SV-3069r5_rule
V-3069
Management connections must be secured by FIPS 140-2.
NET1638
CAT II
10
Configure the network device to use secure protocols with FIPS 140-2 validated cryptographic modules.
Review the network device configuration to verify only secure protocols using FIPS 140-2 validated cryptographic modules are used for any administrative access. Some of the secure protocols used for administrative and management access are listed below. This list is not all inclusive and represents a sample selection of secure protocols.
-SSHv2
-SCP
-HTTPS using TLS
If management connections are established using protocols without FIPS 140-2 validated cryptographic modules, this is a finding.
V-3069
False
NET1638
Review the network device configuration to verify only secure protocols using FIPS 140-2 validated cryptographic modules are used for any administrative access. Some of the secure protocols used for administrative and management access are listed below. This list is not all inclusive and represents a sample selection of secure protocols.
-SSHv2
-SCP
-HTTPS using TLS
If management connections are established using protocols without FIPS 140-2 validated cryptographic modules, this is a finding.
M
Information Assurance Officer
1538