NET1645 - The network element must be configured to timeout after 60 seconds or less for incomplete or broken SSH sessions.

Information

An attacker may attempt to connect to the device using SSH by guessing the authentication method, encryption algorithm, and keys. Limiting the amount of time allowed for authenticating and negotiating the SSH session reduces the window of opportunity for the malicious user attempting to make a connection to the network element.

Solution

Configure the network devices so it will require a secure shell timeout of 60 seconds or less.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R27_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CSCv6|16.7, Rule-ID|SV-28744r2_rule, STIG-ID|NET1645, Vuln-ID|V-5612

Plugin: Juniper

Control ID: af5ec626e74efea8b31bfdbdca25039548067d94b7226ae3f33af6b4ab4438e6