UCF STIG Viewer Logo

The Cisco ASA must be configured to use NIST FIPS-validated cryptography for Internet Key Exchange (IKE) Phase 1.


Overview

Finding ID Version Rule ID IA Controls Severity
V-239953 CASA-VN-000170 SV-239953r666265_rule Medium
Description
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The VPN gateway must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
STIG Date
Cisco ASA VPN Security Technical Implementation Guide 2021-08-16

Details

Check Text ( C-43186r666263_chk )
Verify the ASA uses a NIST FIPS-validated cryptography for IKE Phase 1 as shown in the example below.

crypto ikev2 policy 1
encryption aes-192

If the ASA is not configured to use NIST FIPS-validated cryptography for IKE Phase 1, this is a finding.
Fix Text (F-43145r666264_fix)
Configure the ASA to use NIST FIPS-validated cryptography for IKE Phase 1.

ASA1(config)# crypto ikev2 policy 1
ASA1(config-ikev2-policy)# encryption aes-192