STIGQter STIGQter: STIG Summary: Cisco IOS XR Router NDM Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 24 Jan 2020: The Cisco router must employ automated mechanisms to assist in the tracking of security incidents.

DISA Rule

SV-105631r1_rule

Vulnerability Number

V-96493

Group Title

SRG-APP-000516-NDM-000342

Rule Version

CISC-ND-001430

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to send log messages to the syslog server as shown in the example below.

RP/0/0/CPU0:R3(config)#logging 10.1.3.22 severity info

Check Contents

The Cisco router is not compliant with this requirement. However, the risk associated with this requirement can be fully mitigated if the router is configured to send logs to a syslog server that can be used to assist in the tracking of security incidents.

Verify that the router is configured to send logs to a syslog server. The configuration should look similar to the example below:

logging 10.1.3.22 vrf default severity info

If the router is not configured to send log messages to a syslog server, this is a finding.

Vulnerability Number

V-96493

Documentable

False

Rule Version

CISC-ND-001430

Severity Override Guidance

The Cisco router is not compliant with this requirement. However, the risk associated with this requirement can be fully mitigated if the router is configured to send logs to a syslog server that can be used to assist in the tracking of security incidents.

Verify that the router is configured to send logs to a syslog server. The configuration should look similar to the example below:

logging 10.1.3.22 vrf default severity info

If the router is not configured to send log messages to a syslog server, this is a finding.

Check Content Reference

M

Target Key

3475

Comments