Skip to main content
CUI

Vulnerability V-215815

Back

V-215815

CAT II

The Cisco device must be configured to audit all administrator activity.

Ships Affected
1
Total Findings
1
Open
0
Closed
1

Check Text

Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example below. hostname R1 ! logging userinfo ! … … … archive log config logging enable ! Note: The logging userinfo global configuration command will generate a log when a user increases his or her privilege level. If logging of administrator activity is not configured, this is a finding.

Fix Text

Configure the router to log administrator activity as shown in the example below. R1(config)#logging userinfo R1(config)#archive R1(config-archive)#log config R1(config-archive-log-cfg)#logging enable R1(config-archive-log-cfg)#logging size 1000 R1(config-archive-log-cfg)#notify syslog contenttype plaintext R1(config-archive-log-cfg)#hidekeys R1(config-archive-log-cfg)#end

STIG Reference

STIG
Cisco IOS XE Router NDM Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-215815r1186328_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONTPOINTGTWYRTR/Checklist/MONTPOINTGTWYRTR_CiscoXERtrNDM_V3R5_20251023-150045.ckl
Unassigned 2026-01-14T12:57:25.013310 View in Context
CUI