SOL-11.1-040380 - The operating system must terminate the network connection associated with a communications session at the end of the session or after 10 minutes of inactivity.

Information

This requirement applies to both internal and external networks.

Terminating network connections associated with communications sessions means de-allocating associated TCP/IP address/port pairs at the operating system level.

The time period of inactivity may, as the organization deems necessary, be a set of time periods by type of network access or for specific accesses.

Solution

The root role is required.

Configure the system to disconnect SSH sessions after 10 minutes of inactivity.

Modify the sshd_config file:

# pfedit /etc/ssh/sshd_config

Modify or add the lines containing:

ClientAliveInterval
ClientAliveCountMax

Change them to:

ClientAliveInterval 600
ClientAliveCountMax 0

Restart the SSH service:

# svcadm restart svc:/network/ssh

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SOL_11_x86_V2R9_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-10, CAT|III, CCI|CCI-001133, Rule-ID|SV-216119r603268_rule, STIG-ID|SOL-11.1-040380, STIG-Legacy|SV-60983, STIG-Legacy|V-48111, Vuln-ID|V-216119

Plugin: Unix

Control ID: 02db8e74112a47135fe8b0234c7038d151ed7597b4d6a2343727c6fa6dda1612