STIGQter STIGQter: STIG Summary: Virtual Private Network (VPN) Security Requirements Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The VPN Gateway must be configured to use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.

DISA Rule

SV-207192r608988_rule

Vulnerability Number

V-207192

Group Title

SRG-NET-000063

Rule Version

SRG-NET-000063-VPN-000220

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the VPN Gateway to use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.

Check Contents

Verify the VPN Gateway uses IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.

If the VPN Gateway does not use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions, this is a finding.

Vulnerability Number

V-207192

Documentable

False

Rule Version

SRG-NET-000063-VPN-000220

Severity Override Guidance

Verify the VPN Gateway uses IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions.

If the VPN Gateway does not use IPsec with SHA-1 or greater for hashing to protect the integrity of remote access sessions, this is a finding.

Check Content Reference

M

Target Key

2920

Comments