Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-207193 | SRG-NET-000074-VPN-000250 | SV-207193r803424_rule | High |
Description |
---|
Use of an approved DH algorithm ensures the Internet Key Exchange (IKE) (Phase 1) proposal uses FIPS-validated key management techniques and processes in the production, storage, and control of private/secret cryptographic keys. The security of the DH key exchange is based on the difficulty of solving the discrete logarithm from which the key was derived. Hence, the larger the modulus, the more secure the generated key is considered to be. |
STIG | Date |
---|---|
Virtual Private Network (VPN) Security Requirements Guide | 2021-09-27 |
Check Text ( C-7453r803422_chk ) |
---|
Verify all IKE proposals are set to use Diffie-Hellman (DH) Group of 14 or greater for Internet Key Exchange (IKE) Phase 1. View the IKE options dh-group option. If the IKE option is not set to use Diffie-Hellman (DH) Group of 14 or greater for Internet Key Exchange (IKE) Phase 1, this is a finding. |
Fix Text (F-7453r803423_fix) |
---|
Configure the IPsec VPN to use the Diffie-Hellman (DH) Group of 14 or greater for Internet Key Exchange (IKE) Phase 1. |