Item Search

NameAudit NamePluginCategory
1.3 Account Anti-riot AttackTenable ZTE ROSNGZTE_ROSNG

ACCESS CONTROL

1.6 Support Web Access Security - c) versionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - a) Disable encryption noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Authentication and Verification of BGP Routing ProtocolsTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

Adtran : Disable SSLv2TNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Disable TelnetTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable aaaTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Enable security mode on virtual access point (VAP)TNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Ensure a trusted, primary DNS server is setTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Ensure a trusted, secondary DNS server is setTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Extreme : Configure Banner before-loginTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : Configure Remote SyslogTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

AUDIT AND ACCOUNTABILITY

Extreme : Configure timezone = UTCTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Extreme : Disable SNMP write accessTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : Enable SNMP TrapsTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

AUDIT AND ACCOUNTABILITY

Extreme : Only allow SNMPv3TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Extreme : Password Policy - history <=4TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Extreme : Password Policy - lockout-on-login-failuresTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : Password Policy - max-age <= 90TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Extreme : Review admin accountsTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : SNMP community name != privateTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

SYSTEM AND INFORMATION INTEGRITY

Huawei: Disable FTP IPV4TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Disable FTP IPV6TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Disable SNMP write accessTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Disable Telnet on IPV6TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Enable AAA authorizationTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Require service timestampTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: Set 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set 'shell' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set appropriate 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set System NameTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: SSH Max Retries <= 3TNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: User Interfaces are AuthenticatedTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: User Interfaces Configured Inbound SSHTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

JUSX-DM-000163 - The Juniper SRX Services Gateway must limit the number of sessions per minute to an organization-defined number for SSH to protect remote access management from unauthorized access.DISA Juniper SRX Services Gateway NDM v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : Authentication Settings - 'Management User Idle Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : Authentication Settings - 'Management User Session Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : DDoS Prevention - Distributed Denial-of-Service Prevention - Per Client QuotaTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : Device InfoTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

CONFIGURATION MANAGEMENT

WatchGuard : DNS ServersTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Drop IPSEC Flood AttackTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : IPS Logging Threat Level Critical - EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : IPS Logging Threat Level HIGH - EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : IPS Signature Update - 'Enabled'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND INFORMATION INTEGRITY

WatchGuard : LDAP Server NameTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION

WatchGuard : Logging - IKE Packet TracingTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : Logging - Review Remote Logging Server AddressTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : NTP EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : SNMP Configuration - community string - 'private'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION

WatchGuard : SNMP Configuration - v3 uses DESTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY