1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctly

Information

Authenticates users who access the device using SSH.

Rationale:

Using AAA authentication for interactive management access to the device provides consistent, centralized control of your network. The default under AAA (local or network) is to require users to log in using a valid user name and password. This rule applies for both local and network AAA. Fallback mode should also be enabled to allow emergency access to the firewall in the event that the AAA server was unreachable, by utilizing the LOCAL keyword after the AAA server-tag.

Solution

Configure the aaa authentication ssh using the TACACS+ server-group as primary method and the local database as backup method.

hostname(config)#aaa authentication ssh console <server-group_name> local

Default Value:

The aaa authentication ssh console is disabled by default.

See Also

https://workbench.cisecurity.org/files/3246

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(9), CSCv7|4.3

Plugin: Cisco

Control ID: e28e68c8bd6a1c78e57ee35a41f1aff042fac8b6b508803b7de8e759fb997516