CASA-VN-000550 - The Cisco ASA remote access VPN server must be configured to use TLS 1.2 or higher to protect the confidentiality of remote access connections.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks that exploit vulnerabilities in this protocol.

NIST SP 800-52 provides guidance for client negotiation on either DoD-only or public-facing servers.

Solution

Configure the ASA to use TLS 1.2 or higher as shown in the example below.

ASA1(config)# ssl server-version tlsv1.2 dtlsv1.2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_ASA_Y23M01_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000068, Rule-ID|SV-239975r666331_rule, STIG-ID|CASA-VN-000550, Vuln-ID|V-239975

Plugin: Cisco

Control ID: f196cf4826d08d7219b2d892936562538620b876e5a6b8f80bb6c93215edd8c6