1.1.2.1 vty line authentication

Information

Authenticate management access to the network devices. Typically a central authentication store combined with a fallback mechanism should be implemented to allow emergency access, in case the central authentication servers are not available.

Rationale:

Management access to network devices must be authenticated. The default under AAA (local or network) is to require users to log in using a valid user name and password. This rule applies for both local and network AAA. Fallback mode should also be enabled to allow emergency access to the router or switch in the event that the AAA server was unreachable.

Impact:

If no authentication is implemented, any user with network reachability to the management interface can access network devices and change their configuration.

Solution

Configure central authentication for vty lines as follows:

aaa authentication login default group <servergroup>

Default Value:

By default local authentication is configured:

switch# show run all | i 'aaa authentication login'

aaa authentication login default local

aaa authentication login console local

aaa authentication login default fallback error local

aaa authentication login console fallback error local

See Also

https://workbench.cisecurity.org/benchmarks/6524

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(1), CSCv7|16.2

Plugin: Cisco

Control ID: 25bc7864581cea0f43885186f95b78442eb7fd8d3c728e09c09c1216f45e30be