UCF STIG Viewer Logo

The Cisco switch must be configured to off-load log records onto a different system than the system being audited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-220616 CISC-ND-001310 SV-220616r521267_rule Medium
Description
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
STIG Date
Cisco IOS Switch NDM Security Technical Implementation Guide 2021-06-02

Details

Check Text ( C-22331r507894_chk )
Review the Cisco switch configuration to verify that it off-loads log records onto a different system than the system being audited as shown in the example below:

logging trap notifications
logging x.x.x.x

Note: The default for sending log messages to the syslog server is informational (level 6); hence, the command logging trap information will not be seen in the configuration. The level of log messages sent to the syslog server can be verified using the show logging command.

If the Cisco switch is not configured to off-load log records onto a different system than the system being audited, this is a finding.
Fix Text (F-22320r507895_fix)
Configure the Cisco switch to send log records to a syslog server as shown in the example below:

SW4(config)#logging host x.x.x.x
SW4(config)#logging trap notifications