SV-75327r1_rule
V-60869
SRG-APP-000411-NDM-000330
AMLS-NM-000340
CAT II
10
Configure the network device to use secure protocols instead of their unsecured counterparts.
Configuration Example:
Disable unsecure protocols.
configure
management telnet
shutdown
exit
management api http-commands
no protocol http
protocol https
exit
Other protocols (FTP) can be denied using AAA and RBAC. For connections that require use of these maintenance protocols, creation of SSH tunnels can fulfill this security requirement. This is summarized here and available at length in the Common Criteria guidance document.
Configuration Example:
management ssh
tunnel NEW
local port 514
ssh-server syslogServer user authuser port 22
remote host localhost port 514
no shutdown
Determine if the network device uses secure protocols instead of their unsecured counterparts.
If any unsecured maintenance protocols are in use (e.g., telnet, FTP, HTTP) and these protocols are not wrapped in a secure tunnel, this is a finding.
Validate by checking that unsecure protocols are either disabled or wrapped in SSH tunnels.
Executing a "show run" command will provide a means to validate this config. From the output of this command, verify that there is no statement enabling telnet, there is no statement enabling FTP, and there is no statement enabling the API, or the API is configured to use only HTTPS.
V-60869
False
AMLS-NM-000340
Determine if the network device uses secure protocols instead of their unsecured counterparts.
If any unsecured maintenance protocols are in use (e.g., telnet, FTP, HTTP) and these protocols are not wrapped in a secure tunnel, this is a finding.
Validate by checking that unsecure protocols are either disabled or wrapped in SSH tunnels.
Executing a "show run" command will provide a means to validate this config. From the output of this command, verify that there is no statement enabling telnet, there is no statement enabling FTP, and there is no statement enabling the API, or the API is configured to use only HTTPS.
M
2825