STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cisco ISE NDM Security Technical Implementation Guide

V-242644

CAT II (Medium)

The Cisco ISE must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.

Rule ID

SV-242644r1167992_rule

STIG

Cisco ISE NDM Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001967

Discussion

If NTP is not authenticated, an attacker can introduce a rogue NTP server. This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affect scheduled actions. NTP authentication is used to prevent this tampering by authenticating the time source.

Check Content

1. Choose Administration >> System >> Settings >> System Time.
2.  Review the configuration of the NTP servers.
3.  Verify  "Only allow authenticated NTP servers" is checked. 

If the Cisco ISE is not configured to authenticate NTP sources using authentication that is cryptographically based, this is a finding.

Fix Text

1. Choose Administration >> System >> Settings >> System Time.
2. Enter unique IP addresses (IPv4/IPv6/FQDN) for the NTP servers.
3. Check the "Only allow authenticated NTP servers" box to restrict Cisco ISE to use only authenticated NTP servers to keep system and network time. DOD requires NTP authentication where available, so configure the NTP server using private keys. 
4. Click the "NTP Authentication Keys" tab and specify one or more authentication keys if any of the specified servers requires authentication via an authentication key, as follows:
    - Click "Add".
    - Enter the necessary Key ID and Key Value. Specify whether the key in question is trusted by activating or deactivating the Trusted Key option, and click "OK". The Key ID field supports numeric  values between 1 and 65535, and the Key Value field supports up to 15 alphanumeric characters.
    - Return to the NTP Server Configuration tab when finished entering the NTP Server Authentication Keys.
5. Click "Save".

Note: If authentication settings are no longer available, then a DOD-approved solution must be used. Use of MD5 results in a CAT 2 finding since NTP authentication is required. DOD-approved solutions consist of a combination of a primary and secondary time source using a combination or multiple instances of the following: a time server designated for the appropriate DOD network (NIPRNet/SIPRNet); United States Naval Observatory (USNO) time servers; and/or the Global Positioning System (GPS). The secondary time source must be located in a different geographic region than the primary time source.