CISC-ND-000010 - The Cisco router must be configured to limit the number of concurrent management sessions to an organization-defined number.

Information

Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to denial-of-service (DoS) attacks.

This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions.

Solution

Configure the router to limit the number of concurrent management sessions to an organization-defined number as shown in the example below.

R4(config)#ip http max-connections 2
R4(config)#line vty 0 1
R4(config-line)#transport input ssh
R4(config-line)#exit
R4(config)#line vty 2 4
R4(config-line)# transport input none
R4(config-line)#end

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Cisco_IOS-XE_Router_Y24M10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-10, CAT|II, CCI|CCI-000054, Rule-ID|SV-215807r960735_rule, STIG-ID|CISC-ND-000010, STIG-Legacy|SV-105327, STIG-Legacy|V-96189, Vuln-ID|V-215807

Plugin: Cisco

Control ID: a5167f8dfe82897893cc16d3aee05fb13abae22f8ae75bd8fd64b73b102386f3