STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 6 Security Technical Implementation Guide Version: 1 Release: 24 Benchmark Date: 25 Oct 2019: The snmpd service must use only SNMP protocol version 3 or newer.

DISA Rule

SV-50461r2_rule

Vulnerability Number

V-38660

Group Title

SRG-OS-999999

Rule Version

RHEL-06-000340

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit "/etc/snmp/snmpd.conf", removing any references to "v1", "v2c", or "com2sec". Upon doing that, restart the SNMP service:

# service snmpd restart

Check Contents

Verify the "snmp" package is installed:

# rpm -qa | grep -i snmp
net-snmp-5.7.1-31.2.x86_64.rpm

If the package is not installed, this is Not Applicable.

To ensure only SNMPv3 or newer is used, run the following command:

# grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#'

There should be no output.

If there is output, this is a finding.

Vulnerability Number

V-38660

Documentable

False

Rule Version

RHEL-06-000340

Severity Override Guidance

Verify the "snmp" package is installed:

# rpm -qa | grep -i snmp
net-snmp-5.7.1-31.2.x86_64.rpm

If the package is not installed, this is Not Applicable.

To ensure only SNMPv3 or newer is used, run the following command:

# grep 'v1\|v2c\|com2sec' /etc/snmp/snmpd.conf | grep -v '^#'

There should be no output.

If there is output, this is a finding.

Check Content Reference

M

Target Key

2367

Comments