UCF STIG Viewer Logo

The Cisco router must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215813 CISC-ND-000150 SV-215813r531083_rule Medium
Description
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.
STIG Date
Cisco IOS XE Router NDM Security Technical Implementation Guide 2021-11-18

Details

Check Text ( C-17052r287478_chk )
Review the Cisco router configuration to verify that it enforces the limit of three consecutive invalid logon attempts as shown in the example below.

login block-for 900 attempts 3 within 120

Note: The configuration example above will block any login attempt for 15 minutes after three consecutive invalid logon attempts within a two-minute period.

If the Cisco router is not configured to enforce the limit of three consecutive invalid logon attempts, this is a finding.
Fix Text (F-17050r287479_fix)
Configure the Cisco router to enforce the limit of three consecutive invalid logon attempts as shown in the example below.

R2(config)#login block-for 900 attempts 3 within 120