Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-25896 | NET0435 | SV-32518r1_rule | ECSC-1 | Medium |
Description |
---|
Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centralized and robust authentication services for the management of network components. In order to control access to the servers as well as monitor traffic to them, the authentication servers should only be connected to the management network. |
STIG | Date |
---|---|
Network Devices Security Technical Implementation Guide | 2013-10-08 |
Check Text ( C-32827r1_chk ) |
---|
Review the network topology to determine what network they are connected to. Verify that they are not dual-homed by physically inspecting the device’s LAN connection |
Fix Text (F-28938r1_fix) |
---|
Connect the authentication servers to only the management network. |