Check: SRG-NET-000166-VPN-000580
Virtual Private Network (VPN) SRG:
SRG-NET-000166-VPN-000580
(in versions v3 r3 through v1 r0.1)
Title
The Remote Access VPN Gateway must use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication. (Cat II impact)
Discussion
The VPN interacts directly with public networks and devices and should not contain user authentication information for all users. AAA network security services provide the primary framework through which a network administrator can set up access control and authorization on network points of entry or network access servers. It is not advisable to configure access control on the VPN gateway or remote access server. Separation of services provides added assurance to the network if the access control server is compromised.
Check Content
Verify the Remote Access VPN Gateway is configured to use a physically separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication. If the Remote Access VPN Gateway does not use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication, this is a finding.
Fix Text
Configure the Remote Access VPN Gateway to use a separate authentication server (e.g., LDAP, RADIUS, TACACS+) to perform user authentication.
Additional Identifiers
Rule ID: SV-207216r608988_rule
Vulnerability ID: V-207216
Group Title: SRG-NET-000166
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000187 |
For public key-based authentication, map the authenticated identity to the account of the individual or group. |
Controls
Number | Title |
---|---|
IA-5(2) |
Pki-based Authentication |