STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC NDM Security Technical Implementation Guide

V-255614

CAT II (Medium)

The A10 Networks ADC must authenticate Network Time Protocol sources.

Rule ID

SV-255614r961506_rule

STIG

A10 Networks ADC NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001967

Discussion

If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affected scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source.

Check Content

Review the device configuration.

The following command includes an output modifier to display only NTP-related configuration:
show run | include ntp

The output should contain either the "ntp auth-key" command or the "ntp trusted-key" command. 

If it does not, this is a finding.

Fix Text

The following command configures NTP authentication:
ntp [auth-key ID-num M string]
This creates an authentication key. For ID-num, enter a value between 1-65535. For string, enter a series of 1-31 alphanumeric characters for the key. This value is stored in the system using the A10 encryption algorithm.

The following command also configures NTP authentication:
ntp [trusted-key ID-num]
This adds an authentication key to the list of trusted keys. For num, enter the identification number of a configured authentication key to add the key to the trusted key list. You can enter more than one number, separated by whitespace, to simultaneously add multiple authentication keys to the trusted key list.