STIGQter STIGQter: STIG Summary: WLAN Controller Security Technical Implementation Guide (STIG) Version: 6 Release: 15 Benchmark Date: 26 Apr 2019:

The network device must not use the default or well-known SNMP community strings public and private.

DISA Rule

SV-3210r4_rule

Vulnerability Number

V-3210

Group Title

Using default SNMP community names.

Rule Version

NET1665

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure unique SNMP community strings replacing the default community strings.

Check Contents

Review the network devices configuration and verify if either of the SNMP community strings "public" or "private" is being used.

If default or well-known community strings are used for SNMP, this is a finding.

Vulnerability Number

V-3210

Documentable

False

Rule Version

NET1665

Severity Override Guidance

Review the network devices configuration and verify if either of the SNMP community strings "public" or "private" is being used.

If default or well-known community strings are used for SNMP, this is a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

1538

Comments