UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IAO will ensure the authentication server is connected to the management network.


Overview

Finding ID Version Rule ID IA Controls Severity
V-25896 NET0435 SV-32518r1_rule Medium
Description
Using standardized authentication protocols such as RADIUS, TACACS+, and Kerberos, an authentication server provides centralized and robust authentication services for the management of network components. In order to control access to the servers as well as monitor traffic to them, the authentication servers should only be connected to the management network.
STIG Date
Network Devices Security Technical Implementation Guide 2017-12-07

Details

Check Text ( C-32827r1_chk )
Review the network topology to determine what network they are connected to. Verify that they are not dual-homed by physically inspecting the device’s LAN connection
Fix Text (F-28938r1_fix)
Connect the authentication servers to only the management network.