Logo
Main site Submit a request Sign in
  1. Help Central | G5 Cyber Security
  2. Security Hardening
  3. Tenable Cisco Firepower Threat Defense Best Practices

Tenable Cisco Firepower Threat Defense Best Practices

Follow New articles New articles and comments
  • Ensure 'aaa local authentication max failed attempts' is set to your organization's poicy
  • Ensure 'console session timeout' is set to organizational policy
  • Ensure 'EIGRP authentication' is enabled
  • Ensure 'Failover' is enabled
  • Ensure 'Host Name' is set
  • Ensure 'HTTP session timeout' is set to organzational policy
  • Ensure 'HTTP source restriction' is set to an authorized IP address
  • Ensure 'Image Authenticity' is correct
  • Ensure 'Image Integrity' is correct
  • Ensure 'ip verify' is set to 'reverse-path' for untrusted interfaces
  • Ensure 'logging buffer size' is greater than or equal to '524288' bytes (512kb)
  • Ensure 'logging buffered severity ' is greater than or equal to '3'
  • Ensure 'logging to monitor' is disabled
  • Ensure 'logging to monitor' is disabled - show logging
  • Ensure 'logging to Serial console' is disabled
  • Ensure 'logging trap severity ' is greater than or equal to '5'
  • Ensure 'logging trap' is enabled
  • Ensure 'logging with timestamps' is enabled
  • Ensure 'logging with timestamps' is enabled - show logging
  • Ensure 'logging' is enabled
  • Ensure 'noproxyarp' is enabled for untrusted interfaces
  • Ensure 'OSPF authentication' is enabled
  • Ensure 'Password Policy' is enabled - minimum-length
  • Ensure 'RIP authentication' is enabled
  • Ensure 'SNMP community string' is not the default string
  • Ensure 'SNMP traps' is enabled - authentication
  • Ensure 'SNMP traps' is enabled - coldstart
  • Ensure 'SNMP traps' is enabled - linkdown
  • Ensure 'SNMP traps' is enabled - linkup
  • Ensure 'snmp-server group' is set to 'v3 priv'
  • 1
  • 2
  • ›
  • »

© Help Central | G5 Cyber Security