Skip to content

AOS, when used as a VPN Gateway, must renegotiate the security association after 24 hours or less or as defined by the organization.

An XCCDF Rule

Description

When a VPN gateway creates an IPsec security association (SA), resources must be allocated to maintain the SA. These resources are wasted during periods of IPsec endpoint inactivity, which could result in the gateway's inability to create new SAs for other endpoints, thereby preventing new sessions from connecting. The Internet Key Exchange (IKE) idle timeout may also be set to allow SAs associated with inactive endpoints to be deleted before the SA lifetime has expired, although this setting is not recommended at this time. The value of one hour or less is a common best practice. Satisfies: SRG-NET-000337-VPN-001300, SRG-NET-000337-VPN-001290

ID
SV-266997r1040757_rule
Version
ARBA-VN-001300
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Configure AOS with the following commands:
configure terminal
crypto-local ipsec-map <name> <priority>
set security-association lifetime seconds 28800
exit
write memory