STIGQter STIGQter: STIG Summary: Riverbed SteelHead CX v8 NDM Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 25 Oct 2019:

Riverbed Optimization System (RiOS) must authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

DISA Rule

SV-77449r1_rule

Vulnerability Number

V-62959

Group Title

SRG-APP-000395-NDM-000310

Rule Version

RICX-DM-000111

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure RiOS to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement).

Navigate to the device CLI
Type: enable
Type: conf t
Type: ntp server <hostname | ip address>
Type: ntp server <hostname | ip address>
Type: ntp authentication key <key id> secret 7 <encrypted string>
Type: ntp authentication trustedkeys <key id>

Configure 2 NTP Servers
Type: ntp enable
Type: write memory

-- or --

Navigate to the device Management Console
Navigate to Configure >> System Settings >> Date and Time
Click "Add a New NTP Authentication Key"
Set the value of "Key ID" to the required setting (1 to 65534)
Set the value of "Key Type" to MD5 or SHA
Set the value of "Secret" to the required setting for the NTP server
Click "Add"
Click '"Add" a New NTP Server'
Set the value of "Hostname or IP Address" to the required NTP Server
Set the value of "Version" to 3 or 4 depending on the ntp server
Set the value of "Key ID" to a value on the trusted key list
Set the value of "Enabled/Disabled" to "Enabled"
Click "Add"
Configure 2 NTP Servers
Click "Use NTP Time Synchronization"

Click "Apply"
Navigate to the top of the web page and click "Save" to save these settings permanently

Check Contents

Verify that RiOS is configured to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement).

Navigate to the device CLI
Type: enable
Type: show ntp all
Verify that at least two NTP Servers are configured
Type: show ntp authentication
Verify the "Trusted Keys" are defined for use with NTP

-- or --

Navigate to the device Management Console
Navigate to Configure >> System Settings >> Date and Time
Verify that at least two servers are configured in the section "Requested Servers"

If no NTP Servers are visible after the command 'show ntp all' or on "Requested Servers", this is a finding.

Vulnerability Number

V-62959

Documentable

False

Rule Version

RICX-DM-000111

Severity Override Guidance

Verify that RiOS is configured to authenticate NTP server before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based (NTP portion of the requirement).

Navigate to the device CLI
Type: enable
Type: show ntp all
Verify that at least two NTP Servers are configured
Type: show ntp authentication
Verify the "Trusted Keys" are defined for use with NTP

-- or --

Navigate to the device Management Console
Navigate to Configure >> System Settings >> Date and Time
Verify that at least two servers are configured in the section "Requested Servers"

If no NTP Servers are visible after the command 'show ntp all' or on "Requested Servers", this is a finding.

Check Content Reference

M

Target Key

2931

Comments