PANW-NM-000118 - The Palo Alto Networks security platform must not use SNMP Versions 1 or 2 - 'SNMP v3'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SNMP Versions 1 and 2 are not considered secure. Without the strong authentication and privacy that is provided by the SNMP Version 3 User-based Security Model (USM), an unauthorized user can gain access to network management information used to launch an attack against the network. SNMP Versions 1 and 2 cannot authenticate the source of a message nor can they provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system.

Solution

Go to Device >> Setup >> Operations; in the Miscellaneous pane, select SNMP Setup.
In the SNMP Setup window, complete the required fields.
For the Version, select V3.
Configure a view and assign it to a user.
In the upper half of the SNMP Setup window, select 'Add'.
In the Views window, complete the required fields; obtain the values for the OID and Mask fields from product documentation or vendor support.
In the Option field, select 'include'.
Select 'OK'.
In the lower half of the SNMP Setup window, select 'Add'.
Complete the required fields.
Select 'OK'.
Obtain the engineID of the Palo Alto device by issuing an SNMPv3 GET from the management workstation against the OID of the Palo Alto device.
Configure the SNMPv3 Trap Server profile; go to Device >> Server Profiles >> SNMP Trap; select 'Add'.
In the SNMP Trap Server Profile window, complete the required fields.
Select 'OK'.
Commit changes by selecting 'Commit' in the upper-right corner of the screen.
Select 'OK' when the confirmation dialog appears.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_PAN_Y22M04_STIG.zip

Item Details

References: CAT|I, CCI|CCI-003123, Rule-ID|SV-228670r513615_rule, STIG-ID|PANW-NM-000118, STIG-Legacy|SV-77257, STIG-Legacy|V-62767, Vuln-ID|V-228670

Plugin: Palo_Alto

Control ID: 50f522d1029ad5febe43d833612907608991cb5869c108f15c0d3661f15e0764