STIGQter STIGQter: STIG Summary: SEL-2740S NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 02 May 2019:

The SEL-2740S must be configured to maintain internal system clocks with a backup authoritative time server.

DISA Rule

SV-102389r1_rule

Vulnerability Number

V-92301

Group Title

SRG-APP-000373-NDM-000298

Rule Version

SELS-ND-001020

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure NTP Servers during node adoption with the following steps:
1. Go to the "configuration object" page and select desired switch.
2. Enter the NTP Server IP addresses in appropriate settings fields for primary and backup NTP server(s).
3. Click "Submit".
4. Create NTP Flows to/from NTP server to/from node.

Check Contents

To ensure SEL-2740S NTP servers are configured do the following:
1. Log in with Permission Level 3 rights into parent OTSDN Controller.
2. Go to the "configuration object" page and select the desired switch.
3. Check NTP Server IP addresses in the settings fields that both a primary and backup NTP server is configured.
4. Check NTP flows for the SEL-2740S DUT and additional neighbor devices exist and are correct.

If the SEL-2740S is not configured to maintain internal system clocks with a backup authoritative time server, this is a finding.

Vulnerability Number

V-92301

Documentable

False

Rule Version

SELS-ND-001020

Severity Override Guidance

To ensure SEL-2740S NTP servers are configured do the following:
1. Log in with Permission Level 3 rights into parent OTSDN Controller.
2. Go to the "configuration object" page and select the desired switch.
3. Check NTP Server IP addresses in the settings fields that both a primary and backup NTP server is configured.
4. Check NTP flows for the SEL-2740S DUT and additional neighbor devices exist and are correct.

If the SEL-2740S is not configured to maintain internal system clocks with a backup authoritative time server, this is a finding.

Check Content Reference

M

Target Key

3383

Comments