STIGQter STIGQter: STIG Summary: Cisco IOS XE Switch NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco switch must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

DISA Rule

SV-220554r531084_rule

Vulnerability Number

V-220554

Group Title

SRG-APP-000395-NDM-000347

Rule Version

CISC-ND-001150

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Cisco switch to authenticate NTP sources using authentication that is cryptographically based as shown in the example below:

SW2(config)#ntp authenticate
SW2(config)#ntp authentication-key 1 md5 xxxxxx
SW2(config)#ntp trusted-key 1
SW2(config)#ntp server x.x.x.x key 1
SW2(config)#ntp server y.y.y.y key 1

Check Contents

Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the configuration example below:

ntp authentication-key 1 md5 121B0A151012 7
ntp authenticate
ntp trusted-key 1
ntp server x.x.x.x key 1
ntp server y.y.y.y key 1

If the Cisco switch is not configured to authenticate NTP sources using authentication that is cryptographically based, this is a finding.

Vulnerability Number

V-220554

Documentable

False

Rule Version

CISC-ND-001150

Severity Override Guidance

Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the configuration example below:

ntp authentication-key 1 md5 121B0A151012 7
ntp authenticate
ntp trusted-key 1
ntp server x.x.x.x key 1
ntp server y.y.y.y key 1

If the Cisco switch is not configured to authenticate NTP sources using authentication that is cryptographically based, this is a finding.

Check Content Reference

M

Target Key

4067

Comments