CASA-VN-000610 - The Cisco ASA remote access VPN server must be configured to generate unique session identifiers using a FIPS-validated Random Number Generator (RNG) based on the Deterministic Random Bit Generators (DRBG) algorithm.

Information

Both IPsec and TLS gateways use the RNG to strengthen the security of the protocols. Using a weak RNG will weaken the protocol and make it more vulnerable.

Use of a FIPS validated RNG that is not DRGB mitigates to a CAT III.

Solution

Configure the ASA to have FIPS-mode enabled as shown in the example below.

ASA1(config)# fips enable
ASA1(config)# end

Note: FIPS mode change will not take effect until the configuration is saved and the device rebooted.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_ASA_Y24M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-23(3), CAT|II, CCI|CCI-001188, Rule-ID|SV-239977r666337_rule, STIG-ID|CASA-VN-000610, Vuln-ID|V-239977

Plugin: Cisco

Control ID: 41ab7b7f9a50cb9fbcd1aa7551ec8e61377a0a9c4a1af51c3ff41cf1340769ea