Nist SP 1800-8
Nist SP 1800-8
Nist SP 1800-8
Securing Wireless
Infusion Pumps
in Healthcare Delivery Organizations
Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B),
and How-To Guides (C)
Gavin O’Brien
Sallie Edwards
Kevin Littlefield
Neil McNab
Sue Wang
Kangmin Zheng
Gavin O’Brien
National Cybersecurity Center of Excellence
Information Technology Laboratory
Sallie Edwards
Kevin Littlefield
Neil McNab
Sue Wang
Kangmin Zheng
The MITRE Corporation
McLean, VA
August 2018
Securing Wireless
Infusion Pumps
in Healthcare Delivery Organizations
Volume A:
Executive Summary
Gavin O’Brien
National Cybersecurity Center of Excellence
Information Technology Laboratory
Sallie Edwards
Kevin Littlefield
Neil McNab
Sue Wang
Kangmin Zheng
The MITRE Corporation
McLean, VA
August 2018
CHALLENGE
Technology improvements happen rapidly across all sectors. For organizations focused on streamlining
operations and delivering high-quality patient care, it can be difficult to take advantage of the latest
technological advances, while also ensuring that new medical devices or applications are secure. For
many HDOs, this can result in improperly configured information technology networks and components
that increase cybersecurity risks.
Unlike prior medical devices that were once standalone instruments, today’s wireless infusion pumps
connect to a variety of healthcare systems, networks, and other devices. Although connecting infusion
pumps to point-of-care medication systems and electronic health records (EHRs) can improve healthcare
delivery processes, using a medical device’s connectivity capabilities can create significant cybersecurity
risk, which could lead to operational or safety risks. Tampering, intentional or otherwise, with the
SOLUTION
The NCCoE has developed cybersecurity guidance, NIST Special Publication (SP) 1800-8: Securing
Wireless Infusion Pumps, by using standards-based commercially available technologies and industry
best practices to help HDOs strengthen the security of the wireless infusion pump ecosystem within
healthcare facilities.
This NIST cybersecurity publication provides best practices and detailed guidance on how to manage
assets, protect against threats, and mitigate vulnerabilities by performing a questionnaire-based risk
assessment. In addition, the security characteristics of the wireless infusion pump ecosystem are
mapped to currently available cybersecurity standards and the Health Insurance Portability and
Accountability Act (HIPAA) Security Rule. Based on our risk assessment findings, we apply security
controls to the pump’s ecosystem to create a “defense-in-depth” solution for protecting infusion pumps
and their surrounding systems against various risk factors. Ultimately, we show how biomedical,
networking, and cybersecurity engineers and IT professionals can securely configure and deploy wireless
infusion pumps to reduce cybersecurity risk.
While the NCCoE used a suite of commercial products to address this challenge, this guide does not
endorse these particular products, nor does it guarantee compliance with any regulatory initiatives. Your
organization's information security experts should identify the products that will best integrate with
your existing tools and IT system infrastructure. Your organization can adopt this solution or one that
adheres to these guidelines in whole, or you can use this guide as a starting point for tailoring and
implementing parts of a solution.
BENEFITS
The NCCoE’s practice guide to securing wireless infusion pumps in HDOs can help your organization:
▪ reduce cybersecurity risk, and potentially reduce impact to safety and operational risk, such as
the loss of patient information or interference with the standard operation of a medical device
▪ develop and execute a defense-in-depth strategy that protects the enterprise with layers of
security to avoid a single point of failure and provide strong support for availability
TECHNOLOGY PARTNERS/COLLABORATORS
Organizations participating in this project submitted their capabilities in response to an open call in the
Federal Register for all sources of relevant security capabilities from academia and industry (vendors
and integrators). The following respondents with relevant capabilities or product components (identified
as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development
Agreement (CRADA) to collaborate with NIST in a consortium to build this example solution.
Certain commercial entities, equipment, products, or materials may be identified by name or company
logo or other insignia in order to acknowledge their participation in this collaboration or to describe an
experimental procedure or concept adequately. Such identification is not intended to imply special
status or relationship with NIST or recommendation or endorsement by NIST or NCCoE; neither is it
intended to imply that the entities, equipment, products, or materials are necessarily the best available
for the purpose.
The National Cybersecurity Center of Excellence (NCCoE), a part of the LEARN MORE
National Institute of Standards and Technology (NIST), is a Visit https://www.nccoe.nist.gov
collaborative hub where industry organizations, government agencies, nccoe@nist.gov
and academic institutions work together to address businesses’ most 301-975-0200
pressing cybersecurity challenges. Through this collaboration, the
NCCoE develops modular, easily adaptable example cybersecurity
solutions demonstrating how to apply standards and best practices
using commercially available technology.
Securing Wireless
Infusion Pumps
in Healthcare Delivery Organizations
Volume B:
Approach, Architecture, and Security Characteristics
Gavin O’Brien
National Cybersecurity Center of Excellence
Information Technology Laboratory
Sallie Edwards
Kevin Littlefield
Neil McNab
Sue Wang
Kangmin Zheng
The MITRE Corporation
McLean, VA
August 2018
National Institute of Standards and Technology Special Publication 1800-8B, Natl. Inst. Stand. Technol.
Spec. Publ. 1800-8B, 89 pages, (July 2018), CODEN: NSPUE2
FEEDBACK
As a private-public partnership, we are always seeking feedback on our Practice Guides. We are
particularly interested in seeing how businesses apply NCCoE reference designs in the real world. If you
have implemented the reference design, or have questions about applying it in your environment,
please email us at hit_nccoe@nist.gov.
and best practices to develop modular, easily adaptable example cybersecurity solutions using
commercially available technology. The NCCoE documents these example solutions in the NIST Special
Publication 1800 series, which maps capabilities to the NIST Cyber Security Framework and details the
steps needed for another entity to recreate the example solution. The NCCoE was established in 2012 by
NIST in partnership with the State of Maryland and Montgomery County, Md.
To learn more about the NCCoE, visit https://www.nccoe.nist.gov/. To learn more about NIST, visit
https://www.nist.gov.
The documents in this series describe example implementations of cybersecurity practices that
businesses and other organizations may voluntarily adopt. These documents do not describe regulations
or mandatory practices, nor do they carry statutory authority.
ABSTRACT
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with
the patient or medical provider. However, today’s medical devices connect to a variety of healthcare
systems, networks, and other tools within a healthcare delivery organization (HDO). Connecting devices
to point-of-care medication systems and electronic health records can improve healthcare delivery
processes; however, increasing connectivity capabilities also creates cybersecurity risks. Potential
threats include unauthorized access to patient health information, changes to prescribed drug doses,
and interference with a pump’s function.
The NCCoE at NIST analyzed risk factors in and around the infusion pump ecosystem by using a
questionnaire-based risk assessment to develop an example implementation that demonstrates how
HDOs can use standards-based, commercially available cybersecurity technologies to better protect the
infusion pump ecosystem, including patient information and drug library dosing limits.
KEYWORDS
authentication; authorization; digital certificates; encryption; infusion pumps; Internet of Things (IoT);
medical devices; network zoning; pump servers; questionnaire-based risk assessment; segmentation;
virtual private network (VPN); Wi-Fi; wireless medical devices
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
ACKNOWLEDGMENTS
We are grateful to the following individuals for their generous contributions of expertise and time.
Name Organization
The Technology Partners/Collaborators who participated in this build submitted their capabilities in
response to a notice in the Federal Register. Respondents with relevant capabilities or product
components were invited to sign a Cooperative Research and Development Agreement (CRADA) with
NIST, allowing them to participate in a consortium to build this example solution. We worked with:
Baxter Healthcare Corporation • Sigma Spectrum™ Large Volume Pump (LVP) Version 8
• Sigma Spectrum Wireless Battery Module Version 8
• Sigma Spectrum Master Drug Library Version 8
• Care Everywhere Gateway Server Version 14
Becton, Dickinson and Company (BD) • Alaris® 8015 Patient Care Unit (PCU) Version 9.19.2
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Hospira Inc., a Pfizer Company (ICU • Plum 360™ Infusion System Version 15.10
Medical)
• LifeCare PCA™ Infusion System Version 7.02
• Hospira MedNet™ Version 6.2
Intercede MyID®
Medical Device Innovation, Safety & Medical Device Risk Assessment Platform (MDRAP™)
Security Consortium (MDISS)
List of Tables
Table 4-1 Security Characteristics and Controls Mapping –- NIST Cyber Security Framework ..............20
Table 4-2 Products and Technologies .................................................................................................29
Table 8-1 Functional Test Plan............................................................................................................66
Table 8-2 Test Case WIP-1 ..................................................................................................................67
Table 8-3 Test Case WIP-2 ..................................................................................................................68
Table 8-4 Test Case WIP-3 ..................................................................................................................69
Table 8-5 Test Case WIP-4 ..................................................................................................................70
Table 8-6 Test Case WIP-5 ..................................................................................................................70
Table 8-7 Test Case WIP-6 ..................................................................................................................71
Table 8-8 Test Case WIP-7 ..................................................................................................................72
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
the patient or medical provider [1]. With technological improvements designed to enhance patient care,
these devices now connect wirelessly to a variety of systems, networks, and other tools within a
healthcare delivery organization (HDO)—ultimately contributing to the Internet of Medical Things
(IoMT). The wireless infusion pump ecosystem (the pump, the network, and the data stored in and on a
pump) faces a range of threats, including unauthorized access to protected health information (PHI),
changes to prescribed drug doses, and interference with a pump’s function.
In addition to managing interconnected medical devices, HDOs oversee complex, highly technical
environments, from back-office applications for billing and insurance services, supply chain and
inventory management, and staff scheduling, to clinical systems, such as radiological and
pharmaceutical support. In this intricate healthcare environment, HDOs and medical device
manufacturers that share responsibility and take a collaborative, holistic approach to reducing
cybersecurity risks of the wireless infusion pump ecosystem can better protect healthcare systems,
patients, protected health information (PHI), and enterprise information.
The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and
Technology (NIST) developed an example implementation that demonstrates how HDOs can use
standards-based, commercially available cybersecurity technologies to better protect the wireless
infusion pump ecosystem, including patient information and drug library dosing limits.
The NCCoE’s project has resulted in a NIST Cybersecurity Practice Guide, Securing Wireless Infusion
Pumps in Healthcare Delivery Organizations, that addresses how to manage this challenge in clinical
settings, with a reference design and example implementation. Our example solution starts with two
types of risk assessments: an industry analysis of risk and a questionnaire-based-risk assessment. With
the results of that assessment, we then used a “defense-in-depth” strategy to secure the pump, server
components, and surrounding network to create a better-protected environment for wireless infusion
pumps.
The solution and architecture presented in this guide are built upon standards-based, commercially
available products and represent one of many possible solutions and architectures. The example
implementation can be used by any organization that is deploying wireless infusion pump systems and
that is willing to perform its own risk assessment and implement controls based on its risk posture.
Section 1, Summary, presents the challenge addressed by the NCCoE project, with an in-depth look at
our approach, the architecture, and the security characteristics that we used; the solution demonstrated
to address the challenge; benefits of the solution; and the technology partners that participated in
building, demonstrating, and documenting the solution. The Summary also explains how to provide
feedback on this guide.
Section 2, How to Use This Guide, explains how readers like you—business decision makers, program
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
managers, information technology (IT) professionals (e.g., systems administrators), and biomedical
engineers—might use each volume of the guide.
Section 3, Approach, offers a detailed treatment of the scope of the project, and describes the
assumptions on which the security platform development was based, the risk assessment that informed
platform development, and the technologies and components that industry collaborators gave us to
enable platform development.
Section 4, Risk Assessment and Mitigation, highlights the risks that we found, along with the potential
response and mitigation efforts that can help lower risks for HDOs.
Section 5, Architecture, describes the usage scenarios supported by project security platforms, including
the NIST Cybersecurity Framework Functions supported by each component contributed by our
collaborators.
Section 6, Life Cycle Cybersecurity Issues, discusses cybersecurity considerations from a product-life-
cycle perspective, including procurement, maintenance, and end of life.
Section 7, Security Characteristics Analysis, provides details about the tools and techniques that we used
to perform risk assessments pertaining to wireless infusion pumps.
Section 8, Functional Evaluation, summarizes the test sequences that we employed to demonstrate
security platform services, the NIST Cybersecurity Framework Functions to which each test sequence is
relevant, and the NIST Special Publication (SP) 800-53 Revision 4 controls that applied to the functions
being demonstrated.
Section 9, Future Considerations, is a brief treatment of other applications that NIST might explore in
the future to further support wireless infusion pump cybersecurity.
The appendices provide acronym translations, references, a mapping of the wireless infusion pump
project to the NIST Cybersecurity Framework Core (CFC), and a list of additional informative security
references cited in the CFC.
Wireless infusion pumps are challenging to protect, for several reasons. They can be infected by
malware, which can cause them to malfunction or operate differently than originally intended, and
traditional malware protection could negatively impact the pump’s ability to operate efficiently. In
addition, most wireless infusion pumps contain a maintenance default passcode. If HDOs do not change
the default passcodes when provisioning pumps, and do not periodically change the passwords after
pumps are deployed, this creates a vulnerability. This can make it difficult to revoke access codes
(e.g., when a hospital employee resigns from the job). Furthermore, information stored inside infusion
pumps must be properly secured, including data from drug library systems, infusion rates and dosages,
or PHI [2], [3], [4], [5], [6].
Additionally, like other devices with operating systems and software that connect to a network, the
wireless infusion pump ecosystem creates a large attack surface (i.e., the different points where an
attacker could get into a system, and where they could exfiltrate data out), primarily due to
vulnerabilities in operating systems, subsystems, networks, or default configuration settings that allow
for possible unauthorized access [6], [7], [8]. Because many infusion pump models can be accessed and
programmed remotely through a healthcare facility’s wireless network, this vulnerability could be
exploited to allow an unauthorized user to interfere with the pump’s function, harming a patient
through incorrect drug dosing or the compromise of that patient’s PHI.
These risk factors are real, exposing the wireless pump ecosystem to external attacks, compromise, or
interference [6], [8], [9]. Digital tampering, intentional or otherwise, with a wireless infusion pump’s
ecosystem (the pump, the network, and data in and on the pump) can expose an HDO to critical risk
factors, such as malicious actors; loss of data; a breach of PHI; loss of services; loss of health records; the
potential for downtime; and damage to an HDO’s reputation, productivity, and bottom-line revenue.
This practice guide helps you address your assets, threats, and vulnerabilities by demonstrating how to
perform a questionnaire-based risk assessment survey. After you complete the assessment, you can
apply security controls to the infusion pumps in your area of responsibility to create a defense-in-depth
solution to protect them from cybersecurity risks.
In addition, the security characteristics of the wireless infusion pump ecosystem are mapped to
currently available cybersecurity standards and the Health Insurance Portability and Accountability Act
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
(HIPAA) Security Rule. In developing our solution, we used standards and guidance from the following
sources:
▪ maps security characteristics to standards and best practices from NIST and other standards
organizations, as well as to the HIPAA Security Rule [10], [14], [20], [21], [22]
▪ provides a detailed architecture and capabilities that address security controls
▪ provides a how-to for implementers and security engineers to recreate the reference design
▪ is modular and uses products that are readily available and interoperable with existing IT
infrastructure and investments
▪ illustrate cybersecurity standards and best-practice guidelines to better secure the wireless
infusion pump ecosystem, such as the hardening of operating systems, segmenting the network,
file and program whitelisting, code-signing, and using certificates for both authorization and
encryption, maintaining the performance and usability of wireless infusion pumps
▪ reduce risks from the compromise of information, including the potential for a breach or loss of
PHI, as well as not allowing these medical devices to be used for anything other than the
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
intended purposes
▪ document a defense-in-depth strategy to introduce layers of cybersecurity controls that avoid a
single point of failure and provide strong support for availability. This strategy may include a
variety of tactics: using network segmentation to isolate business units and user access; applying
firewalls to manage and control network traffic; hardening and enabling device security features
to reduce zero-day exploits; and implementing strong network authentication protocols and
proper network encryption, monitoring, auditing, and intrusion detection systems (IDS) and
intrusion prevention systems (IPS)
▪ highlight best practices for the procurement of wireless infusion pumps, by including the need
for cybersecurity features at the point of purchase
▪ call upon industry to create new best practices for healthcare providers to consider when on-
boarding medical devices, with a focus on elements such as asset inventory, certificate
management, device hardening and configuration, and a clean-room environment to limit the
possibility of zero-day vulnerabilities
Business decision makers, including chief security and technology officers, will be interested in the
Executive Summary (NIST SP 1800-8A), which describes the:
mitigate risk will be interested in this part of the guide, NIST SP 1800-8b, which describes what we did
and why. The following sections will be of particular interest:
▪ Section 4, Risk Assessment and Mitigation, provides a description of the risk analysis we
performed
▪ Section 4.3, Security Characteristics and Controls Mapping, maps the security characteristics of
this example solution to cybersecurity standards and best practices
You might share the Executive Summary, NIST SP 1800-8A, with your leadership team member to help
them understand the significant risk of unsecured IoMT and the importance of adopting standards-
based, commercially available technologies that can help secure the wireless infusion pump ecosystem.
IT professionals who want to implement an approach like this will find the whole practice guide useful.
You can use the How-To portion of the guide, NIST SP 1800-8C, to replicate all or parts of the build
created in our lab. The How-To guide provides specific product installation, configuration, and
integration instructions for implementing the example solution. We do not recreate the product
manufacturers’ documentation, which is generally widely available. Rather, we show how we
incorporated the products together in our environment to create an example solution.
This guide assumes that IT professionals have experience implementing security products within the
enterprise. While we have used a suite of commercial products to address this challenge, this guide does
not endorse these particular products. Your organization can adopt this solution or one that adheres to
these guidelines in whole, or you can use this guide as a starting point for tailoring and implementing
parts of NCCoE’s questionnaire-based risk assessment and the deployment of a defense-in-depth
strategy. Your organization’s security experts should identify the products that will best integrate with
your existing tools and IT system infrastructure. We hope you will seek products that are congruent with
applicable standards and best practices. Section 4.4, Technologies, lists the products we used and maps
them to the cybersecurity controls provided by this reference solution.
and placeholders
blue text link to other parts of the All publications from NIST’s National
document, a web URL, or an Cybersecurity Center of Excellence are
email address available at https://nccoe.nist.gov.
3 Approach
Medical devices have grown increasingly powerful, offering patients improved, safer healthcare options
with less physical effort for providers. To accomplish this, medical devices now contain operating
systems and communication hardware that allow them to connect to networks and other devices. The
connected functionality responsible for much of the improvement of medical devices poses challenges
not formerly seen with standalone instruments.
Clinicians and patients rely on infusion pumps for a safe and accurate administration of fluids and
medications. However, the FDA has identified problems that can compromise the safe use of external
infusion pumps [2], [3], [7]. These issues can lead to over-infusion or under-infusion, missed treatments,
or delayed therapy. The NCCoE initiated this project to help healthcare providers develop a more secure
wireless infusion pump ecosystem, which can be applied to similarly connected medical devices. The
wireless infusion pump was selected as a representative medical device. Throughout the remainder of
this guide, the focus will be on the secure operation of the wireless infusion pump ecosystem. Both the
Throughout the wireless infusion pump project, we collaborated with our healthcare Community of
Interest (COI) and cybersecurity vendors to identify infusion pump threat actors, define interactions
between the actors and systems, review risk factors, develop an architecture and reference design,
identify applicable mitigating security technologies, and design an example implementation. This
practice guide highlights the approach used to develop the NCCoE reference solution. Elements include
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
risk assessment and analysis, logical design, build development, test and evaluation, and security control
mapping. This practice guide seeks to help the healthcare community evaluate the security environment
surrounding infusion pumps deployed in a clinical setting.
3.1 Audience
This guide is primarily intended for professionals implementing security solutions within an HDO. It may
also be of interest to anyone responsible for securing non-traditional computing devices (i.e., the
Internet of Things [IoT]).
More specifically, Volume B of the practice guide (NIST SP 1800-8B) is designed to appeal to a wide
range of job functions. This volume provides cybersecurity or technology decision makers within HDOs
with a view into how they can make the medical device environment more secure to help improve their
enterprise’s security posture and help reduce enterprise risk. Additionally, this volume offers technical
staff guidance on architecting a more secure medical device network and instituting compensating
controls.
3.2 Scope
The NCCoE project focused on securing the environment of the medical device and not re-engineering
the device itself. To do this, we reviewed known vulnerabilities in wireless infusion pumps and examined
how the architecture and component integration could be designed to increase the security of the
device. The approach considered the life cycle of a wireless infusion pump, from planning the purchase
to decommissioning, with a concentration on the configuration, use, and maintenance phases.
3.3 Assumptions
Considerable research, investigation, and collaboration went into the development of the reference
design in this guide. The actual build and example implementation of this architecture occurred in a lab
environment at the NCCoE. Although the lab is based on a clinical environment, it does not mirror the
complexity of an actual hospital network. It is assumed that any actual clinical environment would
represent additional complexity.
This guide may help you design an entirely new infrastructure; however, this guide is geared toward
those with an established infrastructure, as that represents the largest portion of readers. Hospitals and
clinics are likely to have some combination of the capabilities described in this reference solution.
Before applying any measures addressed in this guide, we recommend that you review and test them
for applicability to your existing environment. No two hospitals or clinics are the same, and the impact
of applying security controls will differ.
The NCCoE recommends that any discussion of risk management, particularly at the enterprise level,
begins with a comprehensive review of NIST SP 800-37, Guide for Applying the Risk Management
▪ Tier 1: Organization
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
This guide focuses on the Tier 3 application of risk management, but incorporates other industry
risk-management and risk-assessment standards and best practices for the context of networked
medical devices in HDOs:
where security risks may have safety implications. AAMI TIR57 [9] was particularly useful in this regard,
as it specified elements of medical device security using NIST’s RMF, ANSI/AAMI/IEC 80001-1, IEC/TR
80001-2, and ANSI/AAMI/ISO 14971:2007 [11], [12], [13], [15], [16], [17], [18], [19], [23], [24]. Also, the
Venn diagram in Figure 4-2 illustrates the relationship between security and safety risks (AAMI TIR57).
As seen in this diagram, there are cybersecurity risks that may have safety impacts. For HDOs, these risks
should receive special attention from both security and safety personnel.
Activities involved in our industry analysis included reaching out to our COI and other industry experts
through workshops and focus group discussions. After receiving feedback on the NCCoE’s use case
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
publication through a period of public comment, the NCCoE adjudicated the comments and clarified a
project description. These activities were instrumental to identifying primary risk factors as well as
educating our team on the uniqueness of cybersecurity risks involved in protecting medical devices in
healthcare environments.
All risk assessment activities provide an understanding of the challenges and risks involved when
integrating medical devices—in this case, wireless infusion pumps—into a typical IT network. Based on
this analysis, this project has two fundamental objectives:
Based on our risk assessments and additional research, we identified primary threats, vulnerabilities,
and risks that should be addressed when using wireless infusion pumps in HDOs.
4.1.4 Threats
Some potential known threats in HDOs that use network-connected medical devices, such as wireless
infusion pumps, are listed below. Refer to Appendix A for a description of each threat.
▪ targeted attacks
▪ advanced persistent threats (APTs)
▪ disruption of service: denial-of-service (DoS) and distributed-denial-of-service (DDoS) attacks
▪ malware infections
▪ theft or loss of assets
▪ unintentional misuse
▪ vulnerable systems or devices directly connected to the device (e.g., via Universal-Serial-Bus
[USB] or other hardwired, non-network connections)
It is important to understand that the threat landscape is constantly evolving, and that unknown threats
exist and may be unavoidable. These unknown threats need to be identified and remediated as soon as
possible after they are found.
4.1.5 Vulnerabilities
Vulnerabilities afflict wireless infusion pump devices, pump management applications, network
applications, and even the physical environment and personnel using the device or associated systems.
Within a complex system-of-systems environment, vulnerabilities may be exploited at all levels. There
are multiple information resources available to keep you informed about potential vulnerabilities. This
guide recommends that security professionals turn to the National Vulnerability Database (NVD). The
NVD is the United States (U.S.) government repository of standards-based vulnerability management
data (https://nvd.nist.gov).
Some typical vulnerabilities that may arise when using wireless infusion pumps are listed below. Refer to
Appendix B for a description of each vulnerability.
NIST SP 800-30 further notes, within a definition of risk assessment, that, “assessing risk requires careful
analysis of threat and vulnerability information to determine the extent to which circumstances or
events could adversely impact an organization and the likelihood that such circumstances or events will
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
occur.”
Based on the above guidance from NIST SP 800-30, several risks endanger medical devices:
▪ Infusion pumps and server components may be leveraged for APTs and may serve as pivot
points to cause adverse conditions throughout a hospital’s infrastructure.
▪ Infusion pumps may be manipulated to prevent the effective implementation of safety
measures, such as the drug library.
▪ Infusion pump interfaces may be used for unintended or unexpected purposes, with those
conditions leading to degraded performance of the pump.
▪ PHI may be accessed remotely by unauthorized individuals.
▪ PHI may be disclosed to unauthorized individuals if the device is lost, stolen, or improperly
decommissioned.
▪ Hospital’s network may have improper third-party vendor connections
Although these risks may persist in infusion pumps and server components, HDOs should perform
appropriate due diligence in determining the extent of the business impact and the likelihood of each
risk factor.
Vulnerabilities may be present in infusion pumps and their server components, as these devices often
include embedded operating systems on the endpoints. Infusion pumps are designed to maintain a
prolonged period of useful life, and, as such, may include system components (e.g., an embedded
operating system) that may reach either their end of life, or a period of degraded updates prior to the
infusion pump being retired from service. Patching and updating may become difficult over the course
of time.
Infusion pumps may not allow for the addition of third-party mechanisms, such as antivirus or anti-
malware controls. Infusion pumps are validated medical devices, with set configuration and deployment
specifications, and therefore may not accept third-party security controls or third-party-provided
endpoint mitigation on the pump itself. Validation supports a manufacturer’s capabilities regarding the
intended purpose of the device (i.e., infusing patients with medication, analgesics, or nutrients), and
Malicious software, or malware, may cause adverse conditions on the pump, degrading the
performance of the pump or rendering the device unable to perform its function (e.g., ransomware;
trojans that may allow for remote access to use the device as a pivot point; backdoors; malicious
software that may allow for data exfiltration or may inappropriately consume system resources,
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
preventing the pump from rendering patient care functionality). Additionally, malware may be used to
convert the infusion pump into an access point for malicious actors to subsequently access or disrupt
the operations of other hospital systems.
As noted above, infusion pumps may allow for the manipulation of configurations or safety measures
implemented through the drug library (e.g., adjusting dosage or flow rates). This risk may be instantiated
through local access, such as an interface or port on the device with either no or weak authentication or
access control in place. Further, infusion pumps may be reachable across a hospital’s network, which
provides an avenue for a malicious actor to cause an adverse event.
Pumps may implement local ports, such as USB ports serial interfaces, Bluetooth, radio frequency, or
other mechanisms that allow for close proximity connection to the pump. These ports may be
implemented with the intent to facilitate technical support; however, they also pose a risk by providing
a pathway for malicious actors to cause adverse conditions to the pump.
Modern infusion pumps and server components may include PHI, such as a patient’s name, medical
record number (MRN), procedure coding, and medication or treatment. Through similar deficiencies
that would allow configuration or use manipulation as noted above, this PHI may then be viewed,
accessed, or removed by unauthorized individuals. Also, individuals who have direct access to the
infusion pump may be able to extract information through unsecured ports or interfaces [2], [3], [7],
[17], [25].
The following common vulnerabilities and control deficiencies may enable these risks:
however, use of the ports for unauthorized or unexpected purposes, such as recharging a
mobile device (e.g., smart phone, tablet), may cause a disruption to the pump’s standard
operation.
Risk mitigation is a subset of risk response. Risk response is defined by NIST SP 800-30 as accepting;
avoiding; mitigating; sharing, or transferring risks. When considering risk response, your organization
should recommend, to a corporate risk management board, ways that the Information Risk Manager (or
equivalent) should treat risk.
These remediation responses can take the form of administrative, physical, and technical controls, or an
appropriate mix. As previously mentioned, Appendix C identifies several mitigation recommendations
▪ physical security controls, including standard tamper-evident physical seals, which can be
applied to hardware to indicate unauthorized physical access [10], [14]
▪ ensuring the implementation of a physical asset management program that manages and tracks
unique, mobile media, such as removable flash memory devices (e.g., Secure Digital [SD] cards,
thumb drives) used by pump software hosted on an endpoint client. Consider the encryption of
all portable media used in such a fashion [10], [14], [26], [27].
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
▪ following procedures for clearing wireless network authentication credentials on the endpoint
client if the pump is to be removed or transported from the facility. These procedures can be
found in pump user manuals, but should be referenced in official HDO policies and procedures
[28], [29], [30], [31].
▪ changing wireless network authentication credentials regularly and, if there is evidence of
unauthorized access to a pump system, immediately changing network authentication
credentials [10], [14]
▪ ensuring that all wireless network access is minimally configured for Wi-Fi Protected Access II
(WPA2) Pre-Shared Key (PSK) encryption and authentication. All pumps should be set to WPA2
encryption [32], [33], [34], [35].
▪ ensuring that all patching has been applied, including those components that will use WPA2
▪ All pumps and pump systems should include cryptographic modules that have been validated as
meeting NIST Federal Information Processing Standards (FIPS) Publication 140-2 [36].
▪ All ports are disabled, except when in use, and the device has no listening ports [3], [9], [10],
[14], [25].
▪ employing mutual transport layer security (TLS) encryption in transit between the client and
server [37]
▪ employing individual pump authentication with no shared key for all pumps [10], [14]
▪ certificate-based authentication for a pump server [28], [29], [30], [31]
During the course of this project, several vulnerabilities were published in the NVD (https://nvd.nist.gov)
that identified means by which malicious actors may remotely compromise WPA2-secured sessions
through the use of “key reinstallation attacks” (KRACKs). Individuals should review noted WPA2
vulnerabilities, refer to vendor/manufacturer patching and updates, and apply those patches and
updates as soon as possible.
164.310(d)(2)(iv),
164.312(a)(2)(ii)
45 C.F.R. §§
PR.DS-6: Integrity checking 164.308(a)(1)(ii)(D), A.12.2.1,
mechanisms are used to 164.312(b), A.12.5.1,
SC-16, SI-7 IGAU
verify software, firmware, 164.312(c)(1), A.14.1.2,
and information integrity 164.312(c)(2), A.14.1.3
164.312(e)(2)(i)
PR.IP-1: A baseline CM-2,
configuration of information CM-3, A.12.1.2,
Information
technology/industrial control CM-4, 45 C.F.R. §§ A.12.5.1,
Protection
systems is created and CM-5, CNFS, CSUP, 164.308(a)(8), A.12.6.2,
Processes and
maintained incorporating CM-6, SAHD, RDMP 164.308(a)(7)(i), A.14.2.2,
Procedures
security principles (e.g. CM-7, 164.308(a)(7)(ii) A.14.2.3,
(PR.IP)
concept of least CM-9, A.14.2.4
functionality) SA-10
164.310(d)(2)(iv)
45 C.F.R. §§
PR.IP-6: Data is destroyed A.8.2.3, A.8.3.1,
MP-6 DIDT 164.310(d)(2)(i),
according to policy A.8.3.2, A.11.2.7
164.310(d)(2)(ii)
45 C.F.R. §§
164.308(a)(3)(ii)(A),
164.310(d)(1),
PR.MA-2: Remote 164.310(d)(2)(ii),
maintenance of 164.310(d)(2)(iii),
A.11.2.4,
organizational assets is 164.312(a),
MA-4 CSUP A.15.1.1,
approved, logged, and 164.312(a)(2)(ii),
A.15.2.1
performed in a manner that 164.312(a)(2)(iv),
prevents unauthorized access 164.312(b),
164.312(d),
164.312(e),
164.308(a)(1)(ii)(D)
45 C.F.R. §§
AC-2, 164.308(a)(1)(ii)(D),
DE.CM-1: The network is
AU-12, 164.308(a)(5)(ii)(B),
monitored to detect AUTH, CNFS,
CA-7, CM-3, 164.308(a)(5)(ii)(C), None
potential cybersecurity EMRG, MLDP
SC-5, SC-7, 164.308(a)(8),
events
SI-4 164.312(b),
DETECT (DE) 164.312(e)(2)(i)
Security 45 C.F.R. §§
Continuous AC-2, 164.308(a)(1)(ii)(D),
Monitoring DE.CM-3: Personnel activity AU-12, 164.308(a)(3)(ii)(A),
(DE.CM) is monitored to detect AU-13, AUTH, CNFS, 164.308(a)(5)(ii)(C),
A.12.4.1
potential cybersecurity CA-7, EMRG, MLDP 164.312(a)(2)(i),
events CM-10, 164.312(b),
CM-11 164.312(d),
164.312(e)
45 C.F.R. §§
DE.CM-4: Malicious code is
SI-3, SI-8 IGAU, MLDP, TXIG 164.308(a)(1)(ii)(D), A.12.2.1
detected
164.308(a)(5)(ii)(B)
CA-2, CA-7,
Detection
DE.DP-3: Detection processes PE-3, 45 C.F.R. §§
Processes IGAU A.14.2.8
are tested PM-14, SI- 164.306(e)
(DE.DP)
3, SI-4
4.4 Technologies
Table 4-2 lists all of the technologies used in this project, and maps the generic application term to the specific product that we used and the
security control(s) that we deployed. Refer to Table 4-1 for an explanation of the NIST Cybersecurity Framework Subcategory codes [10].
The reference architecture design in Section 5 is vendor-agnostic, such that any wireless infusion pump system can be integrated safely and
securely into a hospital’s IT infrastructure. Therefore, for the infusion pump device, infusion pump server, and wireless infusion pump
ecosystem, we captured the most-common security features among all the products that we tested in this use case. A normalized view of the list
of Functions and NIST Cybersecurity Framework Subcategories are presented in Table 4-2.
NIST Cybersecurity
Component Specific Product Function Framework
Subcategory
Infusion Pump Baxter: Sigma • requires a passcode to access the biomedical engineering mode PR.AC-1, PR.AC-2,
Device Spectrum™ LVP (on device or connect to device) for configuring and setting up PR.DS-2, PR.DS-6,
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Smiths Medical:
Medfusion 4000
Wireless Syringe
Infusion Pump
Smiths Medical:
CADD®-Solis
Ambulatory Infusion
Pump
Infusion Pump Baxter: Care • with appropriate configuration, discovers and identifies devices ID.AM-1, PR.AC-1,
Server Everywhere Gateway connected to the pump server via wired networks, wireless PR.AC-3, PR.AC-4,
Server Version 14 networks, and virtual private networks (VPNs), to aid in building PR.DS-1, PR.DS-2,
B. Braun: Space and maintaining accurate physical device inventories PR.MA-2
OnlineSuite Software • supports role-based authentication and password rules and
Version Application policies
Package 2.0.1 • supports the use of an HDO’s Active Directory / Lightweight
BD: Alaris Systems Directory Access Protocol (LDAP) solution
Manager Version 4.2
• is used as internal firewall for all other network zones with rules
and policies
As infusion pumps have evolved, one safety mechanism development was the invention of the “drug
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
library.” The drug library is a mechanism that is applied to an infusion pump and that catalogs
medications, fluids, dosage, and flow rates. While hospital pharmacists may be involved in the
maintenance of the drug library, continuous application of the drug library to the infusion pump
environment tends to be managed through a team of biomedical engineers. Initially, the drug library file
may be loaded onto the pump through a communication port. When the drug library file is updated, all
infusion pumps need to be updated to ensure that they adhere to the current rendition of that drug
library. Drug library distribution, which may require that staff manually adjust individual pumps, may
become onerous for the biomedical staff in HDOs that use thousands of pumps [1], [40].
Manufacturers provide wireless communications on some pumps, and use a pump server to manage the
drug library file, capture usage information on the pumps, and provide pump updates.
Medical device manufacturers are subject to regulatory practices by the FDA, and may tend to focus on
the primary function of the pump (i.e., assurance that the pump delivers fluids of a certain volume and
defined flow rates, consistent with needs that providers may have to ensure safe and appropriate
patient care). Technology considerations, such as cybersecurity controls, may not be primarily addressed
in the device design and approval process. As such, infusion pumps may include technology that does
not lend itself to the same controls that an HDO may implement on standard desktops, laptops, or
workstations used for productivity [9], [18].
As technology has evolved, cybersecurity risk has expanded, both in visibility and in the number of
threats and vulnerabilities. This expansion has led to a heightened concern, from manufacturers and the
FDA, and work has been established to identify measures to better respond to cybersecurity risk [7], [9],
[25]. In Section 5.1, we describe the wireless infusion pump ecosystem by defining the components.
Section 5.2 discusses the data flow, and Section 5.3 explains the set of controls that we use in our
example implementation, including those for networks, pumps, pump servers, and enterprise.
Section 5.4 describes the target architecture for our example implementation.
In general, we recommend that a clinically focused network be designed to protect the information used
in HDOs, whether that information is at-rest or in-transit. As described in Cisco Medical-Grade Network
(MGN) 2.0-Security Architectures, no single architecture can be designed to meet the security
requirements of all organizations [41]. However, many cybersecurity best practices can be applied by
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Our reference architecture uses Cisco’s solution architecture as the baseline. This baseline demonstrates
how the network can be used to provide multi-tiered protection for medical devices when exchanging
information via a network connection. The goal of our reference architecture is to provide
countermeasures to deal with challenges identified in the assessment process. For our use-case
solution, we use segmentation and defense-in-depth as security models to build and maintain a secure
device infrastructure. This section provides additional details on how to employ security strategies to
achieve specific targeted protections when securing wireless infusion pumps.
▪ network controls
▪ pump controls
▪ pump server controls
▪ enterprise-level controls
5.3.1.1 Segmentation/Zoning
Our network architecture uses a zone-based security approach. By using different local networks for
designated purposes, networked equipment identified for a specific purpose can be put together on the
same network segment and protected with an internal firewall. The implication is that there is no
inherent trust between network zones and that trust limitations are enforced by properly configuring
firewalls to protect equipment in one zone from other, less-trusted zones. By limiting access from other,
less-trusted areas, firewalls can more effectively protect the enterprise network.
For discussion purposes, we include some generic components of a typical HDO in our network
architecture examples. A given healthcare facility may be simpler or more complex and may contain
different subcomponents. The generic architecture contains several functional segments, including the
following elements:
▪ core network
▪ guest network
▪ business office
▪ database server
▪ enterprise services
▪ clinical services
▪ biomedical engineering
▪ medical devices with wireless LAN
▪ remote access for external vendor support
At a high level, each zone is implemented as a VLAN with a combination firewall/router Cisco ASA device
connecting it to the rest of the enterprise through a backbone network, referred to as the core network
[43], [44], [45]. Segments may consist of physical or virtual networks. For simplicity and convenience, we
implemented subnets that correspond exactly to VLANs. The routing configuration is the same for each
subnet, but the firewall configuration may vary depending on each zone’s specific purpose. An external
router/firewall device is used to connect the enterprise and guest network to the internet.
Open Shortest Path First (OSPF) to mitigate configuration errors as zones are added or removed.
devices. In the case of wireless infusion pumps, this is where the pump management servers are hosted
on the network.
Two SSIDs were defined: IP_Dev and IP_Dev Cert. IP_Dev uses WPA2-PSK, and IP_Dev Cert uses WPA2-
Enterprise protocols. In an actual HDO, two WLCs should be configured for redundancy. Initially, the
wireless APs configure themselves for network connectivity, like any other device using Dynamic Host
Configuration Protocol (DHCP) from the switch DHCP server (see the green line in Figure 5-3). The switch
also sends DHCP Option 43, which provides the Internet Protocol (IP) address of the WLC. The AP then
connects to the WLC to automatically download firmware updates and wireless configuration
information. Finally, the CAPWAP tunnel is formed to encrypt wireless traffic (see the black line in Figure
5-3). The traffic is then routed to the enterprise network via the WLC [27], [36], [44], [49].
When a device first connects to the Wi-Fi network, it needs to authenticate with either the agreed-upon
PSK or certificate. The authentication process is tunneled from the AP back to the WLC, as shown in
Figure 5-4. In the case of a PSK, the WLC verifies that the client key matches (see the green line in
Figure 5-4). In the case of a certificate, the authentication process is passed from the WLC to the Cisco
ISE for validation by using remote authentication dial-in user service (RADIUS) protocol (see the yellow
line in Figure 5-4). Upon successful authentication, the device negotiates an encryption key and is
granted link layer network access.
Once authentication is complete, typical network client activity is allowed. Figure 5-5 shows how DHCP
is used to contact the router to obtain network configuration information for the device (see the red line
in Figure 5-5). Once the network is configured, the infusion pump will attempt to connect to its
provisioned pump server address on the enterprise network in the biomedical engineering zone (see the
green line in Figure 5-5).
Using an enterprise-grade Wi-Fi system can simplify transitions to more secure protocols by decoupling
Wi-Fi SSIDs and security parameters from the Wi-Fi spectrum and physical Ethernet connections. First,
every AP only needs to broadcast on a single Wi-Fi channel (in each band) and can broadcast multiple
SSIDs. This helps avoid interference due to multiple independent wireless systems trying to use the
same frequencies. Second, each SSID can be tied to its own VLAN. This means that logical network
separation can be maintained in Wi-Fi without having to use additional spectrum. Third, multiple SSIDs
can be tied to the same VLAN or standard Ethernet network. Each SSID can have its own security
configuration as well. For example, in our use case, we have two different authentication mechanisms
for granting access to the same network: one configured for WPA2-PSK, and the other for so-called
enterprise certificates. This can be particularly useful for gradual transitions from old security
mechanisms (e.g., Wireless Encryption Protocol [WEP], Wi-Fi Protected Access [WPA]) or old PSKs to
newer ones, instead of needing to transition all devices at one time. In our case, to determine which
devices may need reconfiguration to use certificates, we used the WLC to identify exactly which devices
are using old PSK SSIDs. Once this number is reduced to an acceptable level, the old PSK SSID can be
turned off, and only certificate-based authentication will be allowed.
Before we describe network access controls, it is important to discuss each pump’s wireless protection
protocol. There are three available wireless protection protocols (WEP, WPA, and WPA2). We also
describe in-depth options for WPA2-PSK. Finally, we describe options for WPA2 across the HDO
enterprise. Many of the infusion pumps used in this NCCoE project are newer models, capable of
supporting various wireless protocols. For HDOs, WPA2 is the recommended wireless protocol to use.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
WEP and WPA are considered insufficient for appropriately securing wireless network sessions. Our
architecture is designed to support multiple levels of access control for different groups of users. The
architecture is configured to use WPA2-PSK and WPA2-Enterprise security protocols for secure wireless
connections to accommodate the best available security mechanisms, depending on which vendor
products your organization uses. Please note that a wireless infusion pump manufactured prior to 2004
may not be able to support these newer wireless security protocols [41].
The WPA2-PSK is often referred to as PSK mode. This protocol is designed for small office networks and
does not require an external authentication server. Each wireless network device encrypts the network
traffic by using a 256-bit key. All pumps used in our example implementation support this wireless
security mode, and each pump performed properly when using this mode. However, because all devices
share the same key in a PSK mode using WPA2-PSK, if credentials are compromised, then significant
manual reconfiguration and change management will be required.
WPA2 enterprise security uses 802.1x/EAP. By using 802.1x, an HDO can leverage the existing network
infrastructure’s centralized authentication services, such as a RADIUS authentication server, to provide a
strong client authentication. Cisco recommends that WPA2 Enterprise, which uses the Advanced
Encryption Standard (AES) cypher for optimum encryption, be used for wireless medical devices, if
available. We implemented WPA2 Enterprise with EAP-TLS security mode on several of our pumps to
demonstrate that these pumps can leverage the public key infrastructure (PKI) to offer strong endpoint
authentication and the strongest encryption possible for highly secure wireless transmissions. In this
mode, pumps were authenticated to the wireless network with a client certificate issued by DigiCert
Certificate Authority. During the authentication process, the pump’s certificates are validated against a
RADIUS authentication server using Cisco ISE. Automatic logoff features allow the system to terminate
the endpoints from the network after a predetermined time of inactivity. Organizations manage and
control the client certificates via the certificate authority. With this capability, organizations may revoke
and renew certificates as needed.
Once WPA2 is selected as the appropriate wireless protection protocol, certificates may be issued to
authenticate infusion pumps by using 802.1x/EAP-TLS mode, as illustrated in Figure 5-6 [27], [28], [29],
[30], [31], [32], [33], [34], [35], [36], [37], [42], [46], [47], [48], [49].
Certificate issuance involves the following three stages, which are outlined by the green and orange
shaded objects in Figure 5-6:
1. Certificate Registration
Step 1: Request a certificate from the DigiCert Certificate Authority, which is a Certificate
Register Manager. Request pump certificates through a standalone computer connected to the
internet by using DigiCertUtil, a certificate request tool, on behalf of a pump.
Step 2: The approved certificates are exported to the pumps by using the specific tools provided
by pump vendors. Typically, this activity is performed by a biomedical engineer.
3. Certificate Management
Certificate management will provide services to revoke certificates when they are no longer in
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
use, and will also manage the certificate revocation list, along with any related processes for
renewing old certificates.
The detailed process for setting up the 802.1x network authentication for pump and pump server
communication is documented in the How-To portion of the guide (NIST SP 1800-8C).
Communication using TDi ConsoleWorks for vendor access to products does not require the installation
of software agents to establish connections for managing and monitoring targeted components.
Established connections are persistent to facilitate IT operations, enforce security, and maintain
comprehensive audit trails. All information collected by ConsoleWorks is time-stamped and digitally
signed to ensure information accuracy, empower oversight, and meet compliance requirements.
Through a standard web browser, ConsoleWorks can be securely accessed from any geographical
location, eliminating the need for administrators and engineers to be locally present to perform their
work.
Remote access is only allowed through a specific set of security mechanisms. This includes using a VPN
client at the network layer, as shown in Figure 5-7, for vendors to authenticate to the VPN server [43],
[44], [50].
After the VPN connection is established at the application layer, the security proxy will restrict who can
access certain resources within the enterprise network, as depicted in Figure 5-8. Vendors also
authenticate to the Hypertext Transfer Protocol Secure (HTTPS)-based security proxy (see the red line in
Figure 5-7). Based on the vendor’s role, the security proxy will facilitate a Remote Desktop Protocol
(RDP) connection to equipment in the biomedical engineering zone via the vendor support network (see
the green line in Figure 5-7). The credentials that are used to authenticate the RDP connection are
stored by the security proxy and are not disclosed to the vendor.
▪ endpoint protection
▪ hardening
▪ data protection
Traditional security relies on the network border to provide security protection to its internal nodes,
using security technologies, such as application firewalls, proxy gateways, centralized virus scan, and
network IDS and IPS. The challenge faced here, however, is that medical devices, such as wireless
infusion pumps, may not have the capability to have third-party tools installed or deployed to effectively
provide control. As such, endpoint protection is applied to that equipment where possible. This may
limit endpoint protection controls to servers or workstations that may operate in the hospital
infrastructure. Nodes, such as networked medical devices, should participate in their own security.
Otherwise, the device may become the weakest element in the enterprise and present a risk to the
entire HDO network.
To avoid the single point of failure caused by an unsecured node, every system should have an
appropriate combination of local protections applied to it. These protections include code signing, anti-
tampering, encryption, access control, whitelisting, and others. Controls are layered across a technology
stack, with the intent to improve the overall cybersecurity posture, recognizing that there may be
limitations to applying a full set of controls for each node.
5.3.2.2 Hardening
Wireless infusion pumps and their servers are considered computing endpoints, when it comes to
hardening the software contained within these devices. Medical devices may contain third-party
products, including proprietary or commercial embedded operating systems, network communication
modules, runtime environments, web services, or databases. Because these products can contain
vulnerabilities, medical devices may also inherit these vulnerabilities just by using the products [2], [3],
[7], [9], [25]. Therefore, it is important to identify all software applications used on medical devices,
implement securing and hardening procedures recommended by the manufacturers, and apply timely
patches and updates to guard against any newly discovered threats.
Identified vulnerabilities should be disclosed to the manufacturer, who may advise on appropriate
mitigation approaches and provide patches, fixes, and updates where appropriate.
Infusion pumps may also contain configuration data, such as drug libraries specifying dosage and
threshold limits. This data must be protected against compromises as well. Our defense-in-depth
approach for data integrity involves sandboxing the critical system files stored in pump servers by using
DCS:SA and by encrypting messages when communicating between a medical infusion pump and the
backend infusion management system, via Internet Protocol Security or secure-sockets-layer encryption
(e.g., HTTPS, TLS).
Because pump servers connect to infusion pumps to deliver and receive infusion-related information, it
is also important to secure the infusion pump server and its associated applications, databases, and
communication channels.
There may be a default setting for the communication interval, in number of seconds, for
communication attempts between the server and the pump. Be sure to properly set this idle timeout
setting.
▪ trusted applications
▪ stronger access control mechanisms for pumps and pump servers
▪ better key management
▪ application whitelisting
▪ sandboxing applications
▪ performing code-signing verification for newly installed software
▪ DCS:SA
▪ SEP
▪ APT:N
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Each of these Symantec products provides protections for components in the enterprise systems in
different levels. With pre-built policies, the DCS:SA server that is installed can provide out-of-the-box
HIDS and HIPS by monitoring and preventing suspicious server activities on pump servers. The use of
DCS:SA also provides the host firewall service for controlling inbound and outbound network traffic to
and from a protected server. Using DCS:SA, the configuration settings, files, and file systems in the pump
server can be locked down using policy-based least-privilege access controls to restrict application and
operating-system behavior and to prevent file and system tampering.
Like DCS:SA, SEP provides similar protection for endpoint devices and servers. SEP features in-memory
exploit mitigation and antivirus file protection to block malware from infecting protected endpoint
servers. This will reduce the possibility of zero-day exploits on popular software that may not have been
properly patched or updated. To protect endpoint servers, an SEP agent must be installed on servers.
ATP:N can provide network-based protection of medical device subnets by monitoring internal inbound
and outbound internet traffic. It can also be used as a dashboard to gain visibility to all devices and all
network protocols. In addition, if ATP:N is integrated with the SEP, ATP:N can then monitor and manage
all network traffic from the endpoints and provide threat assessments for dangerous activity to secure
medical devices on an enterprise network. The use of these Symantec security products is depicted in
Figure 5-10. As depicted, the ATP:N will inspect all traffic going through the core network switch via port
mirroring between the enterprise services, biomedical engineering, and medical device zones. Wired
traffic within each zone is also inspected via port mirroring on the switches used in those zones.
Inventory management is also important throughout a medical device’s life cycle. Inventory tracking
should not be limited to hardware inventory management. It should also be expanded to include
software, software versions, and data stored and accessed in the devices, for security purposes. HDOs
▪ monitoring - overseeing the events for abnormal activities, such as scanning, compromises,
malicious code, and DoSs in real time
▪ auditing - reviewing and checking these recorded events to find abnormal situations or to
evaluate if the applied security measures are effective.
By combining the logging, monitoring, and auditing features, an organization will be able to track,
record, review, and respond to abnormal activities, and provide historical records when needed.
Many malware and virus infections can be almost completely avoided by using properly configured
firewalls or proxies with regularly updated knowledge databases and filters to prevent connections to
known malicious domains. It is also important to review your firewall logs for blocked connection
attempts so that you can identify the attached source and remedy infected devices if needed.
In our example implementation, user audit controls—simple audits—are in place. Although additional
SIEM tools and centralized log aggregation tools are recommended to maximize security event analysis
capabilities, aggregation and analytics tools like these are considered out of scope for this project
iteration.
Each system is monitored for compliance with a secure configuration baseline. Each system is also
monitored for risks to known good, secure configurations by vulnerability scanning tools. In our project,
the Cisco AP, the Cisco ISE as the RADIUS authentication server, the TDi VendorNet, and the pump
servers from each vendor, are all equipped with proper monitoring and logging capabilities. Real-time
monitoring for events happening within these systems can be analyzed and compared to the baseline. If
any abnormal behavior occurs, it can be detected. The auditing of data was considered out of scope for
this reference design because the absence of an actual data center made auditing behavior impractical.
Figure 6-1 illustrates a typical life cycle for an asset, and this model can be applied to medical devices.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
The subsections below discuss the essential cybersecurity activities that should occur during specific
phases of the asset life cycle.
Phases leading into procurement enable the HDO, reseller, or manufacturer to ensure that the
equipment that the HDO will deploy offers the appropriate combination of security and functionality
required to render patient care. These phases also enable the hospital to implement appropriate
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
security controls to safeguard the device and the information that it may store or process.
Purchasers at HDOs may request manifests or architectural guidance on secure deployment of the
equipment, and may perform research on products and the manufacturers that they have selected.
While performing the research, HDOs may begin a risk assessment process to ensure that risks are
mitigated.
Manufacturers maintain a document referred to as the MDS2 (Manufacturer Disclosure Statement for
Medical Devices) that an HDO may review, enabling the HDO to determine possible vulnerabilities and
risks [54]. Hospital purchasers may also determine if vulnerabilities exist in the proposed equipment by
reviewing the FDA-hosted MAUDE (Manufacturer and User Facility Device Experience) database.
Hospitals should also obtain any necessary training, education, and awareness material from the
manufacturer, and should educate staff about the deployment, operation, maintenance, and security
features available on their equipment. HDOs might consider writing user-friendly documentation to
ensure that staff can use the equipment with confidence and competence.
Performing research and risk analysis during the phases leading into procurement will allow HDOs to
make informed decisions. For further reference, we note that the Mayo Clinic has produced a
best-practice document that discusses procurement [55].
6.2 Operation
After hospitals procure their equipment, they onboard it during the Operate and Maintain phases.
Equipment purchasers should apply asset management processes (e.g., asset tagging and entry into a
configuration management database or some other form of inventory tracking), and should have
standard baseline configurations implemented. Wireless infusion pumps may need to be configured to
connect to a hospital’s Wi-Fi network (medical device zone, as depicted in Section 5.3.1.2, Medical
Device Zone’s Wireless LAN) and implement digital certificates to allow for device authentication.
As noted above, hospitals should implement some type of configuration management database or asset
inventory that captures granular information about the device. Implementing an ITAM mechanism
enables the hospital to have visibility into their infusion pump deployment, with captured information
As part of deployment, hospitals should apply practices noted by the manufacturer (e.g., regarding
access control and authentication). As noted above, digital certificates should be installed to allow for
device authentication to Wi-Fi, but engineers should implement access control and auditing mechanisms
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
where applicable.
6.3 Maintenance
Pump manufacturers have two types of systems that require updating: the pumps and the pump
servers. Pumps may implement control systems in firmware (writeable, non-volatile storage that may
include an embedded operating or other control system). Control systems may be maintained through
an update process that involves replacing all or parts of the operating or control system. Server
components may be implemented on more-conventional IT systems, using commercial operating
systems (e.g., Windows or Linux variants).
Another aspect of configuration management that HDOs will want to pursue is patching. Patching,
known colloquially as bug fixing, does not require a full replacement of software and is generally
performed on pump servers. The patch frequency to which manufacturers generally adhere is monthly
for patches and yearly for updates. This observation on timing comes from industry, not NIST—and is
considered standard practice, rather than advice.
In addition to identifying patch frequency, organizations must be aware of likely vulnerabilities and the
risks that they introduce into the enterprise, and then decide whether a patch should be applied. NIST
SP 800-40, Guide to Enterprise Patch Management Technologies [56], discusses the importance of patch
management, as well as the challenges.
6.4 Disposal
The Dispose phase of the ITAM life cycle comes into play when products reach their end of life and are
removed from hospital service. Wireless infusion pumps have increased in sophistication and in the
information that each device may use, process, or store. The information found on pumps and related
equipment may include sensitive information or information that may be regarded as PHI. As such,
hospitals should seek to implement mechanisms to ensure that any sensitive information and PHI are
removed from all storage areas that a pump or its system components may maintain. Practices to
remove that information may be found in NIST SP 800-88, Guidelines for Media Sanitation [26].
should not assume any endorsement or diminution of the value of any vendor products. Although we
have aimed to be thorough, we counsel those who are following this guide to evaluate their own
implementation to adequately gauge risks specific to their organizations.
▪ three Subcategories in the NIST Cybersecurity Framework Identify Function area, under the
Categories of Asset Management, Business Environment, and Risk Assessment
▪ Subcategories from each Category of the NIST Cybersecurity Framework Protect Function area,
except for the Awareness and Training Categories
We discuss these NIST Cybersecurity Framework Subcategories in the following subsections.
7.2.1.1 ID.AM-5: Resources (e.g., Hardware, Devices, Data, Time, and Software) Are
Prioritized Based on Their Classification, Criticality, and Business Value
To address this Subcategory of the Identify Function, we conducted an asset inventory as part of the risk
management process. For this project, we identified assets and entered them into the Clearwater
Compliance IRM|Analysis™ tool. This risk analysis tool categorized project resources into types of assets.
Additionally, it characterized the system, enabling us to address the criticality of our resources. Our
7.2.1.2 ID.BE-1: The Organization’s Role in the Supply Chain Is Identified and
Communicated
Organizations who may be using this guide are the end users of medical devices. NIST SP 800-53, control
SA-12, most directly applies to such end users because it directs users to define which security
safeguards to employ to protect against supply chain threats [14]. Our implementation uses network
segmentation to limit exposure to the wireless infusion pump from other areas within a hospital
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
network. This is done because, if a vulnerability is identified in a device, segmentation and access
control will help safeguard the medical device until the vulnerability can be properly addressed.
7.2.1.4 PR.AC-1: Identities and Credentials Are Issued, Managed, Revoked, and Audited
for Authorized Devices, Users, and Processes
Following the segmentation approach used to separate hospital networks into zones, our
implementation employs role-based security, which limits access based on who actually need to access
the pump. HDO users with no business need are not permitted access to pumps, pump servers, or
related components. Most users, including biomedical staff, are granted access via Active Directory.
Although our NCCoE lab did not use single sign-on (SSO), using SSO can make pump access seamless to
an end user. How to manage credentials of clinicians who directly operate the pump is beyond the scope
of this guide.
Remote access is necessary to maintain proper functionality of infusion pumps, but the mechanism for
gaining and controlling remote access varies depending on the user type. Hospital staff, such as
biomedical engineers, remotely access pumps through a VPN and hardened gateway at the application
layer. Such users are considered trusted HDO staff with access to other network resources throughout
the enterprise.
Pump manufacturers who may need to reach a device for maintenance or troubleshooting can gain
access only into a VendorNet zone, from which they can access pumps and pump servers, but not other
7.2.1.5 PR.AC-4: Access Permissions and Authorizations Are Managed, Incorporating the
Principles of Least Privilege and Separation of Duties
This NIST Cybersecurity Framework Subcategory is supported for the pumps and pump servers with
DCS:SA. The configuration settings, files, and file systems in the pump server are restricted, thereby
implementing policy-based least-privilege access control. DCS:SA restricts application and operating-
system behavior and prevents unauthorized users from tampering with files and systems.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Least privilege is also addressed via the network design itself. By limiting user access to only the zones
where a user has a business need for access, the architecture seeks to enforce the concepts of least
privilege and separation of duties.
7.2.1.8 PR.DS-6: Integrity Checking Mechanisms Are Used to Verify Software, Firmware,
and Information Integrity
This NIST Cybersecurity Framework Subcategory is supported with server and agent products to monitor
and lock-down configuration settings, files, and file systems in the pump server by using the policy-
based least-privilege access control. This limits the applications and operating system to the expected
behavior, and reduces the likelihood of digital tampering with the system.
biomedical and IT professionals, it is essential to develop and implement a baseline configuration for
vulnerability management.
7.2.1.12 DE.AE-1: A Baseline of Network Operations and Expected Data Flows for Users
and Systems Is Established and Managed
As we did with systems and medical devices, we took a least-functionality approach when configuring
the network. We followed best practices for configuring firewalls based on a default deny, restricted
SSID broadcast, and for limiting the power of wireless signals.
This NIST Cybersecurity Framework Subcategory is supported by the Symantec IDS component of the
reference design. This tool identifies, monitors, and reports anomalous network traffic that may indicate
a potential intrusion. Endpoint protection implements policies for the expected behavior, and alerts
when activities occur outside the usual patterns.
8 Functional Evaluation
We conducted a functional evaluation of our example implementation to verify that several common
provisioning functions used in our laboratory test worked as expected. We also needed to ensure that
the example solution would not alter normal pump and pump-server functions. The functional test plan
provided in Section 8.1 outlines our test cases, the purposes, and the desired outcomes.
The subsequent subsections explain the functional tests in more detail, and list the procedures for each
of the functional tests.
WIP-7: Pump and Pump Server Test a set of operational events Pumps are connected to the
Basic Functions between pumps and pump corresponding pump server,
servers able to perform a set of
operational events.
9 Future Considerations
During our development of this project and practice guide, we did not implement several components;
however, these omitted components should be considered. We did not implement a commercially
available EHR system. EHRs are often regarded as central within a hospital. Additionally, we did not
implement a central asset inventory management tool, or mechanisms to perform malware detection or
network monitoring in the medical device zone.
Limitations on control implementation exist based on endpoint capabilities. As infusion pumps continue
to evolve as part of an IoMT ecosystem, capabilities, including endpoint encryption and identity and
access management may become available, thus further enhancing automated management of the
medical device zone. Over the course of time, manufacturers may consider the application of future
technologies, or may need to address unanticipated threats in a novel fashion. An update to this
practice guide could evaluate these components and other control mechanisms that may become
available in the future.
▪ Targeted attacks: Targeted attacks are threats involving actors that attempt to compromise the
pump and system components directly affecting pump operations, including the pump, pump
server, drug library, or drug library management systems. Actors who perform such targeted
attacks may be external; in other words, those who attempt to access the pump system through
the public internet, or via vendor support networks or virtual private networks (VPNs). There
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
may also be internal actors, such as those on staff, who may be involved in accidental
misconfiguration or who possess provisioned access and abuse their granted privileges, or
patients or other visitors who attempt to modify the behavior of a pump.
▪ Advanced persistent threats (APTs): APTs occur when the sophisticated threat actor attempts
to place malicious software on the pump or pump system components, which may enable that
threat actor to perform unauthorized actions, either on the pump system itself, or as a pivot
point to cause adverse conditions for hospital internal systems that may have reachability from
the pump network environment. Placement of malicious software may or may not cause
adverse scenarios on the pump or its system components.
▪ Disruption of service – denial-of-service (DoS) and distributed-denial-of-service (DDoS)
attacks: DoS or DDoS attacks may be components found in a broader APT scenario. Such attacks
are intended to cause the unavailability of the pump or pump system components, thus
rendering providers with a degraded capability to fulfill patient care.
▪ Malware infections: In this type of attack, a threat actor places malicious software on the pump,
likely as part of an APT campaign, or to cause an adverse situation on the pump or pump
systems. One example of a malware infection is that of ransomware, in which malicious
software would cause a disruption of the availability of the pump for standard operations, and
may affect patient safety by preventing providers from leveraging system functionality (e.g., the
ability to associate the pump with a patient and deliver medications), or by preventing the pump
from effectively using safety measures, such as the drug library.
▪ Theft or loss of assets: This threat type applies when the pump or pump system components
are not accounted for in an inventory, thereby leading to a degraded availability of equipment,
and a possible breach of protected health information (PHI).
▪ Unintentional misuse: This threat considers the possibility that the pump or its components
may be unintentionally misconfigured or used for unintended purposes, including errors
introduced through the misapplication of updates to operating systems or firmware,
misconfiguration of settings that allow the pump to achieve network connectivity or
communication to the pump server, misapplication or errors found in the drug library, or errors
associated with fluids applied to pumps.
▪ Long useful life: Infusion pumps are designed to perform clinical functions for several years, and
they tend to have long-term refresh rates. One vulnerability associated with infrequent refresh
is that each device’s technological attributes may become obsolete or insufficient to support
patching or updating, or cybersecurity controls that may become available in the future.
▪ Information/data vulnerabilities:
• Lack of encryption on private/sensitive data at rest: Pump devices may have local
persistent storage, but they may not have a means to encrypt data stored on the device.
Locally stored data may include sensitive configuration information, or patient information,
including possible PHI.
• Lack of encryption on transmitted data: Sensitive data should be safeguarded in transit as
well as at rest. Where capabilities exist, pumps and server components should employ
encryption on the network or when transmitting sensitive information. An inability to
safeguard data in transit, by using appropriate encryption capabilities, may expose
sensitive information or allow malicious actors to determine how to connect to a pump or
server to perform unauthorized activities.
• Unauthorized changes to device calibration or configuration data: Modifications made to
pump or server components that are not accurately approved, deployed, or tracked may
lead to adverse operation of the equipment. Hospitals should ensure that changes to the
device calibration or configuration, or the modification of safeguard measures, such as the
drug library, are performed and managed using appropriate measures.
• Insufficient data backup: Providing backup and recovery capability is a common
cybersecurity control to ensure that healthcare delivery organizations (HDOs) can restore
services in a timely fashion after an adverse event. Hospitals should perform appropriate
pump system backup and restore functions.
• Lack of capability to de-identify private/sensitive data: As a secondary cybersecurity
control to data encryption, hospitals may wish to consider the ability to de-identify or
obfuscate sensitive information or PHI.
• Lack of data validation: Data used and captured by infusion pumps and associated server
components may require data integrity assurance to support proper functioning and
▪ Consider forming a Medical Device Security Committee composed of staff members from
biomedical services, information technology (IT), and InfoSec that would report to C-suite
governance.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
• Enable this committee to manage the security of all network-connected medical devices.
Too often, for example, the biomedical services team is solely responsible for cradle-to-
grave maintenance of all aspects of medical devices, including cybersecurity, leaving IT and
InfoSec staff out of the loop.
• Develop a committee charter with roles and responsibilities and reporting requirements to
the C-suite and Board of Directors.
▪ Consider the physical security of mobile medical devices, including wireless infusion pumps.
• Designate a secure and lockable space for storing these devices when they are not in use.
• Ensure that only personnel with a valid need have access to these spaces. Ideally, a
proximity system with logging should be used and frequently audited.
▪ Create a comprehensive inventory of medical devices, and actively manage it.
• Consider the use of radio-frequency identification (RFID) or real-time locating systems
(RTLS) technologies to assist with inventory processes and to help staff locate devices that
have been moved without documentation.
▪ Ensure that any Cybersecurity Incident Response Plan includes medical devices.
• Recently, the Food and Drug Administration (FDA) and the Industrial Control Systems Cyber
Emergency Response Team (ICS-CERT) have both issued cybersecurity vulnerability
advisories for medical devices. This was the first major warning to covered entities
regarding medical device vulnerabilities. Most covered entities have not incorporated
medical device response into their planning.
▪ Ensure that pumps cannot step down to a Wireless Encryption Protocol (WEP) encrypted
network.
• WEP is a compromised encryption protocol that should NEVER be used in operational
wireless networks.
• Operating any form of IT equipment, including medical devices, over a WEP network will
result in the potential for data compromise and a regulatory breach.
http://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocum
ents/ucm356190.pdf [accessed 2/7/18].
FDA, Postmarket Management of Cybersecurity in Medical Devices: Guidance for Industry and
[3]
Food and Drug Administration Staff, December 28, 2016.
https://www.fda.gov/ucm/groups/fdagov-public/@fdagov-meddev-
gen/documents/document/ucm482022.pdf [accessed 2/7/18].
Department of Homeland Security (DHS), Attack Surface: Healthcare and Public Health Sector,
[4]
Bulletin 201205040900. https://info.publicintelligence.net/NCCIC-MedicalDevices.pdf
[accessed 2/8/18].
IHE PCD Technical Committee, Medical Equipment Management (MEM): Overview and Profile
[5]
Roadmap, Version 1, IHE Patient Care Device (PCD) Technical Framework White Paper,
Integrating the Healthcare Enterprise (IHE), Oak Brook, IL, 2009.
http://www.ihe.net/Technical_Framework/upload/IHE_PCD_Medical-Equipment-
Management_MEM_White-Paper_V1-0_2009-09-01.pdf [accessed 2/7/18].
IHE PCD Technical Committee, Medical Equipment Management (MEM): Cybersecurity, IHE
[6]
Patient Care Device (PCD) White Paper, Integrating the Healthcare Enterprise (IHE), Oak Brook,
IL, 2011. http://www.ihe.net/Technical_Framework/upload/IHE_PCD_White-
Paper_MEM_Cyber_Security_Rev2-0_2011-05-27.pdf [accessed 2/7/18].
FDA, Guidance for Industry: Cybersecurity for Networked Medical Devices Containing Off-the-
[7]
Shelf (OTS) Software, January 14, 2005.
http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDoc
uments/ucm077823.pdf [accessed 2/7/18].
IHE PCD Technical Committee, Medical Equipment Management (MEM): Medical Device Cyber
[8]
Security – Best Practice Guide, Revision 1.1, IHE Patient Care Device (PCD) White Paper,
Integrating the Healthcare Enterprise (IHE), Oak Brook, IL, 2015.
http://www.ihe.net/uploadedFiles/Documents/PCD/IHE_PCD_WP_Cyber-
Security_Rev1.1_2015-10-14.pdf [accessed 2/7/18].
Joint Task Force Transformation Initiative, Guide for Conducting Risk Assessments, NIST Special
[11]
Publication (SP) 800-30 Revision 1, National Institute of Standards and Technology,
Gaithersburg, Maryland, September 2012.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf [accessed
2/7/18].
Joint Task Force Transformation Initiative, Guide for Applying the Risk Management Framework
[12]
to Federal Information Systems: A Security Life Cycle Approach, NIST Special Publication (SP)
800-37 Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland,
February 2010. http://csrc.nist.gov/publications/nistpubs/800-37-rev1/sp800-37-rev1-final.pdf
[accessed 2/7/18].
Joint Task Force Transformation Initiative, Managing Information Security Risk: Organization,
[13]
Mission, and Information System View, NIST Special Publication (SP) 800-39, National Institute
of Standards and Technology, Gaithersburg, Maryland, March 2011.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf [accessed
2/7/18].
Joint Task Force Transformation Initiative, Security and Privacy Controls for Federal Information
[14]
Systems and Organizations, NIST Special Publication (SP) 800-53 Revision 4, National Institute
of Standards and Technology, Gaithersburg, Maryland, April 2013.
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf [accessed 2/7/18].
2/7/18].
HIPAA for Professionals, U.S. Department of Health & Human Services (HHS) [Web site],
[22]
http://www.hhs.gov/ocr/privacy/hipaa/administrative/index.html [accessed 2/7/18].
American National Standards Institute / Association for the Advancement of Medical Instru-
[24]
mentation / International Organization for Standardization, Medical devices – Application of
risk management to medical devices, ANSI/AAMI/ISO 14971:2007, 2007
http://www.vcg1.com/files/ANSI_AAMI_ISO_149712007.pdf [accessed 2/7/18].
A. R. Regenscheid, L. Feldman, and G. A. Witte, Guidelines for Media Sanitization, NIST Special
[26]
Publication (SP) 800-88 Revision 1, National Institute of Standards and Technology,
Gaithersburg, Maryland, February 2015. https://www.nist.gov/publications/nist-special-
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
K. Scarfone, M. Souppaya, and M. Sexton, Guide to Storage Encryption Technologies for End
[27]
User Devices, NIST Special Publication (SP) 800-111, National Institute of Standards and
Technology, Gaithersburg, Maryland, November 2007.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf [accessed
2/7/18].
D. R. Kuhn, V. C. Hu, W. T. Polk, and S. J. Chang, Introduction to Public Key Technology and the
[28]
Federal PKI Infrastructure, NIST Special Publication (SP) 800-32, National Institute of Standards
and Technology, Gaithersburg, Maryland, February 2001.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-32.pdf [accessed
2/7/18].
E. Barker, W. Barker, W. Burr, W. T. Polk, and M. Smid, Recommendation for Key Management
[29]
– Part 1: General (Revision 3), NIST Special Publication (SP) 800-57 Part 1 Revision 3, National
Institute of Standards and Technology, Gaithersburg, Maryland, July 2012.
http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57_part1_rev3_general.pdf [accessed
2/7/18].
E. Barker, W. Barker, W. Burr, W. T. Polk, and M. Smid, Recommendation for Key Management
[30]
– Part 2: Best Practices for Key Management Organization. NIST Special Publication (SP) 800-57
Part 2, National Institute of Standards and Technology, Gaithersburg, Maryland, August 2005.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-57p2.pdf [accessed
2/7/18].
E. Barker and Q. Dang, Recommendation for Key Management: Part 3: Application-Specific Key
[31]
Management Guidance, NIST Special Publication (SP) 800-57 Part 3 Revision 1, National
Institute of Standards and Technology, Gaithersburg, Maryland, January 2015.
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf [accessed
2/7/18].
S. Frankel, B. Eydt, L. Owens, and K. Scarfone, Establishing Wireless Robust Security Networks: A
[33]
Guide to IEEE 802.11i, NIST Special Publication (SP) 800-97, National Institute of Standards and
Technology, Gaithersburg, Maryland, February 2007.
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf [accessed
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
2/7/18].
Institute of Electrical and Electronics Engineers, Port Based Network Access Control, IEEE
[34]
802.1X, 2001. http://www.ieee802.org/1/pages/802.1x.html [accessed 2/7/18].
Institute of Electrical and Electronics Engineers, Wireless LAN Medium Access Control (MAC)
[35]
and Physical Layer (PHY) Specifications, IEEE 802.11, 2017. http://www.ieee802.org/11/
[accessed 2/7/18].
W. T. Polk, K. McKay, and S. Chokhani, Guidelines for the Selection, Configuration, and Use of
[37]
Transport Layer Security (TLS) Implementations, NIST Special Publication (SP) 800-52 Revision 1,
National Institute of Standards and Technology, Gaithersburg, Maryland, April 2014.
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r1.pdf [accessed 2/7/18].
HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework, DHHS Office for Civil Rights,
[38]
Washington, DC, 2016. https://www.hhs.gov/sites/default/files/nist-csf-to-hipaa-security-rule-
crosswalk-02-22-2016-final.pdf [accessed 2/7/18].
S. Iddir, P. Thongpradit, E. Sparnon, and I. Singureanu, IHE Patient Care Device User Handbook,
[40]
2011 Edition, Integrating the Healthcare Enterprise (IHE), Oak Brook, IL, August 2011.
http://www.ihe.net/Technical_Framework/upload/IHE_PCD_User_Handbook_2011_Edition.pd
f [accessed 2/7/18].
FDA, Radio Frequency Wireless Technology in Medical Devices: Guidance for Industry and Food
[42]
and Drug Administration Staff, August 12, 2013.
http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDoc
uments/ucm077272.pdf [accessed 2/7/18].
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
M. Souppaya and K. Scarfone, Guidelines for Managing the Security of Mobile Devices in the
[43]
Enterprise, NIST Special Publication (SP) 800-124 Revision 1, National Institute of Standards and
Technology, Gaithersburg, Maryland, June 2013.
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf [accessed 2/8/18].
K. Scarfone and P. Hoffman, Guidelines on Firewalls and Firewall Policy, NIST Special Publication
[45]
(SP) 800-41 Revision 1, National Institute of Standards and Technology, Gaithersburg,
Maryland, September 2009. http://csrc.nist.gov/publications/nistpubs/800-41-Rev1/sp800-41-
rev1.pdf [accessed 2/7/18].
Institute of Electrical and Electronics Engineers, IEEE Standard for Ethernet, IEEE 802.3, 2016.
[46]
http://www.ieee802.org/3/ [accessed 2/7/18].
Institute of Electrical and Electronics Engineers, Bridges and Bridged Networks, IEEE 802.1Q,
[47]
2014. http://www.ieee802.org/1/pages/802.1Q.html [accessed 2/7/18].
S. Kent and K. Seo, Security Architecture for the Internet Protocol, Internet Engineering Task
[48]
Force (IETF) Network Working Group Request for Comments (RFC) 4301, December 2005.
https://tools.ietf.org/html/rfc4301 [accessed 2/7/18].
K. Scarfone, P. Hoffman, and M. Souppaya, Guide to Enterprise Telework and Remote Access
[50]
Security, NIST Special Publication (SP) 800-46 Revision 1, National Institute of Standards and
Technology, Gaithersburg, Maryland, June 2009.
http://csrc.nist.gov/publications/nistpubs/800-46-rev1/sp800-46r1.pdf [accessed 2/7/18].
[53]
854a-4e68b8e4bf75.png.
Securing Wireless
Infusion Pumps
in Healthcare Delivery Organizations
Volume C:
How-to Guides
Gavin O’Brien
National Cybersecurity Center of Excellence
Information Technology Laboratory
Sallie Edwards
Kevin Littlefield
Neil McNab
Sue Wang
Kangmin Zheng
The MITRE Corporation
McLean, VA
August 2018
National Institute of Standards and Technology Special Publication 1800-8C, Natl. Inst. Stand. Technol.
Spec. Publ. 1800-8C, 257 pages, (July 2018), CODEN: NSPUE2
FEEDBACK
As a private-public partnership, we are always seeking feedback on our Practice Guides. We are
particularly interested in seeing how businesses apply NCCoE reference designs in the real world. If you
have implemented the reference design, or have questions about applying it in your environment,
please email us at hit_nccoe@nist.gov.
commercially available technology. The NCCoE documents these example solutions in the NIST Special
Publication 1800 series, which maps capabilities to the NIST Cyber Security Framework and details the
steps needed for another entity to recreate the example solution. The NCCoE was established in 2012 by
NIST in partnership with the State of Maryland and Montgomery County, Md.
To learn more about the NCCoE, visit https://nccoe.nist.gov. To learn more about NIST, visit
https://nist.gov.
ABSTRACT
Medical devices, such as infusion pumps, were once standalone instruments that interacted only with
the patient or medical provider. However, today’s medical devices connect to a variety of health care
systems, networks, and other tools within a healthcare delivery organization (HDO). Connecting devices
to point-of-care medication systems and electronic health records can improve healthcare delivery
processes; however, increasing connectivity capabilities also creates cybersecurity risks. Potential
threats include unauthorized access to patient health information, changes to prescribed drug doses,
and interference with a pump’s function.
The NCCoE at NIST analyzed risk factors in and around the infusion pump ecosystem by using a
questionnaire-based risk assessment to develop an example implementation that demonstrates how
HDOs can use standards-based, commercially available cybersecurity technologies to better protect the
infusion pump ecosystem, including patient information and drug library dosing limits.
This practice guide will help HDOs implement current cybersecurity standards and best practices to
reduce their cybersecurity risk, while maintaining the performance and usability of wireless infusion
pumps.
ACKNOWLEDGMENTS
We are grateful to the following individuals for their generous contributions of expertise and time.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Name Organization
The Technology Partners/Collaborators who participated in this build submitted their capabilities in
response to a notice in the Federal Register. Respondents with relevant capabilities or product
components were invited to sign a Cooperative Research and Development Agreement (CRADA) with
NIST, allowing them to participate in a consortium to build this example solution. We worked with:
Baxter Healthcare Corporation • Sigma Spectrum™ Large Volume Pump (LVP) Version 8
• Sigma Spectrum Wireless Battery Module Version 8
• Sigma Spectrum Master Drug Library Version 8
• Care Everywhere Gateway Server Version 14
Becton, Dickinson and Company (BD) • Alaris® 8015 Patient Care Unit (PCU) Version 9.19.2
• Alaris Syringe Module 8110
• Alaris LVP Module 8100
• Alaris Systems Manager Version 4.2
• Alaris System Maintenance (ASM) Version 10.19
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Hospira Inc., a Pfizer Company (ICU • Plum 360™ Infusion System Version 15.10
Medical)
• LifeCare PCA™ Infusion System Version 7.02
• MedNet™ Version 6.2
Intercede MyID®
Medical Device Innovation, Safety & Medical Device Risk Assessment Platform (MDRAP™)
Security Consortium (MDISS)
List of Tables
Table 2-1 Infusion Pump List............................................................................................................ 25
Table 2-2 Summary of Infusion Pump Configuration Methods .......................................................... 27
Table 2-3 Pump Servers Used in this Example Implementation ......................................................... 31
these guidelines in whole, or you can use this guide as a starting point for tailoring and implementing
parts of commercially available technologies that can help secure the wireless infusion pump ecosystem.
Your organization’s security experts should identify the products that will best integrate with your
existing tools and IT system infrastructure. We hope you will seek products that are congruent with
applicable standards and best practices. In NIST SP 1800-8b, Section 4.4, Technologies, lists the products
we used and maps them to the cybersecurity controls provided by this reference solution.
blue text link to other parts of the All publications from NIST’s National
document, a web URL, or an Cybersecurity Center of Excellence are
email address available at https://nccoe.nist.gov.
grouped them by usage. The grouping facilitated the identification of network zones. Once zones are
defined, infrastructure components may be configured such that those zones do not inherently have
network access to other zones within the hospital network infrastructure. Segmenting the network in
this fashion limits the overall attack surface posed to the infusion pump environment, and considers the
network infrastructure configuration as part of an overall defense in depth strategy.
Figure 1-1 Logical Architecture Summary
zone serves as the backbone of the enterprise network and consists only of routers connected by
switches. The routers automatically share internal route information with each other via authenticated
Open Shortest Path First (OSPF) [1] to mitigate configuration errors as zones are added or removed.
Several functional segments may be part of this core network:
▪ guest network
▪ business office (example only)
▪ database server (example only)
▪ enterprise services
▪ clinical services (example only)
▪ biomedical engineering
▪ medical devices with wireless LAN
▪ remote access for external vendor support
The NCCoE build uses Cisco Adaptive Security Appliances (ASA) as virtual router and firewall devices
within the network. Each defined zone in the hospital network that we built has its own ASA, with two
interfaces to protect each zone. As we considered how many ASAs to use, we opted for a tradeoff
between the complexity of the configuration and the number of interfaces on a single ASA.
We defined a LAN interface on 192.168.150.0/24 as the LAN for all medical devices. The infusion pump
systems are designed such that all external connections to the pumps, such as an electronic health
record (EHR) system or vendor maintenance, are completed with the associated pump server on the
biomedical engineering network. This enables us to deny all outbound traffic not destined for the
biomedical engineering network. In addition, because some pump servers initiate connections to open
ports on the pumps, we added vendor-specific rules to allow this. A DNS server is not useful in this case;
however, if you need one, we recommend that the ASA act as a forwarder. The DHCP server on the ASA
is enabled for LAN addressing. In our lab, we discovered that at least one brand of infusion pump would
not recognize network setup as complete, unless at least one DNS server address was set. In this case,
the DNS server address only needed to be included in the configuration; a DNS server did not actually
need to be present at that address.
Generally, the firewall is configured in this way:
▪ all pumps > all pumps servers
▪ all intranet > all pumps Ping and Traceroute (primarily for debugging)
▪ Hospira Pump Server > all pumps on Ports 8100, 9292, 443, and 8443
▪ Baxter Pump Server > all pumps on Port 51243
▪ B. Braun Pump Server > all pumps on Ports 80, 443, 8080, and 1500
See Section A.5 of Appendix A for the ASA configuration for this zone.
WLC is the central point where wireless service set identifiers (SSIDs), VLANs, and Wi-Fi Protected
Access II (WPA2) [9] security settings are managed for the entire enterprise. We defined two SSIDs:
IP_Dev and IP_Dev_Cert. IP_Dev uses WPA2-PSK (Pre-Shared Key), and IP_Dev_Cert uses
WPA2-Enterprise protocols.
2.1.7.1 Installation
In our environment, the Cisco WLC is virtualized. In your environment, the responsible person would
complete installation by following Cisco’s Virtual Wireless LAN Controller Deployment Guide 8.2 [10].
We imported the virtual appliance called AIR_CTVM_K9_8_2_111_0.ova, assigning the first interface to
the management network, referred to as service-port in the web interface. The second interface is used
as a trunk port, with VLAN tags for all user and Wi-Fi management traffic. In the web interface, the built-
in management interface refers to the wireless system control traffic network to which the APs are
connected.
The primary management mechanism for the WLC is the web interface. To configure an Internet
Protocol (IP) address for the web interface, we first needed to use the console and complete the setup
wizard that sets the service-port address. What follows is our process, which your organization can
adapt to your needs.
2. Configure interfaces for user Wi-Fi traffic by first mapping the interface to an Ethernet port and
setting the VLAN and IP address, and then mapping to wireless SSIDs.
Configure the new interface by using the form shown below. Refer to the completed
interface for the values that we used in the lab.
3. Configure the Network Time Protocol (NTP) server [11] at Controller > NTP > Server > New.
3. In WLANs > WLANs > WLANs, select the WLAN identification (ID) number of the newly created
SSID. For the Status, select the checkbox for Enabled. Set the Interface/Interface Group(G) to
ip_dev.
4. On the Security tab, on the Layer 2 sub-tab, under Authentication Key Management, de-select
the Enable checkbox for 802.1X, select the Enable checkbox for PSK, and set the PSK Format.
5. For the SSID IP_Dev_Cert, repeat Steps 1 through 4 above (replacing IP_Dev with IP_Dev_Cert in
the instructions), but do not change the security settings for Authentication Key Management
(leave 802.1X checked, and leave PSK unchecked).
6. On the Security tab, on the AAA Servers sub-tab, select the RADIUS server to authenticate with
(Server 1).
2.1.7.6 Monitoring
By using Monitor > Clients, you will find the list of currently connected clients, to which SSID they are
connected, and the username used to authenticate (Common Name from Certificate).
cd /tmp/consoleworkskeys/
cp /tmp/consoleworkskeys* /etc/TDI_licenses/
/opt/ConsoleWorks/bin/cw_add_invo
11. Press the Enter key to accept the default port (Port 5176).
NCCoE chose ConsoleWorks to segregate and limit vendor access to our labs. Our data model groups
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
consoles and graphical connections together into a tag. The tag is a collection of equipment to which
you need to connect, although a vendor typically owns the equipment. This tag allows us to operate on
a group of consoles and graphical connections. We group users from the same vendor into a profile that
allows us to operate on the users. An Access Control Rule associates a profile with a tag and defines
permissions for a particular component type (typically consoles or graphical connections).
2. Set the Name as LOCAL, set the Host as localhost, and set the Port as 5172.
3. Click Save.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
3. Click Save.
on the Basic tab, Property Profile Equals [vendor company profile name] <join>
Aware
View
Connect
on the Basic tab, Property Profile Equals [vendor company profile name] <join>
Aware
View
Connect
2.1.8.10 Users
1. Click Users > Add.
4. Set the Password, and then retype the password to confirm (Retype Password).
6. Set the profile to the one defined for this user’s company (under PROFILES).
7. Click Save.
2. Set the Name for the device to which you are connecting.
4. Set the Host for the device to which you are connecting.
Username
Password
Domain (optional)
8. Click Save.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
2. Set the Name for the device to which you are connecting.
4. Set the Host IP for the device to which you are connecting, by doing the following:
5. Add tags for all vendor companies that should have access (under TAGS).
6. Click Save.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
setting
BD Alaris 8015 PC • uses a management • uses a series cable
system to do the to connect the
configuration pump to a local
• is the core of the computer
Alaris system and
provides a
common user
interface for
programming
infusion and
monitoring
modules
Hospira Hospira PCA • accesses Web • uses the pump’s
Configuration Ethernet jack to
Utility on the pump connect to a LAN
through a web or to interface with
browser using the the host computer
local IP address of
the pump
Plum 360 • accesses Web • uses the pump’s
Configuration Ethernet jack to
Utility on the pump connect to a LAN
through a web or to interface with
browser using the the host computer
local IP address of
the pump
manual. Because one or more database is associated with the infusion pump server for storing the data,
the installation and configuration of the database are parts of the pump server installation procedure.
After the installation, we implemented a basic configuration: the user account setup, reporting template
configuration, security hardening, license installation, pump metadata installation.
We have not included the pump server setup because the vendor performs this activity.
!ip domain-name
nccoe.lab
! ipv6
enable
!interface
! interface
!interface
! interface
! ip name-server
8.8.8.8 8.8.4.4
! ip default-gateway
192.168.120.1
! clock timezone
EST
! ntp server
time.nist.gov
! max-ssh-sessions
! service sshd
enable
! password-policy
lower-case-required
digit-required
no-username
no-previous-password
password-expiration-enabled
password-expiration-days 45
password-expiration-warning 30
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
min-password-length 4
password-lock-enabled
password-lock-timeout 15
password-lock-retry-count 3
! logging loglevel
! conn-limit 10
port 9060
! cdp timer
! icmp echo
on
a. From the ISE Administration Portal, navigate to the following path: Administration >
Network Resources > Network Devices. Select Add. Fill out the required parameters as
indicated in the form:
2. Select the RADIUS protocol as the selected protocol, and enter the shared secret that is
configured on the network device.
in Section 2.3.2.
4. Once the CA-signed certificate for the ISE and the Root CA are issued, use the following steps to
install the certificates to the system.
5. From the ISE Administration Portal, use the following navigation path to show the installed
certificates: Administration > System > Certificates > System Certificates. Select Import to open
a screen for importing a server certificate. Fill in the required information as shown in Figure
2-1.
6. Under Usage, select the EAP Authentication checkbox to enable the imported certificate to be
used for EAP authentication. Next, click the Submit button to complete the certificate importing.
7. Import the DigiCert Root CA and signing CA to ISE Trusted Certificates. From the ISE
Administration Portal, use the following navigation path to show the installed certificates:
Administration > System > Certificates > Trusted Certificates. Select Import to open a screen
for importing the DigiCert Root CA and signing the CA individually.
Establish the Online Certificate Status Protocol (OCSP) [16] client profile from the OCSP
Client Profile page (Administration > System > Certificates > OCSP Client Profile).
If OCSP is used for Certificate Status Validation, check Validate against the OCSP
Service, and enter the OCSP service name.
ii. Name the profile as, for example, Cert_Auth_Profile, and then fill out the form
with proper parameters. Be sure to select Subject Name as the Principal
Username X509 attribute because it is the field that will be used to validate the
authenticity of the client.
Select the Identity Resource Sequences tab. In the Certificate Based Authentication,
select the Select Certificate Authentication Profile checkbox, and then choose
Cert_Auth_Profile from the drop-down list.
9. Set Authentication Protocols. The Cisco ISE uses authentication protocols to communicate with
external identity sources. The Cisco ISE supports many authentication protocols, such as the
Password Authentication Protocol (PAP), Protected Extensible Authentication Protocol (PEAP),
and the EAP-TLS. For this build, we used the EAP-TLS protocol for user and machine
authentication. To specify the allowed protocols services in the Cisco ISE, follow these steps:
From the Administration Portal, navigate to the following path: Policy > Policy Elements
> Results > Authentication > Allowed Protocols > Add.
Select the preferred protocol or list of protocols. In this build, the EAP_TLS is selected as
the allowed authentication protocol.
10. Set up Authentication Policy. Define the authentication policy by selecting the protocols that the
ISE should use to communicate with the network devices, and the identity sources that it should
use for authentication. To specify the authentication policy, follow these steps:
From the Administration Portal, navigate to the following path: Policy > Authentication
Policy > Type > Rule Based.
If Protocol is Wireless 802.1x, set the policy to use the Network Device as defined in
Step 1 and the Identity Sequences as defined in Step 8 above.
3. On the Create CSR window, fill in the key information (some of the information is optional).
This will also generate a corresponding private key in the Windows computer from which the
CSR is requested. The Certificate Enrollment Request is stored under Console
Root\Certificates(Local Computer)\Certificate Enrollment Requests\Certificates.
Once in the portal, go to Request a Certificate, and then select Private SSL to open a
certificate request form. Fill in the certificate settings in the fields shown in the form,
which includes pasting the CSR information to the area called Paste your CSR.
2. After filling in all of the required information, scroll down to the bottom of the page, and select
the I agree to the Certificate Services Agreement above checkbox. Next, click the Submit
Certificate Request button at the bottom of the form to submit the certificate for signing
approval. The administrator of the CA authority will use the same portal with different privileges
3. To download the signed certificate, go to CERTIFICATES > Orders to list the ordered signed
certificates.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
4. Click a specific order number to display the certificate details with a list of actions for you to
perform. Click Download Certificate As to download certificates with signed CA and Root CA
certificates. A variety of certificate formats can be downloaded, such as .crt, .p7b, .pem, etc.
5. Save the downloaded certificate in a location where it can be used for further processing if
needed.
3. To export the certificate, select the certificate that you want to export as a combined certificate
file and key file in a .pfx file, or separated as a certificate file and key file, and then click Export
Certificate.
4. Click the Next button, and then follow the wizard instructions to save the certificate file and
private key file to a desired location.
• For a cert file: openssl pkcs12 -in [yourfile.pfx] -clcerts -nokeys -out
[certificate.crt]
2. Set the authentication configuration to Mixed Mode (Windows authentication and SQL Server
authentication).
3. Set the sa with a password when you set Mixed Mode authentication. You will need this
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
4. After installing the instance of SQL Server, select to authenticate by using SQL Server
credentials.
5. Register the instance. Registering the instance also starts the instance.
2. In the Installation Type panel, click Evaluation Installation, click Use an Existing MSSQL
Instance, and then click Next.
3. Follow the instructions, and select the parameters suitable for your organization, to complete
the installation.
See the Symantec™ Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP1
Planning and Deployment Guide [17] for further details.
5. On the Policies page, in the Workspace Folders, select the Workspace folder, and then right-
click Add Folder. Look for a new policy folder with the name New Folder. Rename this folder as
Pump Server.
7. From the default Symantec folder, find a proper policy example, and copy it to the Pump Server
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
folder.
9. To edit a policy, right-click a policy, and then click Edit Policy. Configure the setting based on
your security protection needs.
DCS:SA provides a variety of configurable protection from application data protection, to application
protection, to network protection. For example, the Windows prevention policies have a Protected
Whitelisting strategy that lets you specify an application to which you always want to allow access or
give permission to run. When you whitelist a process or an application, all of the other processes and
applications that are not included in the list are denied access.
To allow a program to run by using the Protected Whitelisting strategy, follow these steps:
1. In the management console, click the Policies tab, and then click Prevention.
3. In the Select a Prevention Policy Builder wizard, in the New Policy Builder section, click Launch.
4. In the Policy Name panel, from the Policy Pack drop-down list, select the policy pack that you
want to use as the baseline for the new custom policy.
5. In the Name textbox, enter a name for the policy that you create. In this build, we use the
following name: Windows Prevention Policy 6.0 Reference 31 Protected Whitelisting strategy.
6. Select the Create a custom prevention policy checkbox, and then click Next.
7. In the Protection Strategy panel, use the slider to select Protected Whitelisting.
8. In the Trusted Updaters panel, click Add. In the Select Type dialog box, select the type of
updater that you want to add. The Trusted Updaters list is populated through the agent data
retriever. You can edit or delete an updater that you have already added to the list.
10. In the Application Rules panel, click Add. In the Select Type dialog box, select the type of rules
that you want to add. You can edit or delete a rule that you have already added to the list.
11. In the Global Policy Options panel, click Configure to configure the global policy settings, and
then click Next.
Use agent.exe to install the agent software on computers that run supported Windows operating
systems. To install the Windows agent software, follow these steps:
1. On the installation package, double-click agent.exe.
3. In the License Agreement panel, select the I accept the terms in the license agreement
checkbox, and then click Next.
4. In the Destination Folder panel, change the folders if necessary, and then click Next.
5. In the Agent Configuration panel, accept or change the default settings, and then click Next.
Ensure that the Enable Intrusion Prevention checkbox is selected.
6. In the Management Server Configuration panel, in the Primary Management Server box, type
the fully qualified host name or IP address of the primary server that is used to manage this
agent. If you changed the Agent Port setting during management server installation, in the
Agent Port box, type a port number that matches.
8. In the Management Server Configuration panel, accept the directory for the SSL certificate
Agent-cert.ssl, or click Browse to browse to and locate Agent-cert.ssl. Access to a copy of the SSL
certificate Agent-cert.ssl is required to connect to the management server. All primary and
alternate management servers must use the same certificate.
10. (Optional) In the Agent Group Configuration panel, in the group boxes, type the group names
that you created with the Java console. You may add multiple detection policy group names
12. In the Service User Configuration panel, accept the default Local System account, and then click
Next.
13. In the Ready to Install the Program panel, confirm the installation parameters, and then click
Install.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Agent installation configures the appropriate networking for the environment. The agent installation
configuration includes which Data Center Security: Server Advanced Management Servers to
communicate with, which ports to use, and how often to poll for changes. The initial Data Center
Security: Server Advanced installation also determines whether key product features are enabled or not.
Particular key agent features can be installed, and each provides different protection:
▪ enabling the intrusion prevention feature
▪ enabling the real-time file integrity monitoring feature in intrusion detection
▪ creating agent registration groups
See the Symantec™ Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP1
Planning and Deployment Guide [17] for details.
3. Continue the installation until it is finished. After the initial installation completes, configure the
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
6. Enter company name, a password for the default administrator admin, and an email address.
7. If you run LiveUpdate as part of a new installation, content is more readily available for the
clients that you deploy.
8. If you want Symantec to receive anonymous data, click Next to begin the database creation.
9. When the database creation completes, click Finish to complete the SEP Manager configuration.
2. Save the installation package to a folder on the computer that runs SEP Manager.
3. Copy this package to a client machine where you have an administrator privilege.
4. The installation package comprises one setup.exe file. Click the executable file to start the
installation. Follow the wizards to complete the installation.
Remote Access Controller (iDRAC). The iDRAC console requires the latest version of the Java Runtime
Environment (JRE) installed on the administrative client.
3. Open a console to the appliance, and log on with the username admin and the proper password
to start the bootstrap.
4. From a computer that is on the same subnet as the appliance management port, use a browser
to connect to the ATP:N Manager using the ATP:N IP address. The username is setup, and the
password is Symantec.
2. Enable the Symantec Endpoint Protection Correlation option by selecting the checkbox the
Settings > Global > Synapse area of ATP:N Manager.
4. In SEP Manager, configure host integrity and quarantine firewall policies, if not already enabled.
5. In SEP Manager, configure endpoints to send information to the ATP:N management node.
More detail about integrating Symantec ATP:N and SEP can be found from the following reference:
http://help.symantec.com/cs/ATP_2.2/ATP/v102658999_v117970559/About-integrating-ATP-with-
Symantec-Endpoint-Protection?locale=EN_US.
The NCCoE lab deployed a PFP Monitoring System consisting of a pMon 751 appliance and the P2Scan
analytics tool. The PFP system provides integrity assessment and intrusion detection by utilizing an
external out-of-band channel (i.e., electromagnetic radiation or instantaneous power consumption),
which are unintended emissions also known as side-channels. PFP takes fine-grained measurements of
the device’s side-channels to identify unique patterns created by the specific logic execution.
The pMon 751 appliance captures the side-channel signals by using a physical sensor, and sends them to
P2Scan to be processed.
The P2Scan analysis tool collects data during controlled execution and uses it to build a baseline of
authorized execution during a tool training phase. Once tool training is completed, P2Scan continuously
monitors the device for deviations from the baseline to determine whether unauthorized execution,
such as a malicious intrusion, has occurred.
Hardware requirements:
▪ pMon 751 data acquisition module
▪ Electromagnetic (EM) probe (Aaronia Magnetic Direction Finder [MDF])
▪ 12 Volts Direct Current (VDC) Power Supply
▪ SMA (SubMiniature version A) cables to connect probe
▪ Secure Digital (SD) card
Host computer requirements:
▪ Operating system: Windows 10 Professional x64
▪ RAM: 16 GB or higher strongly recommended
▪ Hard drive: 1 GB of free space
▪ Ethernet connection
▪ hardware setup
1. Launch P2Scan. This will open the application home page, where it allows you to create a new
monitoring project or to load an existing project (Figure 2-4).
a. To create a new project, click the New Project button on the home page (Figure 2-4).
This will open the Create New Project window (Figure 2-5). You can change the Project
Name (alters .ini name), the Project Template (select an .ini template to use), and the
Project Root (creates a new directory to store the project). Once you have completed
these fields, click Create Project.
2. Once a project (new or existing) has been created, click Load Project on the home page
(Figure 2-4). Navigate to the directory specified in Project Root, and select the .ini file that you
created, which holds default values for guiding P2Scan.
3. Once the configuration file is loaded, P2Scan shows the main screen (Figure 2-6). The user
should see the path of their project file in the Active Project File dialogue box. To select a
different file, click the Change button.
the collection system being used. Once the settings have been entered, click the Acquire Trace button
to collect a sample trace and to view the results. The current data buffer will be displayed as shown in
Figure 2-8, but will not be saved for analysis.
After the capture parameters have been configured, select the Start Capture button to begin the data
capture process. As data collection executes, the raw waveforms will be displayed on the screen, along
with the percentage-complete indicator, as shown in Figure 2-8.
Figure 2-8 Data Collection Screen During Capture
extraction. The user has control over several analysis parameters during the Baseline Extraction phase.
Several operational characteristics of the device being monitored can affect how to adjust the analysis
parameter in order to achieve the desired results. For a detailed description of the different analysis
parameters and their impact on the final system, please refer to the P2Scan User Manual.
The baseline analysis is launched by pressing the Start button. The status window will be updated with
the current status. Depending on the complexity of the DUT, and the processing power of the host
machine, the baseline extraction may take time to run.
After the Baseline Extraction phase has been completed, P2Scan will display the Percentage of correct
Detection (PD) (Figure 2-9), which is calculated by comparing the sets of evaluation data to their
respective baseline. The closer that the value is to 1, the better the ability of the system to discriminate
that set of data. The detection statistics will be shown in the status bar, and, once complete, the user
can click Launch Monitoring to enable runtime monitoring.
Figure 2-9 Completed Baseline Extraction Screen
If the software on the DUT changes to an unrecognized state, P2Scan will not be able to classify the test
trace with the required confidence level, and will determine that an anomaly has occurred. In this case,
P2Scan will show test results above the threshold, in a separate color from the successful states, as
shown in Figure 2-11.
If the Save Data checkbox is selected (under Runtime), then the monitoring outputs shall be saved in a
file in the directory specified by “Monitoring Output.” This file displays the date/time of the monitoring,
and the TestStat, which shows statistical error distances between analyzed data and the DUT. Sample
file output is shown in Figure 2-12. If desired, the monitoring outputs can be sent to a Security
Information and Events Management (a SIEM tool) via syslog.
2. Import Inventory of Information Assets, or enter the data through the Asset Inventory Form.
2. On the login page (Figure 2-13), enter the appropriate Email Address and Password.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
3. On the Asset Inventory List page (Figure 2-14), click the New button.
3. On the Asset Inventory List page (Figure 2-14), select the asset that you want to edit by clicking
the checkbox next to that asset, and then click Edit.
4. On the Edit Media/Asset Groups page (see Figure 2-17 below), enter the necessary information,
and then click Save.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
3. On the Media/Asset Groups page (Figure 2-16), scroll up and down to view the groups, and edit
a group by clicking the Edit button next to that group.
4. On the Edit Media/Asset Groups page (Figure 2-17), enter the necessary information, and then
click Save.
3. On the Controls – Global/Media page (Figure 2-18), scroll up and down to view the controls. For
each control, select one of the responses (i.e., Yes, In Progress, No, or N/A) to indicate the
response status.
Follow these steps to use the Risk Determination at the Media/Asset Group level:
1. On the IRM|Analysis tool, expand Risk Determination on the left menu bar.
3. On the Risk Questionnaire List page (Figure 2-19), scroll up and down to view the media/asset
groups.
4. For each relevant Media/Asset Group, select the Risk Analyst, fill in the Due Date, and then
click the Continue button to access the Risk Questionnaire Form (Part 1: Figure 2-20, and
Part 2: Figure 2-21).
5. For each control, select one of the responses (i.e., Yes, In Progress, No, or N/A) to indicate the
response status (example shown in Part 1: Figure 2-20), if it was already noted on the Controls –
Global/Media page.
6. Controls can be set globally or for individual Media/Asset Groups. The plus sign (+) will expand
the control to reveal the Media/Asset Groups so that the control can be set individually. To
illustrate, a global control can be set for Training for the Security Workforce, but an individual
control would be set for each of the Media/Asset Groups associated with the User Activity
Review, as only a subset of assets may undergo a user activity review.
7. Determine and select the Risk Likelihood and Risk Impact for the selected risk scenario
(example shown in Part 2: Figure 2-21) to populate the Risk Rating.
3. Only the risks that exceed the risk threshold established under Framing/Governance (in the left
menu bar) will move to the Risk Response portion of the software.
4. On the Risk Response List – Risk Registry page (Figure 2-22), scroll up and down to view the
Medial/Asset Groups, along with the associated Threat Source/Event, Vulnerability, and Risk
Rating.
5. For each relevant risk response, click the associated button in the Treatment column to access
the Risk Treat and Evaluate Form page of that risk (Figure 2-23).
6. On the Risk Treat and Evaluate Form page (Figure 2-23), perform the risk response analysis by
selecting the Risk Treatment Type; evaluate the control or recommendation; Select a Risk
Owner; enter Risk Notes; etc.
3. See the example dashboard on the Rating Distribution By Asset page shown in Figure 2-24.
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
You can also view other types of dashboards, such as Risk Rating Trends and Risk Rating Averages.
Figure 2-24 Dashboard Example
3. See the example report on the Risk Rating Report page shown in Figure 2-25.
You can also view other types of dashboards, such as Risk Rating Trends and Risk Rating Averages.
2. On the login page (Figure 2-26), enter the appropriate Email and Password.
3. Click Submit.
2. On the Device Inventory page (Figure 2-28), add an individual device, edit a device, or bulk
import a group of devices.
To add a device:
i. On the Device Inventory page (see Figure 2-28 above), click ADD DEVICE.
To edit a device:
i. On the Device Inventory page (see Figure 2-28 above), locate the device from
the list, and then click the product name link or the edit icon.
ii. On the Edit Inventory page (Figure 2-30), update the data, and then click Save.
i. On the Device Inventory page (Figure 2-28 above), click the BULK IMPORT
button.
ii. On the Inventory Bulk Import page (Figure 2-31), download the template, and
then fill-in the data into the template.
iii. Follow the instruction to upload and import the devices by using the template
(Figure 2-32).
3. On the Create Assessment page (Part 2: Figure 2-34), select the questionnaire type (i.e., MDISS
Questionnaire).
interface Management0/0
! set to network and interface you want to manage from, can be WAN
ssh version 2
hostname internal-kmcfadde
interface GigabitEthernet0/0
nameif WAN
security-level 50
no shutdown
interface GigabitEthernet0/1
nameif LAN
security-level 100
! optional, OSPFv2
router ospf 1
name-server 8.8.8.8
name-server 8.8.4.4
license smart
throughput level 1G
names
policy-map global_policy
inspect icmp
! Show up in traceroute
policy-map global_policy
class class-default
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
icmp-object echo-reply
icmp-object time-exceeded
icmp-object unreachable
group-object PING-REPLIES
icmp-object echo
! SNMP
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
snmp-server enable
hostname border-kmcfadde
throughput level 1G
names
interface GigabitEthernet0/0
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
nameif WAN
security-level 0
interface GigabitEthernet0/1
nameif LAN
security-level 100
interface GigabitEthernet0/2
nameif GUEST
security-level 100
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
no ip address
interface GigabitEthernet0/6
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/7
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/8
shutdown
no nameif
no security-level
no ip address
interface Management0/0
management-only
nameif management
security-level 0
name-server 8.8.8.8
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
name-server 8.8.4.4
icmp-object echo-reply
icmp-object time-exceeded
icmp-object unreachable
group-object PING-REPLIES
icmp-object echo
pager lines 23
no failover
no monitor-interface service-module
no arp permit-nonconnected
!
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
router ospf 1
log-adj-changes
default-information originate
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
no snmp-server location
no snmp-server contact
no validation-usage
crl configure
auto-import
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
quit
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh version 2
console timeout 0
dynamic-access-policy-record DfltAccessPolicy
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
class-map inspection_default
match default-inspection-traffic
parameters
policy-map global_policy
class inspection_default
inspect ftp
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
inspect icmp
class class-default
!
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
call-home
profile CiscoTAC-1
no active
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
profile License
Cryptochecksum:9ffa4947d875e0c501e036c54e80ee93
: end
hostname enterprise-services-kmcfadde
license smart
throughput level 1G
names
interface GigabitEthernet0/0
nameif WAN
security-level 50
nameif LAN
security-level 100
interface GigabitEthernet0/2
shutdown
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
no nameif
no security-level
no ip address
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/6
shutdown
no nameif
no ip address
interface GigabitEthernet0/7
shutdown
no nameif
no security-level
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
no ip address
interface GigabitEthernet0/8
shutdown
no nameif
no security-level
no ip address
interface Management0/0
management-only
nameif management
security-level 0
name-server 8.8.8.8
name-server 8.8.4.4
pager lines 23
no failover
no arp permit-nonconnected
router ospf 1
log-adj-changes
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
no snmp-server location
no snmp-server contact
no validation-usage
crl configure
auto-import
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
quit
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh version 2
console timeout 0
dynamic-access-policy-record DfltAccessPolicy
class-map inspection_default
match default-inspection-traffic
parameters
policy-map global_policy
class inspection_default
inspect ftp
inspect ip-options
inspect netbios
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
inspect sip
inspect xdmcp
inspect icmp
class class-default
call-home
profile License
profile CiscoTAC-1
no active
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
Cryptochecksum:e57e00145eb4fd26d97b4b0109308140
: end
hostname biomedical-kmcfadde
license smart
throughput level 1G
names
interface GigabitEthernet0/0
nameif WAN
security-level 50
interface GigabitEthernet0/1
nameif LAN
security-level 100
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/7
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
shutdown
no nameif
no security-level
no ip address
interface GigabitEthernet0/8
shutdown
no nameif
no security-level
no ip address
interface Management0/0
management-only
nameif management
security-level 0
name-server 8.8.8.8
name-server 8.8.4.4
icmp-object echo-reply
icmp-object time-exceeded
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
icmp-object unreachable
group-object PING-REPLIES
icmp-object echo
pager lines 23
no failover
no monitor-interface service-module
no arp permit-nonconnected
router ospf 1
log-adj-changes
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
no snmp-server location
no snmp-server contact
no validation-usage
crl configure
auto-import
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
quit
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh version 2
console timeout 0
dynamic-access-policy-record DfltAccessPolicy
class-map inspection_default
match default-inspection-traffic
parameters
policy-map global_policy
class inspection_default
inspect ftp
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect icmp
class class-default
call-home
profile CiscoTAC-1
no active
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
profile License
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Cryptochecksum:627e549de0a7dd97cd1379bbf37bc168
: end
:
: Serial Number: 9AEWS2E5JRA
: Hardware: ASAv, 2048 MB RAM, CPU Xeon E5 series 2200 MHz
:
ASA Version 9.6(1)
!
hostname medical-devices-kmcfadde
enable password [******] encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
!
license smart
feature tier standard
throughput level 1G
names
!
interface GigabitEthernet0/0
nameif WAN
security-level 50
ip address 192.168.100.149 255.255.255.0
ospf authentication-key *****
ospf authentication message-digest
!
interface GigabitEthernet0/1
no security-level
no ip address
!
interface GigabitEthernet0/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/5
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/6
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/7
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/8
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
management-only
nameif management
security-level 0
ip address 192.168.29.149 255.255.255.0
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup WAN
!
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
snmp-server host-group management SNMPHOSTS poll community *****
no snmp-server location
no snmp-server contact
snmp-server community *****
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint _SmartCallHome_ServerCA
no validation-usage
crl configure
crypto ca trustpool policy
auto-import
crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130
0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117
30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504
0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56
65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043
65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31
30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b
30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65
74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420
68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329
3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365
63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7
0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597
a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10
9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc
7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b
15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845
inspect icmp
inspect icmp error
class class-default
set connection decrement-ttl
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DD
CEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
profile License
destination address http https://tools.cisco.com/its/service/oddce/services/DD
CEService
destination transport-method http
Cryptochecksum:b2e10eb9d982ddbe5330e964af80d2d3
: end
!
!
diagnostic bootup level minimal
spanning-tree mode pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
!
vlan 20
!
vlan 1400
name IP_DEV_BIOMEDICAL
!
vlan 1500
name IP_DEV
!
vlan 1520
name WIFI_MGMT
!
ip ssh version 2
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
policy-map port_child_policy
class non-client-nrt-class
bandwidth remaining ratio 10
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
ip address 192.168.20.13 255.255.255.0
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 1520
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/23
spanning-tree portfast
!
interface GigabitEthernet1/0/24
spanning-tree portfast
!
interface GigabitEthernet1/0/25
spanning-tree portfast
!
interface GigabitEthernet1/0/26
spanning-tree portfast
!
interface GigabitEthernet1/0/27
spanning-tree portfast
!
interface GigabitEthernet1/0/28
spanning-tree portfast
!
interface GigabitEthernet1/0/29
spanning-tree portfast
!
interface GigabitEthernet1/0/30
spanning-tree portfast
!
interface GigabitEthernet1/0/31
spanning-tree portfast
!
interface GigabitEthernet1/0/32
spanning-tree portfast
!
interface GigabitEthernet1/0/33
spanning-tree portfast
!
interface GigabitEthernet1/0/34
spanning-tree portfast
!
interface GigabitEthernet1/0/35
spanning-tree portfast
!
interface GigabitEthernet1/0/36
spanning-tree portfast
interface GigabitEthernet1/0/41
switchport access vlan 1400
spanning-tree portfast
!
interface GigabitEthernet1/0/42
switchport access vlan 1400
spanning-tree portfast
!
interface GigabitEthernet1/0/43
switchport access vlan 1400
spanning-tree portfast
!
interface GigabitEthernet1/0/44
switchport access vlan 1400
spanning-tree portfast
!
interface GigabitEthernet1/0/45
description Set to 10/Half for Hospira
switchport access vlan 1500
speed 10
duplex half
spanning-tree portfast
!
interface GigabitEthernet1/0/46
switchport access vlan 1500
spanning-tree portfast
!
interface GigabitEthernet1/0/47
description VLAN trunk
switchport trunk allowed vlan 1400,1500,1520
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet1/0/48
description management connection on VL20
switchport access vlan 20
spanning-tree portfast
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
no ip http server
no ip http secure-server
ip route 0.0.0.0 0.0.0.0 192.168.20.254
!
ip access-list extended SSH-Access
permit tcp 192.168.20.0 0.0.0.255 any eq 22
deny ip any any log
!
access-list 10 permit 192.168.20.0 0.0.0.255
!
snmp-server community public RO 10
snmp-server location NCCoE
snmp-server contact <email-address>
!
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
access-class SSH-Access in
exec-timeout 300 0
password [******]
login local
transport input ssh
line vty 5 15
access-class SSH-Access in
exec-timeout 300 0
password [******]
login local
transport input ssh
!
ntp server 10.97.74.8
wsma agent exec
profile httplistener
profile httpslistener
wsma agent config
profile httplistener
profile httpslistener
wsma agent filesys
profile httplistener
System Information
System Location..................................
System Contact...................................
IP Address....................................... 192.168.250.2
IPv6 Address..................................... ::
Number of WLANs.................................. 2
System Nas-Id....................................
Timezone location................................
NTP Servers
------- -------------------------------------------------------------------------
---------------------
Redundancy Information
Unit............................................. Primary
AP Bundle Information
---------------- ----
ap1g1 12660
ap1g2 11748
ap1g3 13672
ap1g4 19256
ap3g1 9736
ap3g2 13480
ap3g3 18696
ap802 9536
c1140 8636
c1520 7344
c1550 10628
c1570 11536
c602i 3864
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
version.info 4
------------------ ----
ap1g1 12660
ap1g2 11748
ap1g3 13672
ap1g4 19256
ap3g1 9736
ap3g2 13480
ap3g3 18696
ap801 8064
ap802 9536
c1140 8636
c1520 7344
c1550 10628
c1570 11536
c602i 3864
version.info 4
Switch Configuration
case-check.................................... Enabled
consecutive-check............................. Enabled
default-check................................. Enabled
username-check................................ Enabled
position-check................................ Disabled
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
case-digit-check.............................. Disabled
Mgmt User
Lockout Attempts.............................. 3
SNMPv3 User
Lockout Attempts.............................. 3
Network Information
OCSP........................................ Disabled
Telnet...................................... Disable
Port Summary
AP Summary
Number of APs.................................... 2
AP Tcp-Mss-Adjust Info
AP78da.6ee0.08ec disabled -
AP24e9.b34b.f1ed disabled -
AP Location
NAS-identifier................................... none
RF Profile
----------
*AP3600 with 802.11ac Module will only advertise first 8 WLANs on 5GHz radios.
----------------
2 Disabled None
3 Disabled None
-----------------------------
1 Disabled None
RF Profile
Description...................................... <none>
11n-client-only.................................. disabled
------- -------
1 600
2 600
Trap Threshold
Clients...................................... 12 clients
Interference................................. 10 %
Utilization.................................. 80 %
Band Select
Denial....................................... 3 count
Window....................................... 5 clients
Coverage Data
Exception Level.............................. 25 %
104,108,112,116,120,124,128,
132,136,140,144,149,153,157,
161
DCA Bandwidth.................................... 20
Description...................................... <none>
11n-client-only.................................. disabled
------- -------
1 600
2 600
Trap Threshold
Clients...................................... 12 clients
Interference................................. 10 %
Utilization.................................. 80 %
Band Select
Load Balancing
Denial....................................... 3 count
Window....................................... 5 clients
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Coverage Data
Exception Level.............................. 25 %
DCA Bandwidth.................................... 20
Description...................................... <none>
11n-client-only.................................. disabled
------- -------
1 600
2 600
Trap Threshold
Clients...................................... 12 clients
Interference................................. 10 %
Utilization.................................. 80 %
Band Select
Denial....................................... 3 count
Window....................................... 5 clients
Coverage Data
Exception Level.............................. 25 %
104,108,112,116,120,124,128,
132,136,140,144,149,153,157,
161
DCA Bandwidth.................................... 20
Description...................................... <none>
11n-client-only.................................. disabled
------- -------
1 600
2 600
Trap Threshold
Clients...................................... 12 clients
Interference................................. 10 %
Utilization.................................. 80 %
Band Select
Load Balancing
Denial....................................... 3 count
Window....................................... 5 clients
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Coverage Data
Exception Level.............................. 25 %
DCA Bandwidth.................................... 20
Description...................................... <none>
11n-client-only.................................. disabled
------- -------
1 600
2 600
Trap Threshold
Clients...................................... 12 clients
Interference................................. 10 %
Utilization.................................. 80 %
Band Select
Load Balancing
Window....................................... 5 clients
Coverage Data
Exception Level.............................. 25 %
104,108,112,116,120,124,128,
132,136,140,144,149,153,157,
161
DCA Bandwidth.................................... 20
Description...................................... <none>
11n-client-only.................................. disabled
------- -------
1 600
2 600
Trap Threshold
Clients...................................... 12 clients
Interference................................. 10 %
Utilization.................................. 80 %
Band Select
Load Balancing
Denial....................................... 3 count
Window....................................... 5 clients
Coverage Data
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Exception Level.............................. 25 %
DCA Bandwidth.................................... 20
AP Config
Cisco AP Identifier.............................. 3
AP Regulatory Domain............................. -A
IP Address....................................... 192.168.250.10
IP NetMask....................................... 255.255.255.0
Number Of Slots.................................. 2
AP Model......................................... AIR-CAP1602I-A-K9
AP Image......................................... C1600-K9W8-M
AP Up Time....................................... 2 days, 22 h 22 m 20 s
CellId ...................................... 0
MCS Set
Tx Power
Diversity.................................. DIVERSITY_ENABLED
802.11n Antennas
B....................................... ENABLED
C....................................... ENABLED
Interference threshold..................... 10 %
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
RF utilization threshold................... 80 %
Containment Count............................ 0
CellId ...................................... 0
Station Configuration
MCS Set
Tx Power
......................................... 104,108,112,116,132,136,140,
Diversity.................................. DIVERSITY_ENABLED
802.11n Antennas
A....................................... ENABLED
B....................................... ENABLED
C....................................... ENABLED
Interference threshold..................... 10 %
RF utilization threshold................... 80 %
Containment Count............................ 0
Cisco AP Identifier.............................. 4
AP Regulatory Domain............................. -A
IP Address....................................... 192.168.250.11
IP NetMask....................................... 255.255.255.0
Number Of Slots.................................. 2
AP Model......................................... AIR-CAP1602I-A-K9
AP Image......................................... C1600-K9W8-M
AP Up Time....................................... 2 days, 22 h 22 m 16 s
CellId ...................................... 0
Station Configuration
MCS Set
Tx Power
Diversity.................................. DIVERSITY_ENABLED
802.11n Antennas
A....................................... ENABLED
B....................................... ENABLED
C....................................... ENABLED
Interference threshold..................... 10 %
Containment Count............................ 0
CellId ...................................... 0
Station Configuration
MCS Set
Tx Power
......................................... 104,108,112,116,132,136,140,
......................................... 149,153,157,161,165
802.11n Antennas
A....................................... ENABLED
B....................................... ENABLED
C....................................... ENABLED
Interference threshold..................... 10 %
RF utilization threshold................... 80 %
Containment Count............................ 0
Number Of Slots.................................. 2
AP Name.......................................... AP78da.6ee0.08ec
Slot ID........................................ 0
Noise Information
Interference Information
.............................................
Load Information
Receive Utilization.......................... 0 %
Transmit Utilization......................... 0 %
Channel Utilization.......................... 38 %
Coverage Information
Nearby APs
Radar Information
RF Parameter Recommendations
Power Level.................................. 1
Antenna Pattern.............................. 0
Number Of Slots.................................. 2
AP Name.......................................... AP78da.6ee0.08ec
Slot ID........................................ 1
Noise Information
Interference Information
.............................................
Load Information
Receive Utilization.......................... 0 %
Transmit Utilization......................... 0 %
Channel Utilization.......................... 1 %
Coverage Information
Nearby APs
Radar Information
RF Parameter Recommendations
Power Level.................................. 1
Antenna Pattern.............................. 0
All third party trademarks are the property of their respective owners.
Number Of Slots.................................. 2
AP Name.......................................... AP24e9.b34b.f1ed
Noise Information
Interference Information
.............................................
Load Information
Receive Utilization.......................... 0 %
Transmit Utilization......................... 0 %
Channel Utilization.......................... 34 %
Coverage Information
Nearby APs
Radar Information
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
RF Parameter Recommendations
Power Level.................................. 1
Antenna Pattern.............................. 0
All third party trademarks are the property of their respective owners.
Number Of Slots.................................. 2
AP Name.......................................... AP24e9.b34b.f1ed
Slot ID........................................ 1
Noise Information
Interference Information
.............................................
Load Information
Receive Utilization.......................... 0 %
Transmit Utilization......................... 0 %
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Channel Utilization.......................... 0 %
Coverage Information
Nearby APs
RF Parameter Recommendations
Power Level.................................. 1
Antenna Pattern.............................. 0
All third party trademarks are the property of their respective owners.
802.11a Configuration
11acSupport...................................... Enabled
11nSupport....................................... Enabled
802.11n Status:
A-MPDU Tx:
Realtime Timeout..................... 10
A-MSDU Tx:
CFP Period....................................... 4
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Default Channel.................................. 36
TI Threshold..................................... -50
dfs-peakdetect................................... Enabled
Voice AC:
Voice Max-Streams............................. 2
Video AC:
Update Contribution
Noise........................................ Enable
Interference................................. Enable
Load......................................... Disable
OptimizedRoaming
OptimizedRoaming Stats
Update Contribution
Noise........................................ Enable
Interference................................. Enable
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Load......................................... Disable
Minimum...................................... 0 days, 00 h 00 m 19 s
Average...................................... 0 days, 00 h 00 m 19 s
Maximum...................................... 0 days, 00 h 00 m 19 s
104,108,112,116,120,124,128,
132,136,140,144,149,153,157,
161
13,14,15,16,17,18,19,20,21,
22,23,24,25,26
Group Member
Jammer................................... Enabled
SuperAG.................................. Enabled
Canopy................................... Enabled
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Jammer................................... Enabled
SuperAG.................................. Disabled
Canopy................................... Disabled
802.11b Configuration
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
11gSupport....................................... Enabled
11nSupport....................................... Enabled
802.11n Status:
A-MPDU Tx:
Realtime Timeout..................... 10
A-MSDU Tx:
CFP Period....................................... 4
Default Channel.................................. 1
ED Threshold..................................... -50
Voice Max-Streams............................. 2
Update Contribution
Noise........................................ Enable
Interference................................. Enable
Load......................................... Disable
OptimizedRoaming
OptimizedRoaming Stats
Update Contribution
Noise........................................ Enable
Interference................................. Enable
Minimum...................................... 0 days, 00 h 03 m 43 s
Average...................................... 0 days, 00 h 03 m 43 s
Maximum...................................... 0 days, 00 h 03 m 43 s
Group Member
Jammer................................... Enabled
802.15.4................................. Enabled
SuperAG.................................. Enabled
Canopy................................... Enabled
Jammer................................... Enabled
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
802.15.4................................. Disabled
SuperAG.................................. Disabled
Canopy................................... Disabled
AQ = Air Quality
Mobility Configuration
---------------------------------------------------------
Subject Name :
CN=DEVICE-vWLC-AIR-CTVM-K9-005056AC6338,
emailAddress=support@vwlc.com
Validity :
Advanced Configuration
dot11-padding.................................... Disabled
padding-size..................................... 0
Location Configuration
Interface Configuration
IP Address....................................... 192.168.150.2
IP Netmask....................................... 255.255.255.0
IP Gateway....................................... 192.168.150.1
VLAN............................................. 1500
Quarantine-vlan.................................. 0
NAS-Identifier................................... none
Physical Port.................................... 1
AP Manager....................................... No
3G VLAN.......................................... Disabled
L2 Multicast..................................... Enabled
IP Address....................................... 192.168.250.2
IP Netmask....................................... 255.255.255.0
VLAN............................................. 1520
Quarantine-vlan.................................. 0
Physical Port.................................... 1
AP Manager....................................... Yes
L2 Multicast..................................... Enabled
IP Address....................................... 192.168.29.146
IP Netmask....................................... 255.255.255.0
SLAAC............................................ Disabled
AP Manager....................................... No
Link Status...................................... Up
inet
addr:192.168.29.146 Bcast:192.168.29.255 Mask:255.255.255.0
inet6 addr:
fe80::250:56ff:feac:6338/64 Scope:Link
TX packets:95115 errors:0
dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:25069479
(23.9 MiB) TX bytes:55852901 (53.2 MiB)
IP Address....................................... 1.1.1.1
AP Manager....................................... No
WLAN Configuration
WLAN Identifier.................................. 1
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Status........................................... Disabled
Quarantine VLAN................................ 0
ATF Policy....................................... 0
NAS-identifier................................... none
Interface........................................ ip_dev
WMM.............................................. Allowed
Radius Servers
Mu-Mimo.......................................... Enabled
Security
FT Support.................................... Disabled
802.1X........................................ Disabled
EAP-Passthrough............................... Disabled
Web-Passthrough............................... Disabled
Mac-auth-server............................... 0.0.0.0
Web-portal-server............................. 0.0.0.0
PMF........................................... Disabled
DMS DB is empty
802.11u........................................ Disabled
Local Policy
----------------
-------- ---------------
WLAN Configuration
WLAN Identifier.................................. 2
Status........................................... Enabled
Quarantine VLAN................................ 0
ATF Policy....................................... 0
NAS-identifier................................... none
Interface........................................ ip_dev
WMM.............................................. Allowed
Radius Servers
Mu-Mimo.......................................... Enabled
Security
FT Support.................................... Disabled
802.1X........................................ Disabled
802.1x.................................. Disabled
PSK..................................... Enabled
CCKM.................................... Disabled
FT-PSK(802.11r)......................... Disabled
PMF-1X(802.11w)......................... Disabled
PMF-PSK(802.11w)........................ Disabled
OSEN-1X................................. Disabled
FT Reassociation Timeout................... 20
EAP-Passthrough............................... Disabled
Web-Passthrough............................... Disabled
Mac-auth-server............................... 0.0.0.0
Web-portal-server............................. 0.0.0.0
Eap-params.................................... Disabled
DMS DB is empty
Local Policy
----------------
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
-------- ---------------
Policy Configuration
L2ACL Configuration
ACL Configuration
Keywrap.......................................... Disabled
Fallback Test:
Authentication Servers
Idx Type Server Address Port State Tout MgmtTout RFC3576 IPSec -
AuthMode/Phase1/Group/Lifetime/Auth/Encr/Region
Accounting Servers
Idx Type Server Address Port State Tout MgmtTout RFC3576 IPSec -
AuthMode/Phase1/Group/Lifetime/Auth/Encr/Region
Fallback Test:
Authentication Servers
Authorization Servers
Accounting Servers
LDAP Configuration
Timer:
EAP-FAST:
Dns Configuration
Radius port......................................
Radius secret....................................
Dns url..........................................
Dns timeout......................................
Dns Serverip.....................................
Tacacs port......................................
Tacacs secret.................................... 2
Dns url..........................................
Dns timeout......................................
Dns Serverip.....................................
Arp-caching: Disabled
Vlan-Name Id Status
-------------------------------- -------
Route Info
Number of Routes................................. 0
protocol......................................... dot1p
dot1p............................................ 5
dot1p............................................ 4
protocol......................................... dot1p
dot1p............................................ 0
dot1p............................................ 1
Authorization List
Statistics (uplink-usage
based)
DHCP Info
cdp version v2
-----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-
802.11bg :
Channels : 1 1 1 1 1
: 1 2 3 4 5 6 7 8 9 0 1 2 3 4
-----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-
US (-A ,-AB ): A * * * * A * * * * A . . .
-----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
802.11a : 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Channels : 3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 4 5 5 6 6 6 7
: 4 6 8 0 2 4 6 8 2 6 0 4 0 4 8 2 6 0 4 8 2 6 0 4 9 3 7 1 5 9 3
-----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
US (-AB ,-AB ): . A . A . A . A A A A A A A A A A A A A A A A A A A A A * . .
-----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
4.9GHz 802.11a :
Channels : 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
: 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
-----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
US (-AB ,-AB ): * * * * * * * * * * * * * * * * * * * A * * * * * A
Auto-Immune
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Auto-Immune.................................... Disabled
IP-theft....................................... Enabled
Signature Policy
WLAN Client
CustomLogo....................................... None
Logout-popup..................................... Enabled
RLDP Retry....................................... 1
Containment Level................................ 1
monitor_ap_only.................................. false
MAC Address
-----------------
Media-Stream Configuration
Allowed WLANs....................................
URL..............................................
E-mail...........................................
Phone............................................
Note.............................................
Multicast-direct................................. Enabled
Multicast-direct................................. Enabled
Number of Clients................................ 0
Down-lifetime value......................... 30
RA Throttling............................... Disabled
RA Throttling max-through................... 10
Number of Services.............................. 10
HP_Photosmart_Printer_1 No All 0
_universal._sub._ipp._tcp.local.
Profile Id....................................... 1
No of Services................................... 10
Services......................................... AirTunes
Airplay
Googlecast
HP_Photosmart_Printer_1
HP_Photosmart_Printer_2
HomeSharing
Printer-IPP
Printer-IPPS
Printer-LPD
Printer-SOCKET
No. Wlans........................................ 0
mDNS AP Summary
No Profile Created.
Heartbeat Interval...............60
Interface........................management
Certificate Summary.
Call-home Summary.
Coredump Summary
Memory Summary
Current Time:Thu Aug 18 20:06:33 2016 System UP Time:6 days 3 hrs 49 mins 39 secs
Mesh Configuration
Mesh Security
External-Auth................................. disabled
[NETWORK CONFIGURATION]
# DHCP=0 DHCP disabled - IP, GATEWAY, NETMASK, and DNS must be valid
# DHCP=1 DHCP enabled - IP, GATEWAY, NETMASK, and DNS must be blank
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
DHCP=1
IP=
GATEWAY=
NETMASK=
DNS=
SIGMAGW=192.168.140.165
MULTICAST=
DEVICEID=000345
[WIFI CONFIGURATION]
BSS=0
SSID=IP_Dev_Cert
802.11b=1
802.11g=1
CHANNEL=0
# SECURITY=6 LEAP
# SECURITY=7 EAP-FAST
SECURITY=4
# WEPKEYINDEX=0-3
WEPKEYINDEX=0
characters long
WEPKEY=
# WPAENCRYPTION=0 Any
# WPAENCRYPTION=1 WEP
# WPAENCRYPTION=2 TKIP
WPAENCRYPTION=3
# WPAPSK may 64 hex (0-1 and a-f) characters long to specify a PSK
WPAPSK=
should be 0
LEAP=0
PEAP/MSCHAPv2=0
EAP-FAST=0
IDENTITY=BaxterCert
PASSWORD=
certificate.
# All certificates and private keys must be PEM format (base64 encoded).
Battery Module
# The MAC address specified below must match the module connected to the pump.
MAC=00:40:9d:66:db:45
CLIENTCERT=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 publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
EBt082G4dowFOUScRbgHrGMLCj21W2SKAEPROOUFCPjqVYhs2I25yK5b7Jq0aeL1
L9Dj/kGPqT/JNWKzBEDsZwKBgQDFNt5BN0d20Kb5/xR5n3Xwz788a8g35rqtIplt
uOnqRk2Vcne67a0FvgeUnZ+17BiU9FSKOFgpVWMgaXkW6HBjbqehBB2bRCHOmhH2
b53Fq//9IxRy+G7fl+busJluRwGJT6Un6p3kttgLWgQAC3aQMzgJhjy7xt25aQ+9
p8ZfEQKBgB6jQAT31FxvPFHyjU4NdFeogJd2c2nFbkC7aqOEPKNG9Nbzn/VVWh7x
Rx7Axua3D2OYrCH7V1NcR9X1dInpyj/hYXc5/VdtLZ2yhEc2GiG/jfgNWk2W2BZd
2NLf54bgV67lkC2yKMK/5wBru+V73WmqvWfQ4KsMesLLBBzMRvJa
-----BEGIN CERTIFICATE-----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 publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
Q2VydFRlc3RJbnRlcm1lZGlhdGUtU0hBMi5jcnQwDAYDVR0TAQH/BAIwADANBgkq
hkiG9w0BAQsFAAOCAQEAe7Rc6PbIfEjSQpCZ3UpZ7zqWruov44nmSKvR/X4MJITM
z9k3S+TzGOGYnq7bHBF1mjLt0l5K/BDWSG6LY5clSYJuGCbC/dSNFk9G+lzBKs5S
5xJxk8HeAt4OHOWmtEhZ7S4np7zUBcRu1koHbw4vW/lYJBvxRF1Sdd0ypyBP4X81
D2mX+LmFo2rlLSExurr5rd1s6Pna2FRBEjoyM78ID9AmKENqeioDi+hxGLlQROOt
y7aZU8yWcec7nad9iUGO/pMDdhbWexpvp4CBihxYkUMQcf8RaqTkJM8fLAdvPq9P
oQuBuMi+qPtI3WkTgfwr49usBzgbrdNPc/5MRQEz8Q==
-----END CERTIFICATE-----
CLIENTCERTEXPIRE=
TRUSTEDCERTS=
-----BEGIN CERTIFICATE-----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 publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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 publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
BAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU9kZ+Gxa7N5lj9z/YhSzk
yepYDx4wHwYDVR0jBBgwFoAU9kZ+Gxa7N5lj9z/YhSzkyepYDx4wDQYJKoZIhvcN
AQELBQADggEBAAeQacFm1sFPOIEvXDVi3IH2RKF7he0p/M0bK2Soj137LMf+ctpM
3bFKJPY97YIE0g7T1qgR8TN2sK0moumMTPjWCdFWJyN4yakS6tPIWEG2XobJ9H1r
iuVXLKd2M/1yhqUyt1o5KtbOGQXLFd3qdp4A1tcXuK2wyMTiSCYS3Uow61JdEw6M
eyrMIpZl9GtvaXTz6LdnozAbhKC7bVUy7ob0T4E03fQ8hIQCNPupvY7Db1/XmIw8
QWVd6AOH7EE3P8xbWOvcTWZ5XbstWY014GeJFXZ7YreaAg8sYa6CzasuHkr/rxeZ
8yzOmCTTTSPk5Ju5bTfAyEpgkl5fDvntJQg=
-----END CERTIFICATE-----
[2] Cisco Adaptive Security Virtual Appliance (ASAv) Quick Start Guide, 9.6, Cisco [Web site],
http://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start/asav-quick/intro-
asav.html [accessed 2/7/18].
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
[3] D. Bider and M. Baushke, SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport
Layer Protocol, Internet Engineering Task Force (IETF) Request for Comments (RFC) 6668, July
2012. https://tools.ietf.org/html/rfc6668 [accessed 2/7/18].
[4] J. Postel, Internet Control Message Protocol: DARPA Internet Program Protocol Specification,
Internet Engineering Task Force (IETF) Network Working Group Request for Comments (RFC)
792, September 1981. https://tools.ietf.org/html/rfc792 [accessed 2/7/18].
[5] J. Case, M. Fedor, M. Schoffstall, and J. Davin, A Simple Network Management Protocol (SNMP),
Internet Engineering Task Force (IETF) Network Working Group Request for Comments (RFC)
1157, May 1990. https://tools.ietf.org/html/rfc1157 [accessed 2/7/18].
[6] R. Droms, Dynamic Host Configuration Protocol, Internet Engineering Task Force (IETF) Network
Working Group Request for Comments (RFC) 2131, March 1997.
https://www.ietf.org/rfc/rfc2131.txt [accessed 2/7/18].
[7] Institute of Electrical and Electronics Engineers (IEEE), Bridges and Bridged Networks, IEEE
802.1Q, 2014. http://www.ieee802.org/1/pages/802.1Q-2014.html [accessed 2/7/18].
[8] Catalyst 3650 Switch Getting Started Guide, Cisco [Web site],
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3650/hardware/quick/guide/cat3
650_gsg.html [accessed 2/7/18].
[9] Institute of Electrical and Electronics Engineers (IEEE), Part 11: Wireless LAN Medium Access
Control (MAC) and Physical Layer (PHY) specifications: Amendment 6: Medium Access Control
(MAC) Security Enhancements, 802.11i, 2004.
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1318903 [accessed 2/7/18].
[11] D. Mills, J. Martin, Ed., J. Burbank, and W. Kasch, Network Time Protocol Version 4: Protocol and
Algorithms Specification, Internet Engineering Task Force (IETF) Request for Comments (RFC)
5905, June 2010. https://www.ietf.org/rfc/rfc5905.txt [accessed 2/7/18].
[12] U.S. Department of Commerce. Announcing the Advanced Encryption Standard (AES), Federal
This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.1800-8.
[13] Cisco Wireless Controller Configuration Guide, Release 8.0, Cisco [Web site],
http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-
guide/b_cg80.html [accessed 2/7/18].
[14] D. Simon, B. Aboba, and R. Hurst, The EAP-TLS Authentication Protocol, Internet Engineering
Task Force (IETF) Network Working Group Request for Comments (RFC) 5216, March 2008.
https://www.ietf.org/rfc/rfc5216.txt [accessed 2/7/18].
[15] C. Rigney, S. Willens, A. Rubens, and W. Simpson, Remote Authentication Dial In User Service
(RADIUS), Internet Engineering Task Force (IETF) Network Working Group Request for
Comments (RFC) 2865, June 2000. https://tools.ietf.org/html/rfc2865 [accessed 2/7/18].
[16] S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, X.509 Internet Public
Key Infrastructure Online Certificate Status Protocol – OCSP, Internet Engineering Task Force
(IETF) Request for Comments (RFC) 6960, June 2013. https://tools.ietf.org/html/rfc6960
[accessed 2/7/18].
[17] Symantec™ Data Center Security: Server, Monitoring Edition, and Server Advanced 6.7 MP1
Planning and Deployment Guide, Symantec [Web site],
http://help.symantec.com/cs/DCS6.7/DCS6_7/v118490468_v110163010/Installing-Data-
Center-Security:-Server-Advanced-6.7-or-6.7-MP1/?locale=EN_US [accessed 2/7/18].