UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The information system must initiate a session lock after the organization-defined time period of inactivity.


Overview

Finding ID Version Rule ID IA Controls Severity
V-30371 SRG-NET-NA SV-40035r1_rule Medium
Description
As you make configuration changes to a router, switch, or firewall, they are applied to the running configuration. There is nothing lost. If the user has not saved the running configuration to non-volatile random-access memory (NVRAM), it can be done by logging back in. Furthermore, a desktop or laptop is used to connect to the router, switch, or firewall. The routers, switches, and firewalls have the idle timeout capability where the session is taken down after a period of inactivity. This is a simple and straightforward solution.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None