STIGQter STIGQter: STIG Summary: Cisco IOS XE Switch NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity.

DISA Rule

SV-220544r531084_rule

Vulnerability Number

V-220544

Group Title

SRG-APP-000190-NDM-000267

Rule Version

CISC-ND-000720

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Set the idle timeout value to "10" minutes or less on all configured login classes as shown in the example below:

SW1(config)#line vty 0 4
SW1(config-line)#exec-timeout 10 0
SW1(config-line)#exit
SW1(config)#line con 0
SW1(config-line)#exec-timeout 10 0
SW1(config-line)#exit
SW2(config)#ip http timeout-policy idle 600 life nnnn requests nn

Check Contents

Review the Cisco switch configuration to verify that all network connections associated with a device management have an idle timeout value set to 10 minutes or less as shown in the following example:

ip http secure-server
ip http timeout-policy idle 600 life nnnn requests nn



line con 0
exec-timeout 10 0
line vty 0 4
exec-timeout 10 0

If the Cisco switch is not configured to terminate all network connections associated with a device management after "10" minutes of inactivity, this is a finding.

Vulnerability Number

V-220544

Documentable

False

Rule Version

CISC-ND-000720

Severity Override Guidance

Review the Cisco switch configuration to verify that all network connections associated with a device management have an idle timeout value set to 10 minutes or less as shown in the following example:

ip http secure-server
ip http timeout-policy idle 600 life nnnn requests nn



line con 0
exec-timeout 10 0
line vty 0 4
exec-timeout 10 0

If the Cisco switch is not configured to terminate all network connections associated with a device management after "10" minutes of inactivity, this is a finding.

Check Content Reference

M

Target Key

4067

Comments