SV-220500r604141_rule
V-220500
SRG-APP-000395-NDM-000310
CISC-ND-001130
CAT II
10
Configure the Cisco switch to authenticate SNMP messages as shown in the example below:
SW1(config)# snmp-server user NETOPS auth sha xxxxxxxxxxxxxxxxx
SW1(config)# snmp-server host 10.1.48.10 traps version 3 auth NETOPS
Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below:
snmp-server user NETOPS network-operator auth sha 0xb40efa3f311006de39b9d0725e663277d84ca332 localizedkey
snmp-server host 10.1.48.10 traps version 3 auth NETOPS
Authentication used by the SNMP users can be viewed via the show snmp user command as shown in the example below:
SW1# show snmp user
______________________________________________________________
SNMP USERS
______________________________________________________________
User Auth Priv(enforce) Groups acl_filter
____ ____ ___________ ______ __________
NETOPS sha no network-operator
If the Cisco switch is not configured to authenticate SNMP messages using a FIPS-validated HMAC, this is a finding.
V-220500
False
CISC-ND-001130
Review the Cisco switch configuration to verify that it is compliant with this requirement as shown in the example below:
snmp-server user NETOPS network-operator auth sha 0xb40efa3f311006de39b9d0725e663277d84ca332 localizedkey
snmp-server host 10.1.48.10 traps version 3 auth NETOPS
Authentication used by the SNMP users can be viewed via the show snmp user command as shown in the example below:
SW1# show snmp user
______________________________________________________________
SNMP USERS
______________________________________________________________
User Auth Priv(enforce) Groups acl_filter
____ ____ ___________ ______ __________
NETOPS sha no network-operator
If the Cisco switch is not configured to authenticate SNMP messages using a FIPS-validated HMAC, this is a finding.
M
4066