UCF STIG Viewer Logo

The Cisco ISR 4000 Series router must generate audit records when successful/unsuccessful logon attempts occur.


Overview

Finding ID Version Rule ID IA Controls Severity
V-74065 CISR-ND-000123 SV-88739r1_rule Medium
Description
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
STIG Date
Cisco IOS XE Release 3 NDM Security Technical Implementation Guide 2017-10-02

Details

Check Text ( C-74155r2_chk )
Review the Cisco ISR 4000 Series router configuration to determine if it automatically audits account logon. The configuration should look similar to the example below:

logging userinfo
!
login on-failure log
login on-success log
!
archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys

If account logon is not automatically audited, this is a finding.
Fix Text (F-80605r2_fix)
Configure the Cisco ISR 4000 Series router for auditing. The configuration should look similar to the example below:

logging userinfo
!
login on-failure log
login on-success log
!
archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys