STIGQter STIGQter: STIG Summary: Cisco IOS XE Switch NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.

DISA Rule

SV-220555r531084_rule

Vulnerability Number

V-220555

Group Title

SRG-APP-000411-NDM-000330

Rule Version

CISC-ND-001200

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure SSH to use FIPS-validated HMAC for remote maintenance sessions as shown in the following example:

SW1(config)#ip ssh version 2
SW1(config)#iip ssh server algorithm mac hmac-sha2-512 hmac-sha2-256

Check Contents

Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below:

ip ssh version 2
ip ssh server algorithm mac hmac-sha2-512 hmac-sha2-256

If the Cisco switch is not configured to use FIPS-validated HMAC to protect the integrity of remote maintenance sessions, this is a finding.

Vulnerability Number

V-220555

Documentable

False

Rule Version

CISC-ND-001200

Severity Override Guidance

Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below:

ip ssh version 2
ip ssh server algorithm mac hmac-sha2-512 hmac-sha2-256

If the Cisco switch is not configured to use FIPS-validated HMAC to protect the integrity of remote maintenance sessions, this is a finding.

Check Content Reference

M

Target Key

4067

Comments