UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must log all messages except debugging and send all log data to a syslog server.


Overview

Finding ID Version Rule ID IA Controls Severity
V-4584 NET1021 SV-4584r3_rule ECAT-1 ECAT-2 ECSC-1 Low
Description
Logging is a critical part of router security. Maintaining an audit trail of system activity logs (syslog) can help identify configuration errors, understand past intrusions, troubleshoot service disruptions, and react to probes and scans of the network. Syslog levels 0-6 are the levels required to collect the necessary information to help in the recovery process.
STIG Date
Perimeter Router Security Technical Implementation Guide 2015-07-01

Details

Check Text ( C-3950r6_chk )
Review the network device configuration to ensure all messages up to and including severity level 6 (informational) are logged and sent to a syslog server.

Severity Level Message Type

0 Emergencies
1 Alerts
2 Critical
3 Errors
4 Warning
5 Notifications
6 Informational
7 Debugging

If logging does not capture of up severity level 6, this is a finding.
Fix Text (F-4517r6_fix)
Configure the network device to log all messages except debugging and send all log data to a syslog server.