SYMP-NM-000150 - Symantec ProxySG must employ automated mechanisms to centrally verify authentication settings.

Information

The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.

Solution

Configure the Symantec ProxySG to use a centrally administered AAA server.

1. Log on to the Web Management Console.
2. Click Configuration >> Authentication >> RADIUS.
3. Click 'New' then enter a Realm name.
4. Under 'Realm configuration' enter the IP address for the primary RADIUS server and modify port (if necessary).
5. Enter a Secret pre-shared key, and enter the same Secret pre-shred key for confirmation, click 'OK'.
6. Click Radius Servers.
7. Enter an IP address for the Alternate Server and modify port (if necessary).
8. Click 'Apply'.
9. Click Configuration >> Policy >> Visual Policy Manager.
10. Click 'Launch', select the 'Admin Authentication' layer.
11. Right-click the 'Action' in each rule and click 'Set'.
12. Click 'New', then 'Authenticate', and choose the RADIUS realm configured in step 3.
13. Click 'File', click 'Install Policy on SG Appliance'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_SYM_ProxySG_Y20M04_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6(1), 800-53|CM-6b., CAT|II, CCI|CCI-000366, CCI|CCI-000372, Rule-ID|SV-104511r1_rule, STIG-ID|SYMP-NM-000150, Vuln-ID|V-94681

Plugin: BlueCoat

Control ID: 2004d36084e3d8ffe608bd4064f017f8ccf0359362c0d4a972e02c7a451be1ee