Cisco IOS XE Release 3 NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- CISR-ND-000001
- Vuln IDs
-
- V-73961
- Rule IDs
-
- SV-88635r2_rule
Checks: C-74043r3_chk
Review the Cisco IOS XE router configuration to see if the device limits the number of concurrent SSH sessions to an organization-defined number. The following commands should be in the configuration: line vty 0 1 exec-timeout 60 0 session-limit 2 login authentication TEST transport input ssh transport output ssh line vty 2 4 exec-timeout 60 0 session-limit 2 login authentication TEST transport input none transport output none If the number of concurrent sessions are not limited, this is a finding.
Fix: F-80501r3_fix
Configure the Cisco IOS XE router to limit the number of concurrent SSH sessions to an organization-defined number. The configuration will look similar to the example below: line vty 0 1 exec-timeout 60 0 session-limit 2 login authentication TEST transport input ssh transport output ssh line vty 2 4 exec-timeout 60 0 session-limit 2 login authentication TEST transport input none transport output none
- RMF Control
- AC-2
- Severity
- H
- CCI
- CCI-000015
- Version
- CISR-ND-000006
- Vuln IDs
-
- V-73963
- Rule IDs
-
- SV-88637r2_rule
Checks: C-74045r5_chk
Review the Cisco IOS XE router configuration to determine if there is an authentication server defined. The configuration should look similar to the example below: aaa new-model aaa authentication login default group radius local radius server RADIUS address ipv4 1.1.1.1 key <pre-shared key> If there is no authentication server defined, this is a finding.
Fix: F-80503r6_fix
Configure the Cisco IOS XE router to use an authentication server. The configuration should look similar to the example below: aaa new-model aaa authentication login default group radius local radius server RADIUS address ipv4 1.1.1.1 key <pre-shared key>
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000018
- Version
- CISR-ND-000009
- Vuln IDs
-
- V-73965
- Rule IDs
-
- SV-88639r2_rule
Checks: C-74047r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits account creation. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account creation is not automatically audited, this is a finding.
Fix: F-80505r3_fix
Configure the Cisco IOS XE router to automatically audit the creation of accounts. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001403
- Version
- CISR-ND-000010
- Vuln IDs
-
- V-73967
- Rule IDs
-
- SV-88641r2_rule
Checks: C-74049r4_chk
Verify that the Cisco IOS XE router is configured to audit account modification. The configuration should like similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account modification is not audited, this is a finding.
Fix: F-80507r4_fix
Enter the following commands to audit account modification: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001405
- Version
- CISR-ND-000012
- Vuln IDs
-
- V-73969
- Rule IDs
-
- SV-88643r2_rule
Checks: C-74051r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits account removal. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account removal is not automatically audited, this is a finding.
Fix: F-80509r3_fix
Configure the Cisco IOS XE router to automatically audit the removal of accounts. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- CISR-ND-000014
- Vuln IDs
-
- V-73971
- Rule IDs
-
- SV-88645r2_rule
Checks: C-74053r4_chk
Verify that the Cisco IOS XE router has ACLs configured and apply to the appropriate interfaces to control the flow of traffic. The configuration should look similar to the example below: interface GigabitEthernet 0/0/1 description MGMT link ip address x.x.x.x 255.255.255.0 ip access-group Authorized_Sources_ACL in ... Extended IP access list Authorized_Source_ACL 10 permit 22 host 2.2.2.2 host 3.3.3.3 log 20 deny ip any any log If ACLs are not configured, this is a finding.
Fix: F-80511r3_fix
Configure the Cisco IOS XE router with ACLs, applied to the appropriate interfaces to control the flow of management information. The configuration should look similar to the example below: interface GigabitEthernet 0/0/1 description MGMT link ip address x.x.x.x 255.255.255.0 ip access-group Authorized_Sources_ACL in ... Extended IP access list Authorized_Source_ACL 10 permit 22 host 2.2.2.2 host 3.3.3.3 log 20 deny ip any any log
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- CISR-ND-000015
- Vuln IDs
-
- V-73973
- Rule IDs
-
- SV-88647r2_rule
Checks: C-74055r5_chk
Verify that the Cisco IOS XE router limits the number of consecutive invalid logon attempts to "3" within "15" minutes. The configuration should look similar to the example below: ip ssh authentication-retries 3 login block-for 600 attempts 3 within 900 If the number of consecutive logon attempts is not set to "3" within "15" minutes, this is a finding.
Fix: F-80513r4_fix
Configure SSH using: ip ssh authentication-retries 3 login block-for 600 attempts 3 within 900
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- CISR-ND-000016
- Vuln IDs
-
- V-73975
- Rule IDs
-
- SV-88649r2_rule
Checks: C-74057r5_chk
Verify that the Cisco IOS XE router has a logon banner configured. The configuration should look similar to the example below: banner login ^C You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE, or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. ^C If the logon banner is not configured, this is a finding.
Fix: F-80515r4_fix
Add the banner logon command and the text of the banner to the Cisco IOS XE router configuration. The configuration will look similar to the example below: banner login ^C You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE, or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. ^C
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- CISR-ND-000017
- Vuln IDs
-
- V-73977
- Rule IDs
-
- SV-88651r2_rule
Checks: C-74059r3_chk
Verify that the Cisco IOS XE router has a logon banner configured. The configuration should look similar to the example below: banner login ^C You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. ^C If the login banner is not configured, this is a finding.
Fix: F-80517r3_fix
Add the banner logon command and the text of the banner to the Cisco IOS XE router configuration. The configuration will look similar to the example below: banner login ^C You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. ^C
- RMF Control
- AU-10
- Severity
- L
- CCI
- CCI-000166
- Version
- CISR-ND-000021
- Vuln IDs
-
- V-73979
- Rule IDs
-
- SV-88653r2_rule
Checks: C-74061r3_chk
Review the Cisco IOS XE router configuration to determine if logging is enabled to prevent repudiation. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not enabled, this is a finding.
Fix: F-80519r3_fix
Configure the Cisco IOS XE router to enable logging. The configuration should like similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000169
- Version
- CISR-ND-000023
- Vuln IDs
-
- V-73981
- Rule IDs
-
- SV-88655r2_rule
Checks: C-74063r3_chk
Verify that the Cisco IOS XE router is generating audit records. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If audit records are not being generated, this is a finding.
Fix: F-80521r2_fix
Enter the following commands to enable auditing: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000171
- Version
- CISR-ND-000024
- Vuln IDs
-
- V-73983
- Rule IDs
-
- SV-88657r2_rule
Checks: C-74065r3_chk
Verify that the Cisco IOS XE router is configured to only allow individuals in the proper role to select audited events. The configuration should look similar to the example below: parser view Senior-Admin secret 5 $1$hW3m$PE.3zCJYeSrvYflFey71R. commands exec include all configure commands exec include all show parser view Auditor secret 5 $1$qb3F$SrdJW2oyyDzq1L94I7eED. commands exec include show logging If this is not configured, this is a finding.
Fix: F-80523r3_fix
Configure the Cisco IOS XE router using the following commands: parser view Senior-Admin secret 5 $1$hW3m$PE.3zCJYeSrvYflFey71R. commands exec include all configure commands exec include all show parser view Auditor secret 5 $1$qb3F$SrdJW2oyyDzq1L94I7eED. commands exec include show logging
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000025
- Vuln IDs
-
- V-73985
- Rule IDs
-
- SV-88659r2_rule
Checks: C-74067r3_chk
Verify that the Cisco IOS XE router is configured to generate audit records when successful/unsuccessful attempts to access privileges. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If audit records are not being generated, this is a finding.
Fix: F-80525r3_fix
Configure the Cisco IOS XE router to enable auditing. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-14
- Severity
- L
- CCI
- CCI-001464
- Version
- CISR-ND-000026
- Vuln IDs
-
- V-73987
- Rule IDs
-
- SV-88661r2_rule
Checks: C-74069r5_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not configured, this is a finding.
Fix: F-80527r3_fix
Enter the following commands to enable auditing. The configuration will look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000130
- Version
- CISR-ND-000027
- Vuln IDs
-
- V-73989
- Rule IDs
-
- SV-88663r2_rule
Checks: C-74071r3_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not configured to produce audit log records containing sufficient information to establish what type of event occurred, this is a finding.
Fix: F-80529r3_fix
Enter the following commands to enable auditing. The configuration will look similar to the example below: archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000131
- Version
- CISR-ND-000028
- Vuln IDs
-
- V-73991
- Rule IDs
-
- SV-88665r2_rule
Checks: C-74073r4_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: service timestamps log datetime If time stamps is not configured, this is a finding.
Fix: F-80531r3_fix
Enter the following commands to enable time stamps for auditing: service timestamps log datetime
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000132
- Version
- CISR-ND-000029
- Vuln IDs
-
- V-73993
- Rule IDs
-
- SV-88667r2_rule
Checks: C-74075r3_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not configured to produce audit records containing information to establish where the events occurred, this is a finding.
Fix: F-80533r3_fix
Enter the following commands to enable auditing. The configuration will look similar to the example below: archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- CISR-ND-000030
- Vuln IDs
-
- V-73995
- Rule IDs
-
- SV-88669r2_rule
Checks: C-74077r3_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not configured to produce log records containing information to establish the source of events, this is a finding.
Fix: F-80535r3_fix
Enter the following commands to enable auditing. The configuration will look similar to the example below: archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000134
- Version
- CISR-ND-000031
- Vuln IDs
-
- V-73997
- Rule IDs
-
- SV-88671r2_rule
Checks: C-74079r3_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not configured to log the outcome of events, this is a finding.
Fix: F-80537r3_fix
Enter the following commands to enable auditing. The configuration will look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-001487
- Version
- CISR-ND-000032
- Vuln IDs
-
- V-73999
- Rule IDs
-
- SV-88673r2_rule
Checks: C-74081r3_chk
Verify that logging of user information is configured on the Cisco IOS XE router. The configuration will look similar to the example below: logging userinfo If logging of user information is not configured, this is a finding.
Fix: F-80539r3_fix
Enter the following commands to enable logging of user information: logging userinfo
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000135
- Version
- CISR-ND-000033
- Vuln IDs
-
- V-74001
- Rule IDs
-
- SV-88675r2_rule
Checks: C-74085r3_chk
Verify that logging is properly configured on the Cisco IOS XE router. The configuration will look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If logging is not configured to log the full-text recording of privileged commands, this is a finding.
Fix: F-80541r3_fix
Enter the following commands to enable auditing: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-000159
- Version
- CISR-ND-000036
- Vuln IDs
-
- V-74003
- Rule IDs
-
- SV-88677r2_rule
Checks: C-74087r3_chk
Verify that the Cisco IOS XE router is configured to use internal system clocks to generate time stamps for audit records. The configuration should look similar to the example below: service timestamps log datetime If internal systems clocks are not being used, this is a finding.
Fix: F-80543r3_fix
Configure the Cisco IOS XE router to use internal clocks to generate time stamps for audit records. The configuration should look similar to the example below: service timestamps log datetime
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- CISR-ND-000043
- Vuln IDs
-
- V-74005
- Rule IDs
-
- SV-88679r2_rule
Checks: C-74089r3_chk
Verify that the Cisco IOS XE router is configured to use syslog. The configuration should look similar to the example below: logging host 1.1.1.1 If syslog is not configured, this is a finding.
Fix: F-80545r3_fix
Configure the Cisco IOS XE router to use syslog. The configuration should look similar to the example below: logging host 1.1.1.1
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- CISR-ND-000047
- Vuln IDs
-
- V-74007
- Rule IDs
-
- SV-88681r2_rule
Checks: C-74091r3_chk
Verify that the Cisco IOS XE router does not have any unnecessary or non-secure ports, protocols, and services enabled. For example, the following commands should not be in the configuration: ip bootp server ip dns server ip identd ip finger ip http-server ip rcmd rcp-enable ip rcmd rsh-enable service config service finger service tcp-small-servers service udp-small-servers service pad If any unnecessary or non-secure ports, protocols, or services are enabled, this is a finding.
Fix: F-80547r3_fix
Disable all unnecessary or non-secure ports, protocols, and services. If any of the following commands are in the configuration, remove them. ip bootp server ip dns server ip identd ip finger ip http-server ip rcmd rcp-enable ip rcmd rsh-enable service config service finger service tcp-small-servers service udp-small-servers service pad
- RMF Control
- AC-2
- Severity
- H
- CCI
- CCI-001358
- Version
- CISR-ND-000049
- Vuln IDs
-
- V-74009
- Rule IDs
-
- SV-88683r2_rule
Checks: C-74095r3_chk
Verify that there is one local account configured on the Cisco IOS XE router. The configuration should look similar to the example below: username <username> privilege 15 password <password string> If there is not a local account configured, this is a finding. If there is more than one local account configured, this is a finding.
Fix: F-80551r3_fix
If there is more than one local account, delete the additional account by using the NO form of the username command. If there is no local account, create one using the following username command: <username> privilege 15 password <password>
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- CISR-ND-000055
- Vuln IDs
-
- V-74011
- Rule IDs
-
- SV-88685r2_rule
Checks: C-74097r3_chk
Verify that the Cisco IOS XE router enforces a minimum password length of "15" characters. The configuration should look similar to the example below: aaa common-criteria policy <Policy Name> min-length 15 If a minimum password length of "15" characters is not enforced, this is a finding.
Fix: F-80553r2_fix
Use the following commands to configure minimum password length: aaa common-criteria policy <Policy Name> min-length 15
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- CISR-ND-000057
- Vuln IDs
-
- V-74013
- Rule IDs
-
- SV-88687r2_rule
Checks: C-74099r3_chk
Verify that the Cisco IOS XE router is configured to use complex passwords. The configuration should look similar to the example below: aaa common-criteria policy PASSWORD_POLICY min-length 15 upper-case 1 If the use of complex passwords is not configured, this is a finding.
Fix: F-80555r2_fix
Use the following commands to configure password complexity: aaa common-criteria policy PASSWORD_POLICY min-length 15 upper-case 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- CISR-ND-000058
- Vuln IDs
-
- V-74015
- Rule IDs
-
- SV-88689r2_rule
Checks: C-74101r3_chk
Verify that the Cisco IOS XE router is configured to use complex passwords. The configuration should look similar to the example below: aaa common-criteria policy PASSWORD_POLICY min-length 15 upper-case 1 lower-case 1 If the use of complex passwords is not configured, this is a finding.
Fix: F-80557r2_fix
Use the following commands to configure password complexity: aaa common-criteria policy PASSWORD_POLICY min-length 15 upper-case 1 lower-case 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- CISR-ND-000059
- Vuln IDs
-
- V-74017
- Rule IDs
-
- SV-88691r2_rule
Checks: C-74105r4_chk
Verify that the Cisco IOS XE router is configured to use complex passwords. The configuration should look similar to the example below: aaa common-criteria policy PASSWORD_POLICY min-length 15 numeric-count 1 upper-case 1 lower-case 1 If the use of complex passwords is not configured, this is a finding.
Fix: F-80559r2_fix
Use the following commands to configure password complexity: aaa common-criteria policy PASSWORD_POLICY min-length 15 numeric-count 1 upper-case 1 lower-case 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- CISR-ND-000060
- Vuln IDs
-
- V-74019
- Rule IDs
-
- SV-88693r2_rule
Checks: C-74107r3_chk
Verify that the Cisco IOS XE router is configured to use complex passwords. The configuration should look similar to the example below: aaa common-criteria policy PASSWORD_POLICY min-length 15 numeric-count 1 upper-case 1 lower-case 1 special-case 1 If the use of complex passwords is not configured, this is a finding.
Fix: F-80561r3_fix
Use the following commands to configure password complexity: aaa common-criteria policy PASSWORD_POLICY min-length 15 numeric-count 1 upper-case 1 lower-case 1 special-case 1
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000195
- Version
- CISR-ND-000061
- Vuln IDs
-
- V-74021
- Rule IDs
-
- SV-88695r2_rule
Checks: C-74111r3_chk
Verify that the Cisco IOS XE router is configured to use complex passwords. The configuration should look similar to the example below: aaa common-criteria policy PASSWORD_POLICY min-length 15 numeric-count 1 upper-case 1 lower-case 1 special-case 1 char-changes 8 If the use of complex passwords is not configured, this is a finding.
Fix: F-80563r2_fix
Use the following commands to configure password complexity: aaa common-criteria policy PASSWORD_POLICY min-length 15 numeric-count 1 upper-case 1 lower-case 1 special-case 1 char-changes 8
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000196
- Version
- CISR-ND-000062
- Vuln IDs
-
- V-74023
- Rule IDs
-
- SV-88697r2_rule
Checks: C-74113r3_chk
Verify that Cisco IOS XE router has password encryption enabled. The configuration should look similar to the example below: password encryption aes service password-encryption If password encryption is not enabled, this is a finding.
Fix: F-80565r2_fix
Add the following command to encrypt local passwords: service password-encryption
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- CISR-ND-000065
- Vuln IDs
-
- V-74025
- Rule IDs
-
- SV-88699r2_rule
Checks: C-74115r3_chk
Verify that the Cisco IOS XE router is configured to enforce a 60-day maximum password life. The configuration should look like the example below: aaa common-criteria policy <Policy Name> lifetime month 2 If a 60-day maximum password life is not configured, this is a finding.
Fix: F-80567r2_fix
Use the following commands to configure a 60-day maximum password life: aaa common-criteria policy <Policy Name> lifetime month 2
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- CISR-ND-000071
- Vuln IDs
-
- V-74027
- Rule IDs
-
- SV-88701r2_rule
Checks: C-74117r3_chk
Verify that the Cisco IOS XE router is configured to support session time outs and idle time outs on all management interfaces. The configuration should look similar to the example below: line con 0 exec-timeout 10 0 line vty 0 5 exec-timeout 10 0 If it is not configured to support session idle time outs on all management interfaces, this is a finding.
Fix: F-80569r2_fix
Configure session time outs and idle time outs on all management interfaces using the following commands: line con 0 exec-timeout 10 0 line vty 0 5 exec-timeout 10 0
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- CISR-ND-000077
- Vuln IDs
-
- V-74029
- Rule IDs
-
- SV-88703r2_rule
Checks: C-74119r3_chk
Verify that the Cisco IOS XE router is configured to reveal error messages only to authorized individuals. The configuration should look similar to the example below: parser view Senior-Admin secret 5 $1$hW3m$PE.3zCJYeSrvYflFey71R. commands exec include all configure commands exec include all show parser view Auditor secret 5 $1$qb3F$SrdJW2oyyDzq1L94I7eED. commands exec include show logging If it is not configured to reveal error messages only to authorized individuals, this is a finding.
Fix: F-80571r3_fix
Use CLI views to control who can view error messages. The configuration should look similar to the example below: parser view Senior-Admin secret 5 $1$hW3m$PE.3zCJYeSrvYflFey71R. commands exec include all configure commands exec include all show parser view Auditor secret 5 $1$qb3F$SrdJW2oyyDzq1L94I7eED. commands exec include show logging
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- CISR-ND-000083
- Vuln IDs
-
- V-74031
- Rule IDs
-
- SV-88705r2_rule
Checks: C-74121r3_chk
Verify that the Cisco IOS XE router is configured to automatically terminate sessions. The configuration should look similar to the example below: line vty 0 5 exec-timeout 10 0 If sessions do not automatically terminate, this is a finding.
Fix: F-80573r3_fix
Configure session time outs and idle time outs on all management interfaces using the following commands: line vty 0 5 exec-timeout 10 0
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002130
- Version
- CISR-ND-000087
- Vuln IDs
-
- V-74033
- Rule IDs
-
- SV-88707r2_rule
Checks: C-74123r3_chk
Verify that the Cisco IOS XE router automatically audits account enabling actions. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account enabling actions are not audited, this is a finding.
Fix: F-80575r3_fix
Enter the following commands to enable auditing: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002234
- Version
- CISR-ND-000093
- Vuln IDs
-
- V-74035
- Rule IDs
-
- SV-88709r2_rule
Checks: C-74125r3_chk
Verify that the Cisco IOS XE router automatically audits execution of privileged functions. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If privileged functions are not audited, this is a finding.
Fix: F-80577r3_fix
Enter the following commands to enable auditing: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001914
- Version
- CISR-ND-000096
- Vuln IDs
-
- V-74037
- Rule IDs
-
- SV-88711r2_rule
Checks: C-74127r4_chk
Verify that the Cisco IOS XE router is configured to only allow individuals in the proper role to select audited events. The configuration should look similar to the example below: parser view Senior-Admin secret 5 $1$hW3m$PE.3zCJYeSrvYflFey71R. commands exec include all configure commands exec include all show parser view Auditor secret 5 $1$qb3F$SrdJW2oyyDzq1L94I7eED. commands exec include show logging If this is not configured to only allow individuals in the proper role to select audited events, this is a finding.
Fix: F-80579r3_fix
Configure the Cisco IOS XE router using the following commands: parser view Senior-Admin secret 5 $1$hW3m$PE.3zCJYeSrvYflFey71R. commands exec include all configure commands exec include all show parser view Auditor secret 5 $1$qb3F$SrdJW2oyyDzq1L94I7eED. commands exec include show logging
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- CISR-ND-000097
- Vuln IDs
-
- V-74039
- Rule IDs
-
- SV-88713r2_rule
Checks: C-74129r3_chk
Verify that the Cisco IOS XE router is configured with a logging buffer size. The configuration should look like the example below: logging buffered 4096 If a logging buffer size is not configured, this is a finding.
Fix: F-80581r3_fix
Add the following command to configure a buffer size (The range is 4096 to 2147483647 in bytes). logging buffered 4096
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001891
- Version
- CISR-ND-000100
- Vuln IDs
-
- V-74041
- Rule IDs
-
- SV-88715r2_rule
Checks: C-74131r3_chk
Verify that at least two NTP servers are configured and that system clocks update the time every 24 hours. The configuration should look similar to the example below: ntp authentication-key 1 md5 072C285F4D06 7 ntp authenticate ntp trusted-key 1 ntp server 1.1.1.1 key 1 If there are not at least two NTP servers configured, and clocks are updated at least every 24 hours, this is a finding.
Fix: F-80583r3_fix
Configure the router to use NTP. The configuration should look similar to the example below: ntp authentication-key 1 md5 072C285F4D06 7 ntp authenticate ntp trusted-key 1 ntp server 1.1.1.1 key 1
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-002046
- Version
- CISR-ND-000101
- Vuln IDs
-
- V-74043
- Rule IDs
-
- SV-88717r2_rule
Checks: C-74133r3_chk
Verify that at least two NTP servers are configured and that system clocks update the time every 24 hours. The configuration should look similar to the example below: ntp authentication-key 1 md5 072C285F4D06 7 ntp authenticate ntp trusted-key 1 ntp server 1.1.1.1 key 1 If there are not at least two NTP servers configured, and clocks are updated at least every 24 hours, this is a finding.
Fix: F-80585r3_fix
Configure the router to use NTP. The configuration should look similar to the example below: ntp authentication-key 1 md5 072C285F4D06 7 ntp authenticate ntp trusted-key 1 ntp server 1.1.1.1 key 1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000102
- Vuln IDs
-
- V-74045
- Rule IDs
-
- SV-88719r2_rule
Checks: C-74135r3_chk
Verify that at least two NTP servers are configured and that system clocks update the time every 24 hours. The configuration should look similar to the example below: ntp authentication-key 1 md5 072C285F4D06 7 ntp authenticate ntp trusted-key 1 ntp server 1.1.1.1 key 1 ntp server 2.2.2.2 key 1 If there are not at least two NTP servers configured, and clocks are updated at least every 24 hours, this is a finding.
Fix: F-80587r3_fix
Configure the router to use NTP. The configuration should look similar to the example below: ntp authentication-key 1 md5 072C285F4D06 7 ntp authenticate ntp trusted-key 1 ntp server 1.1.1.1 key 1 ntp server 2.2.2.2 key 1
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- CISR-ND-000103
- Vuln IDs
-
- V-74047
- Rule IDs
-
- SV-88721r2_rule
Checks: C-74137r4_chk
Verify that the Cisco IOS XE router time stamps for audit logs can be mapped to UTC or GMT by using the show logging command. The configuration should look similar to the following example: clock timezone MST -7 0 service timestamps datetime localtime If the time stamps cannot be map to UTC or GMT, this is a finding.
Fix: F-80589r3_fix
Configure the timezone for the local time, then map the time stamps back to UCT or GMT. The configuration should look similar to the example below: clock timezone MST -7 0 service timestamps datetime localtime
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001889
- Version
- CISR-ND-000104
- Vuln IDs
-
- V-74049
- Rule IDs
-
- SV-88723r2_rule
Checks: C-74139r3_chk
Verify that the time stamps for audit records have a granularity of one second. The configuration should look similar to the example below: service timestamps debug datetime msec service timestamps log datetime year If the time stamps have a granularity larger than one second, this is a finding.
Fix: F-80591r3_fix
Configure the Cisco IOS XE router to have a granularity of one second for audit log time stamps. The configuration should look like the example below: service timestamps debug datetime msec service timestamps log datetime year
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- CISR-ND-000112
- Vuln IDs
-
- V-74051
- Rule IDs
-
- SV-88725r2_rule
Checks: C-74141r3_chk
Verify that the Cisco IOS XE router is configured to secure connections. The configuration should look similar to the example below: ip ssh version 2 ip ssh dh min size 2048 ntp authentication-key 1 md5 075B706F471A1A0A464058 7 ntp authenticate ntp trusted-key 1 ntp peer 192.168.2.1 key 1 snmp-server user new-user new-group v3 auth sha password priv aes 128 Cisco If the Cisco IOS XE router is not configured to secure all management connections, this is a finding.
Fix: F-80593r4_fix
Configure the Cisco IOS XE router so that connections are secure. The configuration should look similar to the example below: ip ssh version 2 ip ssh dh min size 2048 ntp authentication-key 1 md5 075B706F471A1A0A464058 7 ntp authenticate ntp trusted-key 1 ntp peer 192.168.2.1 key 1 snmp-server user new-user new-group v3 auth sha password priv aes 128 Cisco
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- CISR-ND-000117
- Vuln IDs
-
- V-74053
- Rule IDs
-
- SV-88727r2_rule
Checks: C-74143r3_chk
Verify that the Cisco IOS XE router is using SSHv2 for remote access. The configuration should look like the example below: ip ssh version 2 ! line vty 0 98 transport input ssh If secure applications are not being used, this is a finding.
Fix: F-80595r3_fix
Configure the Cisco IOS XE router to use SSHv2 for remote access. The configuration should look like the example below: ip ssh version 2 ! line vty 0 98 transport input ssh
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-003123
- Version
- CISR-ND-000118
- Vuln IDs
-
- V-74055
- Rule IDs
-
- SV-88729r2_rule
Checks: C-74145r3_chk
Verify that the Cisco IOS XE router is using SSHv2 for remote access. The configuration should look like the example below: ip ssh version 2 ! line vty 0 98 transport input ssh If secure applications are not being used, this is a finding.
Fix: F-80597r3_fix
Configure the Cisco IOS XE router to use SSHv2 for remote access. The configuration should look like the example below: ip ssh version 2 ! line vty 0 98 transport input ssh
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- CISR-ND-000119
- Vuln IDs
-
- V-74057
- Rule IDs
-
- SV-88731r2_rule
Checks: C-74147r3_chk
Determine whether control plane protection has been implemented on the Cisco IOS XE router by verifying traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class. The configuration should look similar to the following example: class-map match-any CoPP_UNDESIRABLE match access-group name CoPP_UNDESIRABLE class-map match-any CoPP_IMPORTANT match access-group name CoPP_IMPORTANT match protocol arp class-map match-all CoPP_DEFAULT match access-group name CoPP_DEFAULT policy-map CONTROL_PLANE_POLICY class CoPP_CRITICAL police 512000 8000 conform-action transmit exceed-action transmit class CoPP_IMPORTANT police 256000 4000 conform-action transmit exceed-action drop class CoPP_NORMAL police 128000 2000 conform-action transmit exceed-action drop class CoPP_UNDESIRABLE police 8000 1000 conform-action drop exceed-action drop class CoPP_DEFAULT police 64000 1000 conform-action transmit exceed-action drop If control plane protection has not been implemented, this is a finding. If control plane protection has been implemented but is not configured to verify traffic types have been classified based on importance levels and a policy has been configured to filter and rate limit the traffic according to each class, this is a finding.
Fix: F-80599r3_fix
Implement control plane protection by classifying traffic types based on importance and configure filters to restrict and rate limit the traffic directed to and processed by the route processor according to each class. The configuration would look similar to the one below: class-map match-any CoPP_UNDESIRABLE match access-group name CoPP_UNDESIRABLE class-map match-any CoPP_IMPORTANT match access-group name CoPP_IMPORTANT match protocol arp class-map match-all CoPP_DEFAULT match access-group name CoPP_DEFAULT policy-map CONTROL_PLANE_POLICY class CoPP_CRITICAL police 512000 8000 conform-action transmit exceed-action transmit class CoPP_IMPORTANT police 256000 4000 conform-action transmit exceed-action drop class CoPP_NORMAL police 128000 2000 conform-action transmit exceed-action drop class CoPP_UNDESIRABLE police 8000 1000 conform-action drop exceed-action drop class CoPP_DEFAULT police 64000 1000 conform-action transmit exceed-action drop
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000120
- Vuln IDs
-
- V-74059
- Rule IDs
-
- SV-88733r2_rule
Checks: C-74149r3_chk
Verify that the Cisco IOS XE router is configured with different privilege levels for different users. The configuration should look like the example below: username USER1 privilege 7 password 7 08751D6D000A061843595F username USER2 privilege 15 password 7 06525E02455D0A16544541 If different privilege levels are not defined, this is a finding.
Fix: F-80601r3_fix
Configure the Cisco IOS XE router with different privilege levels for different users. The configuration should look similar to the example below: username USER1 privilege 7 password 7 08751D6D000A061843595F username USER2 privilege 15 password 7 06525E02455D0A16544541
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000121
- Vuln IDs
-
- V-74061
- Rule IDs
-
- SV-88735r2_rule
Checks: C-74151r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits account modification. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account modification is not automatically audited, this is a finding.
Fix: F-80629r2_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000122
- Vuln IDs
-
- V-74063
- Rule IDs
-
- SV-88737r2_rule
Checks: C-74153r4_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits account modification. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account modification is not automatically audited, this is a finding.
Fix: F-80603r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000123
- Vuln IDs
-
- V-74065
- Rule IDs
-
- SV-88739r2_rule
Checks: C-74155r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits account logon. The configuration should look similar to the example below: logging userinfo ! login on-failure log login on-success log ! archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account logon is not automatically audited, this is a finding.
Fix: F-80605r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo ! login on-failure log login on-success log ! archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000124
- Vuln IDs
-
- V-74067
- Rule IDs
-
- SV-88741r2_rule
Checks: C-74157r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits privileged activities. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If privileged activities are not automatically audited, this is a finding.
Fix: F-80607r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000125
- Vuln IDs
-
- V-74069
- Rule IDs
-
- SV-88743r2_rule
Checks: C-74159r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits start and end times for administrator access. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If administrator access is not automatically audited, this is a finding.
Fix: F-80609r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000126
- Vuln IDs
-
- V-74071
- Rule IDs
-
- SV-88745r2_rule
Checks: C-74163r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits concurrent logons from different workstations. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If concurrent logons from different workstations are not automatically audited, this is a finding.
Fix: F-80611r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- CISR-ND-000127
- Vuln IDs
-
- V-74073
- Rule IDs
-
- SV-88747r2_rule
Checks: C-74165r3_chk
Review the Cisco IOS XE router configuration to determine if it automatically audits account creations, modifications, etc. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys If account creations, modification, etc. are not automatically audited, this is a finding.
Fix: F-80613r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CISR-ND-000128
- Vuln IDs
-
- V-74075
- Rule IDs
-
- SV-88749r2_rule
Checks: C-74167r4_chk
Verify that the Cisco IOS XE router is configured to send logs to a syslog server. The configuration should look similar to the example below: logging host 1.1.1.1 If it is not configured to send logs to a syslog server, this is a finding.
Fix: F-80615r3_fix
Configure the Cisco IOS XE router to enable syslog. The configuration should look similar to the example below: logging host 1.1.1.1
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000132
- Vuln IDs
-
- V-74077
- Rule IDs
-
- SV-88751r2_rule
Checks: C-74169r5_chk
Verify that the Cisco IOS XE router is configured to send logs to a syslog server. The configuration should look similar to the example below: logging host 1.1.1.1 logging facility local7 If it is not configured to send logs to a syslog server, this is a finding.
Fix: F-80617r3_fix
Configure the Cisco IOS XE router for auditing. The configuration should look similar to the example below: logging userinfo login on-failure log login on-success log archive log config logging enable logging size 1000 notify syslog contenttype plaintext hidekeys
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000134
- Vuln IDs
-
- V-74079
- Rule IDs
-
- SV-88753r2_rule
Checks: C-74171r3_chk
Verify that administrative accounts are configured on the authentication server. The configuration should look similar to the example below: aaa authentication login default radius radius server RADIUS1 address ipv4 1.1.1.1 key <pre-shared key> If administrative accounts are not configured on the authentication server, this is a finding.
Fix: F-80619r3_fix
Configure the Cisco IOS XE router to use multiple authentication servers. The configuration should look similar to the example below: aaa authentication login default radius radius server RADIUS1 address ipv4 1.1.1.1 key <pre-shared key>
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- CISR-ND-000138
- Vuln IDs
-
- V-74081
- Rule IDs
-
- SV-88755r2_rule
Checks: C-74173r3_chk
Verify that the Cisco IOS XE router has the event manager configured to do automated backups. The configuration should look similar to the example below: event manager applet backup-config event timer watchdog time 86400 action 1.0 cli command "enable" action 2.0 info type routername action 3.0 cli command "copy runn tftp://x.x.x.x/$_info_routername.cfg" pattern "Address" action 4.0 cli command "" pattern "Destination" action 5.0 cli command "" If the event manager is not configured for automated backups, this is a finding.
Fix: F-80621r3_fix
Configure the event manager for automated backups. The configuration should look similar to the example below: event manager applet backup-config event timer watchdog time 86400 action 1.0 cli command "enable" action 2.0 info type routername action 3.0 cli command "copy runn tftp://x.x.x.x/$_info_routername.cfg" pattern "Address" action 4.0 cli command "" pattern "Destination" action 5.0 cli command ""
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000141
- Vuln IDs
-
- V-74083
- Rule IDs
-
- SV-88757r2_rule
Checks: C-74175r3_chk
Review the router configuration to determine if a CA trust point has been configured. The CA trust point will contain the URL of the CA in which the router has enrolled with. Verify this is a DoD or DoD-approved CA. This will ensure the router has enrolled and received a certificate from a trusted CA. A remote end-point's certificate will always be validated by the router by verifying the signature of the CA on the certificate using the CA's public key, which is contained in the router's certificate it received at enrollment. The CA trust point configuration would look similar to the following example: crypto pki trustpoint APPROVED_CA enrollment url http://xxx.example.com If the router is not configured to obtain its public key certificates from an approved service provider, this is a finding.
Fix: F-80623r3_fix
Configure the router configuration to use CA trust point that is a DoD or DoD-approved CA. The CA trust point configuration would look similar to the following example: crypto pki trustpoint APPROVED_CA enrollment url http://xxx.example.com
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000142
- Vuln IDs
-
- V-74085
- Rule IDs
-
- SV-88759r2_rule
Checks: C-74177r3_chk
Verify that the Cisco IOS XE router is configured to send logs to a syslog server. The configuration should look similar to the example below: Logging trap information logging host x.x.x.x If the router is not configured to send log data to the syslog server, this is a finding.
Fix: F-80625r3_fix
Add the following commands to the router configuration to send log data to the syslog server: logging trap information logging host x.x.x.x
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CISR-ND-000143
- Vuln IDs
-
- V-74087
- Rule IDs
-
- SV-88761r2_rule
Checks: C-74179r3_chk
Verify that the Cisco IOS XE router is configured to send traps to the SNMP manager. The SNMP configuration should contain commands similar to the example below: snmp-server enable traps snmp-server host x.x.x.x version 3 auth xxxxxxxxx snmp-server user TRAP_NMS1 TRAP_GROUP v3 encrypted auth sha AAAAPPPP priv aes 128 EEEEPPPP Note: In the example above, the following values are used hypothetically: Username for SNMP Manager: TRAP_NMS1 Group for SNMP Manager: TRAP_GROUP User password for HMAC authentication: AAAAPPPP User password for encryption: EEEEPPPP AES key length: 128 If the router is not configured to send traps to the SNMP manager, this is a finding.
Fix: F-80627r2_fix
Configure the Cisco IOS XE router to send traps to the SNMP manager. The SNMP configuration should contain commands similar to the example below: snmp-server enable traps snmp-server host x.x.x.x version 3 auth xxxxxxxxx snmp-server user TRAP_NMS1 TRAP_GROUP v3 encrypted auth sha AAAAPPPP priv aes 128 EEEEPPPP Note: In the example above, the following values are used hypothetically: Username for SNMP Manager: TRAP_NMS1 Group for SNMP Manager: TRAP_GROUP User password for HMAC authentication: AAAAPPPP User password for encryption: EEEEPPPP AES key length: 128