Check: NET1638
WMAN Access Point STIG (STIG):
NET1638
(in versions v6 r13 through v6 r11)
Title
Management connections to a network device must be established using secure protocols with FIPS 140-2 validated cryptographic modules. (Cat II impact)
Discussion
Administration and management connections performed across a network are inherently dangerous because anyone with a packet sniffer and access to the right LAN segment can acquire the network device account and password information. With this intercepted information they could gain access to the router and cause denial of service attacks, intercept sensitive information, or perform other destructive actions.
Check Content
Review the network device configuration to verify only secure protocols using FIPS 140-2 validated cryptographic modules are used for any administrative access. Some of the secure protocols used for administrative and management access are listed below. This list is not all inclusive and represents a sample selection of secure protocols. -SSHv2 -SCP -HTTPS using TLS If management connections are established using protocols without FIPS 140-2 validated cryptographic modules, this is a finding.
Fix Text
Configure the network device to use secure protocols with FIPS 140-2 validated cryptographic modules.
Additional Identifiers
Rule ID: SV-3069r5_rule
Vulnerability ID: V-3069
Group Title: Management connections must be secured by FIPS 140-2.
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |