SV-104517r1_rule
V-94687
SRG-APP-000516-NDM-000337
SYMP-NM-000180
CAT II
10
Configure the Symantec ProxySG to use a centrally administered AAA server.
1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> RADIUS.
3. Click "New" then enter a Realm name.
4. Under "Realm configuration", enter the IP address for the primary RADIUS server and modify port (if necessary).
5. Enter a Secret pre-shared key, and enter the same Secret pre-shared key for confirmation, and click "OK".
6. Click "Radius Servers".
7. Enter an IP address for the Alternate Server and modify port (if necessary).
8. Click "Apply".
9. Click Policy >> Visual Policy Manager.
10. Click "Launch", select the "Admin Authentication" Layer, right-click the Action in each rule, and click "Set".
11. Click "New", click "Authenticate", and choose the RADIUS realm configured in step 2.
12. Click "File" and then "Install Policy on SG Appliance".
Verify a AAA server is used for access by system administrators as required in DoD.
1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> RADIUS, confirm that a RADIUS realm has been configured.
3. Click Policy >> Visual Policy Manager.
4. Click "Launch", select the "Admin Authentication" layer and confirm that the "Action" in each rule references the RADIUS realm in step 2.
If Symantec ProxySG does not employ automated mechanisms to centrally apply authentication settings, this is a finding.
V-94687
False
SYMP-NM-000180
Verify a AAA server is used for access by system administrators as required in DoD.
1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> RADIUS, confirm that a RADIUS realm has been configured.
3. Click Policy >> Visual Policy Manager.
4. Click "Launch", select the "Admin Authentication" layer and confirm that the "Action" in each rule references the RADIUS realm in step 2.
If Symantec ProxySG does not employ automated mechanisms to centrally apply authentication settings, this is a finding.
M
3517