Details
Account management, as a whole, ensures access to the network device is being controlled in a secure manner by granting access to only authorized personnel. Auditing account disabling actions will support account management procedures. When device management accounts are disabled, user or service accessibility may be affected. Auditing also ensures authorized active accounts remain enabled and available for use when required.
Solution
Configure the switch to log account disabling using the following steps:
Step 1: Configure the AAA servers as shown in the example below:
SW1(config)# radius-server host 10.1.48.10
SW1(config)# radius-server host 10.1.48.12
Step 2: Configure an AAA server group as shown in the example below:
SW1(config)# aaa group server radius RADIUS_SERVERS
SW1(config-radius)# server 10.1.48.10
SW1(config-radius)# server 10.1.48.12
SW1(config-radius)# exit
Step 3: Enable AAA accounting as shown in the example below:
SW1(config)# aaa accounting default group RADIUS_SERVERS
SW1(config)# end
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: Access Control.This control applies to the following type of system Cisco.
References
- 800-53|AC-2(4)
- CAT|II
- CCI|CCI-001404
- Rule-ID|SV-220477r604141_rule
- STIG-ID|CISC-ND-000110
- STIG-Legacy|SV-110601
- STIG-Legacy|V-101497
- Vuln-ID|V-220477
Comments
Please sign in to leave a comment.