Skip to main content
CUI

Vulnerability V-215810

Back

V-215810

CAT II

The Cisco router must be configured to automatically audit account disabling actions.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Review the router configuration to determine if it automatically audits account disabling. The configuration should look similar to the example below: archive log config logging enable Note: Configuration changes can be viewed using the show archive log config all command. If account disabling is not automatically audited, this is a finding.

Fix Text

Configure the router to log account disabling using the following commands: R4(config)#archive R4(config-archive)#log config R4(config-archive-log-cfg)#logging enable R4(config-archive-log-cfg)#logging size 1000 R4(config-archive-log-cfg)#notify syslog contenttype plaintext R4(config-archive-log-cfg)#hidekeys R4(config-archive-log-cfg)#end

STIG Reference

STIG
Cisco IOS XE Router NDM Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-215810r1186324_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONTPOINTGTWYRTR/Checklist/MONTPOINTGTWYRTR_CiscoXERtrNDM_V3R5_20251023-150045.ckl
Unassigned 2026-01-14T12:57:25.013310 View in Context
CUI