STIGQter STIGQter: STIG Summary: Symantec ProxySG ALG Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Apr 2020:

Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.

DISA Rule

SV-104255r1_rule

Vulnerability Number

V-94301

Group Title

SRG-NET-000213-ALG-000107

Rule Version

SYMP-AG-000440

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the two user-configurable parameters that affect session termination (TCP segment lifetime and authentication credential inactivity timeout).

Configure the TCP segment lifetime setting (default is 120 seconds).
1. SSH into the ProxySG console and type "enable" and then "configure".
2. Type "tcp-ip tcp 2msl 900", for example, to set the timeout to 900 seconds (the default).

Configure the authentication credential inactivity timeouts.
1. Log on to the Web Management Console.
2. Browse to Configuration >> Authentication.
3. For each authentication method listed, click it and then the "General" tab and set the "Inactivity timeout" to 600 seconds or less (default is 900 seconds).
4. Click "Apply".

Check Contents

Check the two user-configurable parameters that affect session termination (TCP segment lifetime and authentication credential inactivity timeout).

Check the TCP segment lifetime setting (default is 120 seconds).
1. SSH into the ProxySG console and type "show tcp-ip".
2. Verify that the TCP 2MSL timeout is set to 600 seconds or less.

Check the authentication credential inactivity timeouts.
1. Log on to the Web Management Console.
2. Browse to Configuration >> Authentication.
3. For each authentication method listed, click it and then the "General" tab and verify that the "Inactivity timeout" is set to 600 seconds or less (default is 900 seconds).

If Symantec ProxySG does not terminate all network connections associated with a communications session at the end of the session, or terminate user sessions (nonprivileged session) after 15 minutes of inactivity, this is a finding.

Vulnerability Number

V-94301

Documentable

False

Rule Version

SYMP-AG-000440

Severity Override Guidance

Check the two user-configurable parameters that affect session termination (TCP segment lifetime and authentication credential inactivity timeout).

Check the TCP segment lifetime setting (default is 120 seconds).
1. SSH into the ProxySG console and type "show tcp-ip".
2. Verify that the TCP 2MSL timeout is set to 600 seconds or less.

Check the authentication credential inactivity timeouts.
1. Log on to the Web Management Console.
2. Browse to Configuration >> Authentication.
3. For each authentication method listed, click it and then the "General" tab and verify that the "Inactivity timeout" is set to 600 seconds or less (default is 900 seconds).

If Symantec ProxySG does not terminate all network connections associated with a communications session at the end of the session, or terminate user sessions (nonprivileged session) after 15 minutes of inactivity, this is a finding.

Check Content Reference

M

Target Key

3515

Comments