STIGQter STIGQter: STIG Summary: Cisco NX-OS Switch NDM Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The Cisco switch must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

DISA Rule

SV-220502r604141_rule

Vulnerability Number

V-220502

Group Title

SRG-APP-000395-NDM-000347

Rule Version

CISC-ND-001150

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Cisco switch to authenticate NTP sources using authentication that is cryptographically based as shown in the example below:

SW1(config)# ntp authenticate
SW1(config)# ntp authentication-key 1 md5 xxxxxxxxxxxxx
SW1(config)# ntp trusted-key 1
SW1(config)# ntp server 10.1.12.10 key 1
SW1(config)# ntp server 10.1.22.13 key 1
SW1(config)# ntp commit
SW1(config)# end

Check Contents

Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the configuration example below:

ntp distribute
ntp server 10.1.12.10 key 1
ntp server 10.1.22.13 key 1
ntp authenticate
ntp authentication-key 1 md5 xxxxxxxxxx 7
ntp trusted-key 1
ntp commit

If the Cisco switch is not configured to authenticate NTP sources using authentication that is cryptographically based, this is a finding.

Vulnerability Number

V-220502

Documentable

False

Rule Version

CISC-ND-001150

Severity Override Guidance

Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the configuration example below:

ntp distribute
ntp server 10.1.12.10 key 1
ntp server 10.1.22.13 key 1
ntp authenticate
ntp authentication-key 1 md5 xxxxxxxxxx 7
ntp trusted-key 1
ntp commit

If the Cisco switch is not configured to authenticate NTP sources using authentication that is cryptographically based, this is a finding.

Check Content Reference

M

Target Key

4066

Comments