STIGQter STIGQter: STIG Summary: Cisco IOS-XE Switch RTR Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Cisco switch must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.

DISA Rule

SV-221006r622190_rule

Vulnerability Number

V-221006

Group Title

SRG-NET-000019-RTR-000001

Rule Version

CISC-RT-000230

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Disable the auxiliary port.

SW2(config)#line aux 0
SW2(config-line)#no exec
SW2(config-line)#transport input none

Check Contents

Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it.

line aux 0
no exec

Note: Transport input none is the default; hence it will not be shown in the configuration.

If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.

Vulnerability Number

V-221006

Documentable

False

Rule Version

CISC-RT-000230

Severity Override Guidance

Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it.

line aux 0
no exec

Note: Transport input none is the default; hence it will not be shown in the configuration.

If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.

Check Content Reference

M

Target Key

4074

Comments