SV-216995r531086_rule
V-216995
SRG-NET-000230-RTR-000003
CISC-RT-000030
CAT II
10
This requirement is not applicable for the DODIN Backbone.
Configure each key used for routing protocol authentication to have a lifetime of no more than 180 days as shown in the example below:
R5(config)#key chain OSPF_KEY_CHAIN
R5(config-keychain)#key 1
R5(config-keychain-key)#key-string xxxxxx
R5(config-keychain-key)#send-lifetime 00:00:00 Jan 1 2018 23:59:59 Mar 31 2018
R5(config-keychain-key)#accept-lifetime 00:00:00 Jan 1 2018 01:05:00 Apr 1 2018
R5(config-keychain-key)#exit
R5(config-keychain)#key 2
R5(config-keychain-key)#key-string yyyyyyy
R5(config-keychain-key)#send-lifetime 00:00:00 Apr 1 2018 23:59:59 Jun 30 2018
R5(config-keychain-key)#accept-lifetime 23:55:00 Mar 31 2018 01:05:00 Jul 1 2018
R5(config-keychain-key)#end
This requirement is not applicable for the DODIN Backbone.
Review the start times for each key within the configured key chains used for routing protocol authentication as shown in the example below:
key chain OSPF_KEY_CHAIN
key 1
key-string xxxxxxx
send-lifetime 00:00:00 Jan 1 2018 23:59:59 Mar 31 2018
accept-lifetime 00:00:00 Jan 1 2018 01:05:00 Apr 1 2018
key 2
key-string yyyyyyy
send-lifetime 00:00:00 Apr 1 2018 23:59:59 Jun 30 2018
accept-lifetime 23:55:00 Mar 31 2018 01:05:00 Jul 1 2018
Note: Key chains must be configured to authenticate routing protocol messages, as it is the only way to set an expiration.
If any key has a lifetime of more than 180 days, this is a finding.
V-216995
False
CISC-RT-000030
This requirement is not applicable for the DODIN Backbone.
Review the start times for each key within the configured key chains used for routing protocol authentication as shown in the example below:
key chain OSPF_KEY_CHAIN
key 1
key-string xxxxxxx
send-lifetime 00:00:00 Jan 1 2018 23:59:59 Mar 31 2018
accept-lifetime 00:00:00 Jan 1 2018 01:05:00 Apr 1 2018
key 2
key-string yyyyyyy
send-lifetime 00:00:00 Apr 1 2018 23:59:59 Jun 30 2018
accept-lifetime 23:55:00 Mar 31 2018 01:05:00 Jul 1 2018
Note: Key chains must be configured to authenticate routing protocol messages, as it is the only way to set an expiration.
If any key has a lifetime of more than 180 days, this is a finding.
M
4028