DISA STIGS Viewer

AOS, when used as a VPN Gateway, must be configured to route sessions to an intrusion detection and prevention system (IDPS) for inspection.

Overview

Finding ID Version Rule ID IA Controls Severity
V-266999 ARBA-VN-000710 SV-266999r1040763_rule   Medium
Description
Remote access devices, such as those providing remote access to network devices and information systems, that lack automated capabilities increase risk and make remote user access management difficult at best. Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, nonorganization-controlled network. Automated monitoring of remote access sessions allows organizations to detect cyberattacks and ensure ongoing compliance with remote access policies by auditing connection activities of remote access capabilities from a variety of information system components (e.g., servers, workstations, notebook computers, smartphones, and tablets).
STIG Date
HPE Aruba Networking AOS VPN Security Technical Implementation Guide 2024-10-29

Details

Check Text (C-70923r1040761_chk)
Verify the AOS configuration with the following commands:
show running-config | include default-gateway
show running-config | include "ipv4 route"
show running-config | include "ipv6 route"

If any routes exist that do not route sessions to an IDPS for inspection, this is a finding.
Fix Text (F-70826r1040762_fix)
Configure AOS with the following commands:
configure terminal
ip default-gateway <ipv4>
ipv6 default-gateway <ipv6>
ip route <A.B.C.D IPv4 network> <A.B.C.D netmask> <A.B.C.D nexthop> <cost>
ipv6 route <X:X:X:X::X IPv6 network/prefix> <X:X:X:X::X nexthop> <cost>
write memory