Item Search

NameAudit NamePluginCategory
1.1.1 Enable 'aaa new-model'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

ACCESS CONTROL

1.1.1 Enable 'aaa new-model'CIS Cisco IOS XE 16.x v2.2.0 L1Cisco

ACCESS CONTROL

1.1.12 - AirWatch - Turn off VPN when not neededAirWatch - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.1.13 - AirWatch - Turn off VPN when not neededAirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.2.2 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS XR 7.x v1.0.1 L1Cisco

IDENTIFICATION AND AUTHENTICATION

1.4.1 Set 'password' for 'enable secret'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

ACCESS CONTROL

2.1.1.1.3 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS 12 L1 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.1.1 Set 'no ip source-route'CIS Cisco IOS XE 16.x v2.2.0 L1Cisco

CONFIGURATION MANAGEMENT

3.1.1 Set 'no ip source-route'CIS Cisco IOS XE 17.x v2.2.1 L1Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.5 Set 'af-interface default'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.3.1.6 Set 'authentication key-chain'CIS Cisco IOS 12 L2 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

3.3.1.6 Set 'authentication key-chain'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.7 Set 'authentication mode md5'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1 Basic Fiber Channel ConfigurationCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.1.6 Ensure RPKI is set for Origin Validation of EBGP peersCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.4 Ensure loose authentication check is not configuredCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

4.3.3.3 Ensure ndpd-router is not in useCIS IBM AIX 7 v1.1.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.10.1 Ensure ICMP Router Discovery is disabledCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND INFORMATION INTEGRITY

5.1 (L1) Host firewall must only allow traffic from authorized networksCIS VMware ESXi 8.0 v1.3.0 L1 VMwareVMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000150 - The Arista router must be configured to have all inactive interfaces disabled.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL

ARST-RT-000230 - The Arista router must be configured to produce audit records containing information to establish where the events occurred.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

AUDIT AND ACCOUNTABILITY

ARST-RT-000230 - The Arista router must be configured to produce audit records containing information to establish where the events occurred.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

AUDIT AND ACCOUNTABILITY

ARST-RT-000300 - The PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000300 - The PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000590 - The Arista multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000590 - The Arista multicast Designated Router (DR) must be configured to increase the shortest-path tree (SPT) threshold or set it to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000710 - The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

ARST-RT-000710 - The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

CONFIGURATION MANAGEMENT

ARST-RT-000740 - The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000740 - The PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).DISA Arista MLS EOS 4.X Router STIG v2r2Arista

CONTINGENCY PLANNING

ARST-RT-000750 - The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

ARST-RT-000750 - The PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA Arista MLS EOS 4.X Router STIG v2r2Arista

CONTINGENCY PLANNING

ARST-RT-000830 - The perimeter router must be configured to block all packets with any IP options.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000840 - The PE router must be configured to ignore or block all packets with any IP options.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000470 - The Cisco BGP switch must be configured to check whether a single-hop eBGP peer is directly connected.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000500 - The Cisco BGP switch must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA Cisco NX OS Switch RTR STIG v3r3Cisco

ACCESS CONTROL

CISC-RT-000510 - The Cisco BGP switch must be configured to reject inbound route advertisements from a customer edge (CE) switch for prefixes that are not allocated to that customer.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

ACCESS CONTROL

CISC-RT-000530 - The Cisco BGP switch must be configured to reject outbound route advertisements for any prefixes belonging to the IP core.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000570 - The Cisco BGP switch must be configured to limit the prefix size on any inbound route advertisement to /24, or the least significant prefixes issued to the customer.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000580 - The Cisco BGP switch must be configured to use its loopback address as the source address for iBGP peering sessions.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

CONTINGENCY PLANNING

ESXI-65-000065 - For the ESXi host all port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

Fabric Security - Policy - FIPS ModeTenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

GEN001375-ESXI5-000086 - For systems using DNS resolution, at least two name servers must be configured.DISA VMWare ESXi 5.0 Server STIG v2r1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000990 - The Juniper router must be configured to advertise a hop limit of at least 32 in Router Advertisement messages for IPv6 stateless auto-configuration deployments.DISA Juniper EX Series Router v2r1Juniper

CONFIGURATION MANAGEMENT

OS10-RTR-000030 - The Dell OS10 BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

ACCESS CONTROL

OS10-RTR-000060 - The Dell OS10 BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

ACCESS CONTROL

OS10-RTR-000100 - The Dell OS10 BGP router must be configured to reject route advertisements from CE routers with an originating autonomous system (AS) in the AS_PATH attribute that does not belong to that customer.DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

ACCESS CONTROL

OS10-RTR-000670 - The Dell OS10 BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix deaggregation attacks.DISA Dell OS10 Switch Router STIG v1r1Dell_OS10

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000231 - The Photon operating system must not perform IPv4 packet forwarding.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000246 - The Photon operating system must restrict core dumps.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT