Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-14667 | NET0422 | SV-15301r2_rule | IAKM-1 IAKM-2 IAKM-3 | Low |
Description |
---|
If the keys used for routing protocol authentication are guessed, the malicious user could create havoc within the network by advertising incorrect routes and redirecting traffic. Changing the keys frequently reduces the risk of them eventually being guessed. |
STIG | Date |
---|---|
Infrastructure Router Security Technical Implementation Guide | 2013-10-08 |
Check Text ( C-12696r3_chk ) |
---|
Review key expirations. When configuring authentication for routing protocols that provide key chains, configure two rotating keys with overlapping expiration dates, both with 180-day expirations. |
Fix Text (F-14125r3_fix) |
---|
The IAO or SA will ensure a key has an expiration of 180 days or less. |