UCF STIG Viewer Logo

The IAO will ensure that all in-band management connections to the device require authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3175 NET1636 SV-3175r9_rule ECSC-1 High
Description
Devices protected with weak password schemes or no password at all, provide the opportunity for anyone to crack the password or gain access to the device and cause network, device, or information damage or denial of service.
STIG Date
Free Space Optics Device Security Technical Implementation Guide 2011-10-07

Details

Check Text ( C-3516r5_chk )
Verify that all in-band management connections require authentication.
Fix Text (F-3200r4_fix)
Configure authentication for all in-band management connections.