V-215824
CAT IIThe Cisco router must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 1
- Closed
- 0
Check Text
Step 1: Review the Cisco router configuration to verify that a local account for last resort has been configured.
username xxxxxxxxxxx privilege nn common-criteria-policy PASSWORD_POLICY password xxxxxxxxxx
Note: The configured Common Criteria policy must be used when creating or changing the local account password as shown in the example above.
Step 2: Verify that local is defined after radius or tacas+ in the authentication order as shown in the example below.
aaa authentication login default group tacacs+ local
If the Cisco router is not configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable, this is a finding.
Fix Text
Step 1: Configure a local account as shown in the example below.
R2(config)#username xxxxxxxxx privilege nn secret xxxxxxx
Step 2: Configure the authentication order to use the local account if the authentication server is not reachable as shown in the following example:
R2(config)#aaa authentication login default group tacacs+ local
STIG Reference
- STIG
- Cisco IOS XE Router NDM Security Technical Implementation Guide
- Version
- 3
- Release
- 7
- Rule ID
- SV-215824r1051115_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONTPOINTGTWYRTR/Checklist/MONTPOINTGTWYRTR_CiscoXERtrNDM_V3R5_20251023-150045.ckl | Unassigned | 2026-01-14T12:57:25.013310 | View in Context |