Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-68087 | AADC-NM-000118 | SV-82577r1_rule | Medium |
Description |
---|
If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions. Telnet is an unsecure protocol; use SSH instead. Note: This requirement does not refer to the device accepting incoming Telnet connections (server), but instead being used as an originator of Telnet requests (client). This is the exec level command "telnet". |
STIG | Date |
---|---|
A10 Networks ADC NDM Security Technical Implementation Guide | 2016-04-15 |
Check Text ( C-68647r1_chk ) |
---|
Determine if any operators have used Telnet. Evidence of the use of Telnet will be in the audit log. The following command shows any instances of the word "telnet" in the audit log: show audit | inc telnet If the log shows the use of the Telnet command, this is a finding. |
Fix Text (F-74201r1_fix) |
---|
The device has a Telnet client that is available at the privileged exec level. Do not use it; use SSH from a management workstation instead. |