STIGQter STIGQter: STIG Summary: SEL-2740S NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 02 May 2019:

The SEL-2740S must be configured to synchronize internal system clocks with an authoritative time source.

DISA Rule

SV-102387r1_rule

Vulnerability Number

V-92299

Group Title

SRG-APP-000372-NDM-000297

Rule Version

SELS-ND-001010

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure NTP Servers during node adoption with the following steps:
1. Go to the "configuration object" page and select desired switch.
2. Enter the NTP Server IP addresses in appropriate settings fields for primary and backup NTP server(s).
3. Click "Submit".
4. Create NTP Flows to/from NTP server to/from node.

Check Contents

To ensure SEL-2740S NTP servers are configured do the following:
1. Log in with Permission Level 3 rights into parent OTSDN Controller.
2. Go to the "configuration object" page.
3. Check NTP Server IP addresses in the settings fields.
4. Check NTP flows for the SEL-2740S DUT and additional neighbor devices exist and are correct.

If the SEL-2740S is not configured to maintain internal system clocks with an authoritative time server, this is a finding.

Vulnerability Number

V-92299

Documentable

False

Rule Version

SELS-ND-001010

Severity Override Guidance

To ensure SEL-2740S NTP servers are configured do the following:
1. Log in with Permission Level 3 rights into parent OTSDN Controller.
2. Go to the "configuration object" page.
3. Check NTP Server IP addresses in the settings fields.
4. Check NTP flows for the SEL-2740S DUT and additional neighbor devices exist and are correct.

If the SEL-2740S is not configured to maintain internal system clocks with an authoritative time server, this is a finding.

Check Content Reference

M

Target Key

3383

Comments