V-215854
CAT IThe Cisco router must be configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access.
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 0
- Closed
- 1
Check Text
Review the Cisco router configuration to verify the device is configured to use at least two authentication servers as primary source for authentication as shown in the following example:
aaa new-model
!
aaa authentication CONSOLE group radius local
aaa authentication login LOGIN_AUTHENTICATION group radius local
…
…
…
ip http authentication aaa login-authentication LOGIN_AUTHENTICATION
ip http secure-server
…
…
…
radius-server host x.x.x.x auth-port 1812 acct-port 1813 key xxxxxx
radius-server host x.x.x.x auth-port 1812 acct-port 1813 key xxxxxx
…
…
…
line con 0
exec-timeout 5 0
login authentication CONSOLE
line vty 0 1
exec-timeout 5 0
login authentication LOGIN_AUTHENTICATION
If the Cisco router is not configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access, this is a finding.
Fix Text
Step 1: Configure the Cisco router to use at least two authentication servers as shown in the following example:
R4(config)#radius host 10.1.48.2 key xxxxxx
R4(config)#radius host 10.1.48.3 key xxxxxx
Step 2: Configure the authentication order to use the authentication servers as primary source for authentication as shown in the following example:
R4(config)#aaa authentication CONSOLE group radius local
R4(config)#aaa authentication login LOGIN_AUTHENTICATION group radius local
Step 3: Configure all network connections associated with a device management to use the authentication servers for the purpose of login authentication.
R4(config)#line vty 0 1
R4(config-line)#login authentication LOGIN_AUTHENTICATION
R4(config-line)#exit
R4(config)#line con 0
R4(config-line)#login authentication CONSOLE
R4(config-line)#exit
R4(config)#ip http authentication aaa login-authentication LOGIN_AUTHENTICATION
STIG Reference
- STIG
- Cisco IOS XE Router NDM Security Technical Implementation Guide
- Version
- 3
- Release
- 7
- Rule ID
- SV-215854r1156415_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONTPOINTGTWYRTR/Checklist/MONTPOINTGTWYRTR_CiscoXERtrNDM_V3R5_20251023-150045.ckl | Unassigned | 2026-01-14T12:57:25.013310 | View in Context |