Remote access TLS VPNs will be configured to use a properly configured TLS version.

From Remote Access VPN STIG

Part of SRC-VPN-030 VPN TLS version

Associated with IA controls: ECSC-1

SV-23849r1_rule Remote access TLS VPNs will be configured to use a properly configured TLS version.

Vulnerability discussion

The TLS protocol allows clients and HTTP servers to communicate over a secure connection. It offers encryption, source authentication, and data integrity as means to protect information exchanged over unsecured, public networks. Only TLS is allowed because the manner in which previous version of the protocol used some unapproved cryptographic algorithms for its operation, thus this makes these older verison untrusted.

Check content

Verify by inspecting the configuration of the firewall or the remote access gateway. Verify the TLS protocol is used.

Fix text

Ensure that remote access gateway and the clients is using a secure protocol.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer