Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-3175 | NET1636 | SV-3175r9_rule | ECSC-1 | High |
Description |
---|
Devices protected with weak password schemes or no password at all, provide the opportunity for anyone to crack the password or gain access to the device and cause network, device, or information damage or denial of service. |
STIG | Date |
---|---|
WLAN Bridge Security Technical Implementation Guide | 2011-10-10 |
Check Text ( C-3516r5_chk ) |
---|
Verify that all in-band management connections require authentication. |
Fix Text (F-3200r4_fix) |
---|
Configure authentication for all in-band management connections. |