Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-23747 | NET0812 | SV-41499r1_rule | ECSC-1 | Low |
Description |
---|
Without synchronized time, accurately correlating information between devices becomes difficult, if not impossible. If you cannot successfully compare logs between each of your routers, switches, and firewalls, it will be very difficult to determine the exact events that resulted in a network breach incident. NTP provides an efficient and scalable method for network elements to synchronize to an accurate time source. |
STIG | Date |
---|---|
Firewall Security Technical Implementation Guide - Cisco | 2015-09-18 |
Check Text ( C-39978r1_chk ) |
---|
Review the firewall configurations and verify that two or more NTP servers have been defined similar to the following example: ntp server 10.1.0.5 key 1 source mgmt ntp server 10.1.0.8 key 1 source mgmt ntp authenticate ntp authentication-key 1 md5 ******** ntp trusted-key 1 |
Fix Text (F-3044r2_fix) |
---|
Configure the device to use two separate NTP servers. |