1.5.4 Do not set 'RW' for any 'snmp-server community'

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Specifies read-write access. Authorized management stations can both retrieve and modify MIB objects.

Rationale:

Enabling SNMP read-write enables remote management of the device. Unless absolutely necessary, do not allow simple network management protocol (SNMP) write access.

Solution

Disable SNMP write access.


hostname(config)#no snmp-server community {write_community_string}

Impact:

To reduce the risk of unauthorized access, Organizations should disable the SNMP 'write' access for snmp-server community.

References:

http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s2.html#GUID-2F3F13E4-EE81-4590-871D-6AE1043473DE

See Also

https://workbench.cisecurity.org/files/2585

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-6, 800-53|IA-5, CSCv6|9.1

Plugin: Cisco

Control ID: 1b11dc48870f85cc6334785b2e1b63853c429da336608bda183e6e11edd0936c