V-220139
CAT IThe Cisco router must be configured to send log data to at least two syslog servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).
- Ships Affected
- 1
- Total Findings
- 1
- Open
- 1
- Closed
- 0
Check Text
Verify that the router is configured to send logs to at least two syslog servers. The configuration should look similar to the example below:
logging x.x.x.x
logging x.x.x.x
If the router is not configured to send log data to the syslog servers, this is a finding.
Fix Text
Configure the router to send log messages to the syslog servers as shown in the example below.
R4(config)#logging host x.x.x.x
R4(config)#logging host x.x.x.x
STIG Reference
- STIG
- Cisco IOS XE Router NDM Security Technical Implementation Guide
- Version
- 3
- Release
- 7
- Rule ID
- SV-220139r1137890_rule
All Occurrences
This vulnerability appears on 1 ship(s)
| Ship | Hull # | Source File | Status | Assigned To | Scan Date | Actions |
|---|---|---|---|---|---|---|
| USNS MONTFORD POINT | T-ESD-1 | _Reviewed/MONTPOINTGTWYRTR/Checklist/MONTPOINTGTWYRTR_CiscoXERtrNDM_V3R5_20251023-150045.ckl | Unassigned | 2026-01-14T12:57:25.013310 | View in Context |