UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Symantec ProxySG must employ automated mechanisms to centrally apply authentication settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-94687 SYMP-NM-000180 SV-104517r1_rule Medium
Description
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.
STIG Date
Symantec ProxySG NDM Security Technical Implementation Guide 2019-05-21

Details

Check Text ( C-93877r1_chk )
Verify a AAA server is used for access by system administrators as required in DoD.

1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> RADIUS, confirm that a RADIUS realm has been configured.
3. Click Policy >> Visual Policy Manager.
4. Click "Launch", select the "Admin Authentication" layer and confirm that the "Action" in each rule references the RADIUS realm in step 2.

If Symantec ProxySG does not employ automated mechanisms to centrally apply authentication settings, this is a finding.
Fix Text (F-100805r1_fix)
Configure the Symantec ProxySG to use a centrally administered AAA server.

1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> RADIUS.
3. Click "New" then enter a Realm name.
4. Under "Realm configuration", enter the IP address for the primary RADIUS server and modify port (if necessary).
5. Enter a Secret pre-shared key, and enter the same Secret pre-shared key for confirmation, and click "OK".
6. Click "Radius Servers".
7. Enter an IP address for the Alternate Server and modify port (if necessary).
8. Click "Apply".
9. Click Policy >> Visual Policy Manager.
10. Click "Launch", select the "Admin Authentication" Layer, right-click the Action in each rule, and click "Set".
11. Click "New", click "Authenticate", and choose the RADIUS realm configured in step 2.
12. Click "File" and then "Install Policy on SG Appliance".