STIGQter STIGQter: STIG Summary: ForeScout CounterACT NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 12 Sep 2017:

CounterACT must authenticate any endpoint used for network management before establishing a local, remote, and/or network connection using cryptographically based bidirectional authentication.

DISA Rule

SV-90933r1_rule

Vulnerability Number

V-76245

Group Title

SRG-APP-000395-NDM-000310

Rule Version

CACT-NM-000039

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

1. Select Tools >> Options >> Switch.
2. Select a network device and review the "CLI" tab.
3. If the radio button for "Use CLI" is selected, select the "SSH" drop-down option and use proper credentials.

Check Contents

Review the CounterACT configuration to determine if the network device authenticates network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

1. Select Tools >> Options >> Switch.
2. Select a network device and review the "CLI" tab.
3. If the radio button for "Use CLI" is selected, verify that the "SSH" drop-down option is also selected. Repeat this process for each switch.

If anything other than SSH is selected, this is a finding.

Vulnerability Number

V-76245

Documentable

False

Rule Version

CACT-NM-000039

Severity Override Guidance

Review the CounterACT configuration to determine if the network device authenticates network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

1. Select Tools >> Options >> Switch.
2. Select a network device and review the "CLI" tab.
3. If the radio button for "Use CLI" is selected, verify that the "SSH" drop-down option is also selected. Repeat this process for each switch.

If anything other than SSH is selected, this is a finding.

Check Content Reference

M

Target Key

3225

Comments