STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to DBN-6300 NDM Security Technical Implementation Guide

V-255546

CAT II (Medium)

The DBN-6300 must use internal system clocks to generate time stamps for audit records.

Rule ID

SV-255546r960927_rule

STIG

DBN-6300 NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000159

Discussion

In order to determine what is happening within the network infrastructure or to resolve and trace an attack, the network device must support the organization's capability to correlate the audit log data from multiple network devices to acquire a clear understanding of events. In order to correlate auditable events, time stamps are needed on all of the log records. If the internal clock is not used, the system may not be able to provide time stamps for log messages. Additionally, externally generated time stamps may not be accurate. Applications can use the capability of an operating system or purpose-built module for this purpose. (Note that the internal clock is required to be synchronized with authoritative time sources by other requirements.)

Check Content

Verify the configuration of the NTP server.

Navigate to Settings >> Initial Configuration >> Time.

View the "Time" settings window.

If an NTP server address is not configured, this is a finding.

Fix Text

Configure the NTP server on the device. The time difference is part of the NTP protocol and is not configurable.

Navigate to Settings >> Initial Configuration >> Time.

In the "Time" settings window, select the "NTP" button and enter the NTP server address.

Click on "Commit".