1.4.1 If SNMPv2 is in use, use a Complex Community String

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SNMP v2 while similar to v1 aside from adding support for 64 bit counters and the ability to use complex strings.

Rationale:

Utilizing complex strings with SNMPv2 is no different then using complex passwords. By using the complex string you are making it more difficult for an attacker to guess the string. Strings should not contain dictionary words or rely on 'l33t-speak' spelling. Keep in mind that SNMPv2 is a clear-text protocol, so is subject to interception. This means that these strings are passed in clear-text during SNMPv2 operations, so can be 'harvested' by a well-positioned attacker. Also SNMP results are susceptible to capture or modification in transit.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

switch(config)# snmp-server community <SomeComplexString> ro

See Also

https://workbench.cisecurity.org/files/3102