1.4.3.5 Ensure 'aaa authentication ssh console' is configured correctly

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Authenticates users who access the device using SSH.

Rationale:

Using AAA authentication for interactive management access to the device provides consistent, centralized control of your network. The default under AAA (local or network) is to require users to log in using a valid user name and password. This rule applies for both local and network AAA. Fallback mode should also be enabled to allow emergency access to the firewall in the event that the AAA server was unreachable, by utilizing the LOCAL keyword after the AAA server-tag.

Solution

Configure the aaa authentication ssh using the TACACS+ server-group as primary method and the local database as backup method.

HOSTNAME(CONFIG)#AAA AUTHENTICATION SSH CONSOLE _<server-group_name>_ LOCAL

See Also

https://workbench.cisecurity.org/files/1903

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2

Plugin: Cisco

Control ID: 60c4f8b1a2c31d824e49bbba44c3692b8b10b9556be2671cc668d3e2d6c53716