UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Network devices must be configured with rotating keys used for authenticating IGP peers that have a duration exceeding 180 days.


Overview

Finding ID Version Rule ID IA Controls Severity
V-14667 NET0422 SV-15301r3_rule IAKM-1 IAKM-2 IAKM-3 Low
Description
If the keys used for routing protocol authentication are guessed, the malicious user could create havoc within the network by advertising incorrect routes and redirecting traffic. Changing the keys frequently reduces the risk of them eventually being guessed. When configuring authentication for routing protocols that provide key chains, configure two rotating keys with overlapping expiration dates, both with 180-day expirations.
STIG Date
Firewall Security Technical Implementation Guide 2015-09-18

Details

Check Text ( C-12696r5_chk )
Review device configuration for key expirations of 180 days or less.

If rotating keys are not configured to expire at 180 days or less, this is a finding.
Fix Text (F-14125r4_fix)
Configure the device so rotating keys expire at 180 days or less.