UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Cisco switch must be configured to off-load log records onto a different system than the system being audited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-220564 CISC-ND-001310 SV-220564r508638_rule Medium
Description
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
STIG Date
Cisco IOS XE Switch NDM Security Technical Implementation Guide 2021-09-16

Details

Check Text ( C-22279r508636_chk )
Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below:

logging trap notifications
logging x.x.x.x

Note: Default for sending log messages to the syslog server is informational (level 6); hence, the command logging trap informational will not be seen in the configuration. Level of log messages sent to the syslog server can be verified using the show logging command.

If the Cisco switch is not configured to off-load log records onto a different system than the system being audited, this is a finding.
Fix Text (F-22268r508637_fix)
Configure the Cisco switch to send log records to a syslog server as shown in the example below:

SW4(config)#logging host x.x.x.x
SW4(config)#logging trap notifications