UCF STIG Viewer Logo

The Cisco router must be configured to off-load log records onto a different system than the system being audited.


Overview

Finding ID Version Rule ID IA Controls Severity
V-96345 CISC-ND-001310 SV-105483r1_rule Medium
Description
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
STIG Date
Cisco IOS XE Router NDM Security Technical Implementation Guide 2019-12-20

Details

Check Text ( C-95181r1_chk )
Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example below.

logging trap notifications
logging x.x.x.x

Note: Default for sending log messages to the syslog server is informational (level 6); hence, the command logging trap informational will not be seen in the configuration. Level of log messages sent to the syslog server can be verified using the show logging command.

If the Cisco router is not configured to off-load log records onto a different system than the system being audited, this is a finding.
Fix Text (F-102021r1_fix)
Configure the Cisco router to send log records to a syslog server as shown in the example below.

R4(config)#logging host x.x.x.x
R4(config)#logging trap notifications