STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Aruba Networking AOS VPN Security Technical Implementation Guide

V-266998

CAT II (Medium)

The Remote Access VPN Gateway must be configured to prohibit Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Forwarding (L2F).

Rule ID

SV-266998r1040760_rule

STIG

HPE Aruba Networking AOS VPN Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000382

Discussion

PPTP and L2F are obsolete methods for implementing virtual private networks. Both protocols may be easy to use and readily available, but they have many well-known security issues and exploits. Encryption and authentication are both weak.

Check Content

Verify the AOS configuration with the following commands:
show ip access-list vpnlogon
show firewall-cp

If PPTP or TCP 1723 are permitted, this is a finding.

Fix Text

Configure AOS with the following commands:
configure terminal
cd /mm
ip access-list session vpnlogon
any any svc-pptp deny
exit
write memory
cd /mynode
firewall cp
ipv4 deny any proto 6 ports 1723 1723
ipv6 deny any proto 6 ports 1723 1723
exit
write memory