UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The IAO will ensure that all in-band management connections to the device require authentication.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3175 NET1636 SV-3175r9_rule ECSC-1 High
Description
Devices protected with weak password schemes or no password at all, provide the opportunity for anyone to crack the password or gain access to the device and cause network, device, or information damage or denial of service.
STIG Date
WLAN Bridge Security Technical Implementation Guide 2011-10-10

Details

Check Text ( C-3516r5_chk )
Verify that all in-band management connections require authentication.
Fix Text (F-3200r4_fix)
Configure authentication for all in-band management connections.