STIGQter STIGQter: STIG Summary: WLAN Controller Security Technical Implementation Guide (STIG) Version: 6 Release: 15 Benchmark Date: 26 Apr 2019:

The network device must be configured for a maximum number of unsuccessful SSH logon attempts set at 3 before resetting the interface.

DISA Rule

SV-5613r4_rule

Vulnerability Number

V-5613

Group Title

SSH login attempts value is greater than 3.

Rule Version

NET1646

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to require a maximum number of unsuccessful SSH logon attempts at 3.

Check Contents

Review the configuration and verify the number of unsuccessful SSH logon attempts is set at 3.

If the device is not configured to reset unsuccessful SSH logon attempts at 3, this is a finding.

Vulnerability Number

V-5613

Documentable

False

Rule Version

NET1646

Severity Override Guidance

Review the configuration and verify the number of unsuccessful SSH logon attempts is set at 3.

If the device is not configured to reset unsuccessful SSH logon attempts at 3, this is a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

1538

Comments