3.3.1.1 Set 'key chain'

Information

Define an authentication key chain to enable authentication for routing protocols. A key chain must have at least one key and can have up to 2,147,483,647 keys.

NOTE: Only DRP Agent, EIGRP, and RIPv2 use key chains.

Routing protocols such as DRP Agent, EIGRP, and RIPv2 use key chains for authentication.

Solution

Establish the key chain.

hostname(config)#key chain {<em>key-chain_name</em>}

Impact:

Organizations should plan and implement enterprise security policies that require rigorous authentication methods for routing protocols. Using 'key chains' for routing protocols enforces these policies.

See Also

https://workbench.cisecurity.org/benchmarks/22550

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AC-18, 800-53|AC-18(1), 800-53|AC-18(3), 800-53|CA-9, 800-53|CM-2, 800-53|CM-6, 800-53|CM-7, 800-53|CM-7(1), 800-53|CM-9, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.2

Plugin: Cisco

Control ID: bf3e4b895e1e2ea954fedbf0bdec4a80d2228d2152d7715c73a7989a38eb3555