or business-facing network devices does not prohibit client negotiation to SSL 2.0 or SSL 3.0, this is a finding.
Fix: F-7519r378399_fix
Configure the TLS VPN Gateway that supports citizen- or business-facing network devices to prohibit client negotiation to SSL 2.0 or SSL 3.0.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- SRG-NET-000550-VPN-002360
- Vuln IDs
-
- V-207260
- V-97215
- Rule IDs
-
- SV-207260r878130_rule
- SV-106353
Checks: C-7520r803437_chk
Verify the VPN Gateway that provides a SNMP NMS is configured to use SNMPv3 to use FIPS-validated AES cipher block algorithm. If the VPN Gateway that provides a SNMP NMS does not configure SNMPv3 to use FIPS-validated AES cipher block algorithm, this is a finding.
Fix: F-7520r803438_fix
For the VPN Gateway that provides a SNMP NMS, configure SNMPv3 to use FIPS-validated AES cipher block algorithm.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000565-VPN-002390
- Vuln IDs
-
- V-207261
- V-97217
- Rule IDs
-
- SV-207261r878134_rule
- SV-106355
Checks: C-7521r803440_chk
Verify the VPN gateway is configured to use cryptography that is compliant with NSA/CSS parameters to protect NSS for remote access to a classified network. If the VPN gateway is not configured to use cryptography that is compliant with NSA/CSS parameters to protect NSS for remote access to a classified network, this is a finding.
Fix: F-7521r803441_fix
Configure the IPsec VPN Gateway to use cryptography that is compliant with NSA/CSS parameters to protect NSS for remote access to a classified network.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SRG-NET-000565-VPN-002400
- Vuln IDs
-
- V-207262
- V-97219
- Rule IDs
-
- SV-207262r878134_rule
- SV-106357
Checks: C-7522r803443_chk
Verify the VPN gateway IKE Phase 1 and Phase 2 are configured to use cryptography that is compliant with NSA/CSS parameters when transporting classified traffic across an unclassified network. If the VPN gateway is not configured to use cryptography that is compliant with NSA/CSS parameters when transporting classified traffic across an unclassified network, this is a finding.
Fix: F-7522r803444_fix
Configure the IPsec VPN Gateway Internet Key Exchange (IKE) to use cryptography that is compliant with NSA/CSS parameters when transporting classified traffic across an unclassified network.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- SRG-NET-000580-VPN-002410
- Vuln IDs
-
- V-207263
- V-97221
- Rule IDs
-
- SV-207263r608988_rule
- SV-106359
Checks: C-7523r378410_chk
Verify the VPN Gateway validates TLS certificates by performing RFC 5280-compliant certification path validation. If the VPN Gateway does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.
Fix: F-7523r378411_fix
Configure the VPN Gateway to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- SRG-NET-000213-VPN-000721
- Vuln IDs
-
- V-251044
- Rule IDs
-
- SV-251044r971530_rule
Checks: C-54479r803411_chk
This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telework Environment. VPN connections that provide user access to the network are the prime candidates for VPN session termination and are the primary focus of this requirement. Review the system security plan. Verify the VPN gateway session termination is configured in accordance with the value specified in the SSP. If a risk assessment has not been conducted and an organization-defined session termination period is not addressed/documented in the SSP, this is a finding. If the VPN gateway is not configured to terminate all remote access network connections in accordance with the values defined in the SSP, this is a finding.
Fix: F-54433r803413_fix
This SRG requirement is in response to the DoD OIG Audit of Maintaining Cybersecurity in the Coronavirus Disease-2019 Telework Environment. VPN connections that provide user access to the network are the prime candidates for VPN session termination and are the primary focus of this requirement. Conduct a risk assessment to identify the use case for the VPN and determine if periodic VPN session termination puts the mission at risk of failure. Identify the organizations' VPN session termination periodic value based on the risk assessment. Add the results of the risk assessment and the session termination values to the site's SSP documents. Configure the VPN gateway to periodically terminate all remote network connections in accordance with the values defined in the SSP.
- RMF Control
- Severity
- M
- CCI
- CCI-004866
- Version
- SRG-NET-000705-VPN-000110
- Vuln IDs
-
- V-264328
- Rule IDs
-
- SV-264328r984313_rule
Checks: C-68241r984311_chk
Verify the VPN Gateway is configured to employ organization-defined controls by type of DoS to achieve the DoS objective. If the VPN Gateway is not configured to employ organization-defined controls by type of DoS to achieve the DoS objective, this is a finding.
Fix: F-68149r984312_fix
Configure the VPN Gateway to employ organization-defined controls by type of DoS to achieve the DoS objective.
- RMF Control
- Severity
- M
- CCI
- CCI-004891
- Version
- SRG-NET-000715-VPN-000120
- Vuln IDs
-
- V-264329
- Rule IDs
-
- SV-264329r984316_rule
Checks: C-68242r984314_chk
Verify the VPN Gateway is configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions. If the VPN Gateway is not configured to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions, this is a finding.
Fix: F-68150r984315_fix
Configure the VPN Gateway to implement physically or logically separate subnetworks to isolate organization-defined critical system components and functions.
- RMF Control
- Severity
- M
- CCI
- CCI-004931
- Version
- SRG-NET-000760-VPN-000160
- Vuln IDs
-
- V-264330
- Rule IDs
-
- SV-264330r984319_rule
Checks: C-68243r984317_chk
Verify the VPN Gateway is configured to establish organization-defined alternate communications paths for system operations organizational command and control. If the VPN Gateway is not configured to establish organization-defined alternate communications paths for system operations organizational command and control, this is a finding.
Fix: F-68151r984318_fix
Configure the VPN Gateway to establish organization-defined alternate communications paths for system operations organizational command and control.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-NET-000345-VPN-002430
- Vuln IDs
-
- V-264331
- Rule IDs
-
- SV-264331r984329_rule
Checks: C-68244r984327_chk
If the VPN does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the VPN implements a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network. If the VPN does not implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, this is a finding.
Fix: F-68152r984328_fix
If PKI-based user authentication intermediary services are provided, configure the VPN to implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-NET-000580-VPN-002431
- Vuln IDs
-
- V-264332
- Rule IDs
-
- SV-264332r984332_rule
Checks: C-68245r984330_chk
Verify the VPN Gateway rejects user certificates that have been revoked when using DOD PKI for authentication. If the VPN Gateway does not configure OCSP and/or CRL to reject revoked user credentials that are prohibited from establishing an allowed session, this is a finding.
Fix: F-68153r984331_fix
Configure the VPN Gateway to reject user certificates that have been revoked when using DOD PKI for authentication.
- RMF Control
- Severity
- M
- CCI
- CCI-004068
- Version
- SRG-NET-000580-VPN-002432
- Vuln IDs
-
- V-264333
- Rule IDs
-
- SV-264333r984335_rule
Checks: C-68246r984333_chk
Verify the VPN Gateway rejects machine certificates that have been revoked when using DOD PKI for authentication. If the VPN Gateway does not configure OCSP and/or CRL to reject revoked machine credentials that are prohibited from establishing an allowed session, this is a finding.
Fix: F-68154r984334_fix
Configure the VPN Gateway to reject machine certificates that have been revoked when using DOD PKI for authentication.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SRG-NET-000355-VPN-002433
- Vuln IDs
-
- V-264334
- Rule IDs
-
- SV-264334r984338_rule
Checks: C-68247r984336_chk
If the VPN Gateway does not provide PKI-based user authentication intermediary services, this is not applicable. Verify the VPN Gateway only allows the use of DOD PKI-established CA for verification when establishing VPN sessions. Verify both user and machine certificates are being validated when establishing VPN sessions. If the VPN Gateway does not validate user and machine certificates using DOD PKI-established certificate authorities, this is a finding.
Fix: F-68155r984337_fix
Configure the VPN Gateway to only allow the use of DOD PKI-established CAs for the establishment of VPN sessions. Configure validation for both the user and machine certificates.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- SRG-NET-000019-VPN-002435
- Vuln IDs
-
- V-264335
- Rule IDs
-
- SV-264335r984341_rule
Checks: C-68248r984339_chk
Verify the TLS VPN Gateway limits authenticated client sessions to initial session source IP. If the TLS VPN Gateway does not limit authenticated client sessions to initial session source IP, this is a finding.
Fix: F-68156r984340_fix
Configure the TLS VPN Gateway to limit authenticated client sessions to initial session source IP.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- SRG-NET-000230-VPN-002436
- Vuln IDs
-
- V-264336
- Rule IDs
-
- SV-264336r984344_rule
Checks: C-68249r984342_chk
Verify that the VPN Gateway uses an Always On VPN connection for remote computing. If the VPN Gateway does not use an Always On VPN connection for remote computing, this is a finding.
Fix: F-68157r984343_fix
Configure the VPN Gateway to enable Always On VPN connections for all remote users. The remote client must not be able to access the internet without first establishing a VPN session with a DOD site.