UCF STIG Viewer Logo

The Cisco IOS XE router must generate audit records when successful/unsuccessful logon attempts occur.


Overview

Finding ID Version Rule ID IA Controls Severity
V-74065 CISR-ND-000123 SV-88739r2_rule Medium
Description
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit records can be generated from various components within the network device (e.g., module or policy filter).
STIG Date
Cisco IOS XE Release 3 NDM Security Technical Implementation Guide 2018-12-20

Details

Check Text ( C-74155r3_chk )
Review the Cisco IOS XE router configuration to determine if it automatically audits account logon.

The configuration should look similar to the example below:

logging userinfo
!
login on-failure log
login on-success log
!
archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys

If account logon is not automatically audited, this is a finding.
Fix Text (F-80605r3_fix)
Configure the Cisco IOS XE router for auditing.

The configuration should look similar to the example below:

logging userinfo
!
login on-failure log
login on-success log
!
archive
log config
logging enable
logging size 1000
notify syslog contenttype plaintext
hidekeys