AOS, when used as a VPN Gateway, must uniquely identify all network-connected endpoint devices before establishing a connection.
An XCCDF Rule
Description
Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. For distributed architectures (e.g., service-oriented architectures), the decisions regarding the validation of identification claims may be made by services separate from the services acting on those decisions. In such situations, it is necessary to provide the identification decisions (as opposed to the actual identifiers) to the services that need to act on those decisions. This requirement applies to applications that connect locally, remotely, or through a network to an endpoint device (including, but not limited to, workstations, printers, servers outside a datacenter, Voice Over Internet Protocol [VoIP] phones, and video teleconference codecs). Gateways and service-oriented architecture (SOA) applications are examples of where this requirement would apply.
- ID
- SV-266987r1040727_rule
- Version
- ARBA-VN-000540
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
Configure AOS using the web interface:
1. Navigate to Configuration >> Services >> VPN and expand "Site-to-Site".
2. Select the configured site-to-site VPN IPsec maps. Select the applicable Server certificate. Select the applicable trusted DOD root CA under "CA certificate:".
3. Click Submit >> Pending Changes >> Deploy Changes.
4. Navigate to Configuration >> Access Points >> Remote APs tab.