CISC-ND-000010 - The Cisco router must be configured to limit the number of concurrent management sessions to an organization-defined number - session-limit

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to denial-of-service (DoS) attacks.

This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions.

Solution

Configure the router to limit the number of concurrent management sessions to an organization-defined number as shown in the example below.

ip http max-connections 2
line vty 0 4
session-limit 2

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS-XE_Router_Y20M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000054, Rule-ID|SV-215807r531083_rule, STIG-ID|CISC-ND-000010, STIG-Legacy|SV-105327, STIG-Legacy|V-96189, Vuln-ID|V-215807

Plugin: Cisco

Control ID: cc087413626cbdd14fe3ca2fc0dbfcf0958e9f6ab6a41bd5bbf71676d006bbe3