I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000074-VPN-000250
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance must be configured to use a Diffie-Hellman (DH) Group of 16 or greater for Internet Key Exchange (IKE) Phase 1.
<VulnDiscussion>NIST cryptographic algorithms approved by NSA to protect NSS. Based on an analysis of the impact of quantum computing, crypto...Rule High Severity -
SRG-NET-000317-VPN-001090
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN Gateway must use AES256 or higher encryption for the Internet Key Exchange (IKE) proposal to protect confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-NET-000525-VPN-002330
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN must use AES256 or greater encryption for the IPsec proposal.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-NET-000019-VPN-000040
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN must ensure inbound and outbound traffic is configured with a security policy.
<VulnDiscussion>Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additio...Rule High Severity -
SRG-NET-000512-VPN-002220
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN Gateway must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).
<VulnDiscussion>Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...Rule High Severity -
SRG-NET-000132-VPN-000460
<GroupDescription></GroupDescription>Group -
The IPsec BIG-IP appliance must use IKEv2 for IPsec VPN security associations.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity -
SRG-NET-000337-VPN-001290
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN Gateway must renegotiate the IPsec Phase 1 security association after eight hours or less.
<VulnDiscussion>The IPsec security association (SA) and its corresponding key will expire either after the number of seconds or amount of tra...Rule Medium Severity -
SRG-NET-000337-VPN-001300
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN must renegotiate the IKE Phase 2 security association after eight hours or less.
<VulnDiscussion>When a VPN gateway creates an IPsec Security Association (SA), resources must be allocated to maintain the SA. These resource...Rule Medium Severity -
SRG-NET-000400-VPN-001940
<GroupDescription></GroupDescription>Group -
For accounts using password authentication, the F5 BIG-IP appliance site-to-site IPsec VPN Gateway must use SHA-2 or later protocol to protect the integrity of the password authentication process.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-NET-000565-VPN-002400
<GroupDescription></GroupDescription>Group -
The F5 BIG-IP appliance IPsec VPN must use cryptographic algorithms approved by NSA to protect NSS when transporting classified traffic across an unclassified network.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The VPN gateway mu...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.