1.1.5 Set 'login authentication for 'ip http'

Information

If account management functions are not automatically enforced, an attacker could gain privileged access to a vital element of the network security architecture

Configure the device to enforce authentication for the HTTP server (ip http) by defining a valid login method. This ensures that only authorized users can access the device's web-based management interface. Use AAA (Authentication, Authorization, and Accounting) or a predefined local username and password database to enforce login authentication

Solution

Configure management lines to require login using the default or a named AAA authentication list. This configuration must be set individually for all line types.

hostname#(config)ip http secure-server
hostname#(config)ip http authentication {default | _aaa\\_list\\_name_}

Impact:

Enabling Cisco AAA 'line login' is significantly disruptive as former access methods are immediately disabled. Therefore, before enabling Cisco AAA 'line login', the organization should plan and implement authentication logins and passwords, challenges and responses, and token technologies.

See Also

https://workbench.cisecurity.org/benchmarks/22550

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-2(1), CSCv7|16.2

Plugin: Cisco

Control ID: d919d649976634ea08357400d74bb10da2fea1817487a3c7cb74ae3768458616