Rule ID
SV-283410r1194924_rule
Version
V1R1
If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source. Satisfies: SRG-APP-000395-NDM-000347, SRG-APP-000920-NDM-000320, SRG-APP-000925-NDM-000330
Verify the NTP server is configured to utilize a valid key using the following command: cli% shownet -d Example output: Detailed information about configured NTP servers 16.110.135.123 : 10.157.44.5 : key 1 If "Detailed information about configured NTP servers" does not display an NTP server with a key, this is a finding.
Import the NTP key and add it to the NTP server with the following commands: cli% setnet ntp -add <server ip address> cli% importkeys ntp stdin Please paste the keys for ntp. Once finished, please press Enter twice. 1 SHA256 myfirstsecretkey cli% cli% setnet ntp -add -key <ID> <NTP_Server_IP>