Check: CASA-VN-000210
Cisco ASA VPN STIG:
CASA-VN-000210
(in versions v1 r1 through v1 r0.1)
Title
The Cisco ASA must be configured to use a Diffie-Hellman (DH) Group of 14 or greater for Internet Key Exchange (IKE) Phase 1. (Cat I impact)
Discussion
Use of an approved DH algorithm ensures the Internet Key Exchange (IKE) (Phase 1) proposal uses FIPS-validated key management techniques and processes in the production, storage, and control of private/secret cryptographic keys. The security of the DH key exchange is based on the difficulty of solving the discrete logarithm from which the key was derived. Hence, the larger the modulus, the more secure the generated key is considered to be.
Check Content
Review the ASA configuration to determine if DH Group of 14 or greater has been specified for IKE Phase 1 as shown in the example below. crypto ikev2 policy 1 encryption aes-256 … group 24 If DH Group of 14 or greater has not been specified for IKE Phase 1, this is a finding.
Fix Text
Configure the ASA to use a DH Group of 14 or greater as shown in the example below. ASA1(config)# crypto ikev2 policy 1 ASA1(config-ikev2-policy)# group 24
Additional Identifiers
Rule ID: SV-239957r666277_rule
Vulnerability ID: V-239957
Group Title: SRG-NET-000074-VPN-000250
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000068 |
The information system implements cryptographic mechanisms to protect the confidentiality of remote access sessions. |
Controls
Number | Title |
---|---|
AC-17 (2) |
Protection Of Confidentiality / Integrity Using Encryption |