Skip to content

AOS must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

An XCCDF Rule

Description

If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source.

ID
SV-266976r1039949_rule
Version
ARBA-ND-000347
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure AOS with the following commands: 
configure terminal 
ntp authentication-key (keyid #> sha1 <plaintext key> 
ntp trusted-key <keyid #> 
ntp server <first fqdn, ipv4, or ipv6 address> key <keyid #> 
ntp server <second fqdn, ipv4, or ipv6 address> key <keyid #>