OS10-NDM-000930 - The Dell OS10 Switch must be configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access.

Information

Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.

Solution

Configure the network device to use at least two authentication servers. The authentication order is determined by the order in which the radius-server entries are configured.

OS10(config)#
OS10(config)# radius-server host 10.120.60.23 tls security-profile PROFILE1 key ******************
OS10(config)# radius-server host 10.120.80.82 tls security-profile PROFILE1 key ******************
OS10(config)#
OS10(config)# aaa authentication login default group radius local
OS10(config)# aaa authentication login console group radius local
OS10(config)#

Configure all network connections associated with a device management to use the authentication servers for the purpose of login authentication.
OS10(config)# aaa authentication login default group radius local

Optionally, configure the local console access to try local authentication before attempting remote authentication servers.
OS10(config)# aaa authentication login console local group radius

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Dell_OS10_Switch_Y24M12_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6(1), CAT|I, CCI|CCI-000370, Rule-ID|SV-270643r1052343_rule, STIG-ID|OS10-NDM-000930, Vuln-ID|V-270643

Plugin: Dell_OS10

Control ID: 8b1abc09ab7d3c0d1b66906122c0c564cb1956b4ff9c33916f99073fb70e8465