UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

AAA Services must be configured to use IP segments separate from production VLAN IP segments.


Overview

Finding ID Version Rule ID IA Controls Severity
V-80941 SRG-APP-000516-AAA-000650 SV-95651r1_rule Medium
Description
When policy assessment and remediation have been implemented and the advanced AAA server dynamic VLAN is misconfigured, logical separation of the production VLAN may not be assured. Non-trusted resources are resources that are not authenticated in a NAC solution implementing only the authentication component of NAC. Non-trusted resources could become resources that have been authenticated but have not had a successful policy assessment when the automated policy assessment component has been implemented.
STIG Date
Authentication, Authorization, and Accounting Services (AAA) Security Requirements Guide 2019-12-12

Details

Check Text ( C-80679r1_chk )
If AAA Services are not used for 802.1x authentication or to authenticate privileged users for device management, this is not applicable.

Verify AAA Services are configured to use IP segments separate from production VLAN IP segments.

If AAA Services are not configured to use IP segments separate from production VLAN IP segments, this is a finding.
Fix Text (F-87797r1_fix)
Configure AAA Services to use IP segments separate from production VLAN IP segments.