Skip to content

Cisco ASA VPN Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000132-VPN-000460

    Group
  • The Cisco ASA must be configured to use Internet Key Exchange v2 (IKEv2) for all IPsec security associations.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable...
    Rule Medium Severity
  • SRG-NET-000510-VPN-002180

    Group
  • The Cisco ASA must be configured to use NIST FIPS-validated cryptography for Internet Key Exchange (IKE) Phase 1.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gateway must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-NET-000371-VPN-001640

    Group
  • The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation.

    PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise all communications. The Phase 2 (Quick Mode) Security Association (SA)...
    Rule Medium Severity
  • SRG-NET-000510-VPN-002160

    Group
  • The Cisco ASA must be configured to use a FIPS-validated cryptographic module to generate cryptographic hashes.

    FIPS 140-2/140-3 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Unvalidated cryptography is viewed by NIST as p...
    Rule Medium Severity
  • SRG-NET-000510-VPN-002170

    Group
  • The Cisco ASA must be configured to use a FIPS-validated cryptographic module to implement IPsec encryption services.

    FIPS 140-2/140-3 precludes the use of invalidated cryptography for the cryptographic protection of sensitive or valuable data within federal systems. Unvalidated cryptography is viewed by NIST as p...
    Rule Medium Severity
  • SRG-NET-000074-VPN-000250

    Group
  • The Cisco ASA must be configured to use a Diffie-Hellman (DH) Group of 16 or greater for Internet Key Exchange (IKE) Phase 1.

    Use of an approved DH algorithm ensures the IKE (Phase 1) proposal uses FIPS-validated key management techniques and processes in the production, storage, and control of private/secret cryptographi...
    Rule High Severity
  • SRG-NET-000168-VPN-000600

    Group
  • The Cisco ASA must be configured to use FIPS-validated SHA-2 at 384 bits or higher for Internet Key Exchange (IKE) Phase 1.

    Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Although allowed by SP800-131Ar2 for some applications, SHA-1 is considered a compr...
    Rule Medium Severity
  • SRG-NET-000230-VPN-000780

    Group
  • SRG-NET-000019-VPN-000040

    Group
  • The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies.

    Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth ...
    Rule Medium Severity
  • SRG-NET-000148-VPN-000540

    Group
  • The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection.

    Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed architectures (e.g., service-oriented architectures), the d...
    Rule Medium Severity
  • SRG-NET-000565-VPN-002400

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules