Skip to content

Commit 90a9283

Browse files
netpickermailsanjayhere
authored and
imi
committed
New feature branch (#56)
* snmp policies updation * updated flake8 * Remove virtual environment from repository * Update .gitignore to exclude .env directory * added one more test --------- Co-authored-by: mailsanjayhere <mailsanjayhere@gmail.com>
1 parent 495685f commit 90a9283

File tree

243 files changed

+206
-175
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

243 files changed

+206
-175
lines changed

.flake8

100644100755
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,3 @@
11
[flake8]
2+
exclude = .git,__pycache__,docs,old,build,dist,.env/*
23
max-line-length = 120

.github/workflows/flake8.yml

100644100755
File mode changed.

.gitignore

100644100755
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
.idea
22
**/__pycache__
33
**/*.pyc
4+
.env/

.pre-commit-config.yaml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
repos:
2+
- repo: https://github.com/pre-commit/pre-commit-hooks
3+
rev: v4.6.0 # Update to the latest version available
4+
hooks:
5+
- id: check-yaml
6+
- id: end-of-file-fixer
7+
- id: trailing-whitespace
8+
9+
- repo: https://github.com/pycqa/flake8
10+
rev: 7.0.0 # Update to the latest version available
11+
hooks:
12+
- id: flake8

CIS/.metadata

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@ author: sanjay.kumarps@netyce.com
22
description: ""
33
enabled: true
44
name: CIS
5-
type: null
5+
type: null

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_1110_set_aaa_accounting_system.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_1110_set_aaa_accounting_system.ref

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_111_enable_aaa_new_model.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_111_enable_aaa_new_model.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.rule_111_enable_aaa_new_model:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-E05C2E00-C01E-4053-9D12-EC37C7E8EEC5
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-E05C2E00-C01E-4053-9D12-EC37C7E8EEC5
55

66

77
Remediation: Globally enable authentication, authorization and accounting (AAA) using the new- model command. hostname(config)#aaa new-model

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_112_enable_aaa_authentication_login.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_112_enable_aaa_authentication_login.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,6 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-3DB1CC8A-4A98-400B-A906-C42F265C7EA2 Additional Information: Only “the default method list is automatically applied to all interfaces except those that have a named method list explicitly defined. A defined method list overrides the default method list.” (1)
55

66

7-
Remediation: Configure AAA authentication method(s) for login authentication. hostname(config)#aaa authentication login {default | aaa_list_name} [passwd- expiry] [method1] [method2]
7+
Remediation: Configure AAA authentication method(s) for login authentication. hostname(config)#aaa authentication login {default | aaa_list_name} [passwd- expiry] [method1] [method2]
88

99
.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_113_enable_aaa_authentication_enable_default.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_113_enable_aaa_authentication_enable_default.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.rule_113_enable_aaa_authentication_enable_default:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-4171D649-2973-4707-95F3-9D96971893D0
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-4171D649-2973-4707-95F3-9D96971893D0
55

66

77
Remediation: Configure AAA authentication method(s) for enable authentication. hostname(config)#aaa authentication enable default {method1} enable

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_114_set_login_authentication_for_line_vty.py

100644100755
File mode changed.
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
.rule_114_set_login_authentication_for_line_vty:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/d1/sec-cr-k1.html#GUID- 297BDF33-4841-441C-83F3-4DA51C3C7284
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/d1/sec-cr-k1.html#GUID- 297BDF33-4841-441C-83F3-4DA51C3C7284
55

66

77
Remediation: Configure management lines to require login using the default or a named AAA authentication list. This configuration must be set individually for all line types. hostname(config)#line vty {line-number} [<em>ending-line-number] hostname(config-line)#login authentication {default | aaa_list_name}
88

9-
.
9+
.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_115_set_login_authentication_for_ip_http.py

100644100755
File mode changed.
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
.rule_115_set_login_authentication_for_ip_http:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/d1/sec-cr-k1.html#GUID- 297BDF33-4841-441C-83F3-4DA51C3C7284
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/d1/sec-cr-k1.html#GUID- 297BDF33-4841-441C-83F3-4DA51C3C7284
55

66

77
Remediation: Configure management lines to require login using the default or a named AAA authentication list. This configuration must be set individually for all line types. hostname#(config)ip http secure-server hostname#(config)ip http authentication {default | _aaa\_list\_name_}
88

9-
.
9+
.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_116_set_aaa_accounting_to_log_all_privileged_use_commands.py

100644100755
File mode changed.
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
.rule_116_set_aaa_accounting_to_log_all_privileged_use_commands_using_commands_15:
22

33

4-
Reference: Additional Information: Valid privilege level entries are integers from 0 through 15.
4+
Reference: Additional Information: Valid privilege level entries are integers from 0 through 15.
55

66

77
Remediation: Configure AAA accounting for commands. hostname(config)#aaa accounting commands 15 {default | list-name | guarantee- first} {start-stop | stop-only | none} {radius | group group-name}
88

9-
.
9+
.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_117_set_aaa_accounting_connection.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_117_set_aaa_accounting_connection.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.rule_117_set_aaa_accounting_connection:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-0520BCEF-89FB-4505-A5DF-D7F1389F1BBA
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-0520BCEF-89FB-4505-A5DF-D7F1389F1BBA
55

66

77
Remediation: Configure AAA accounting for connections. hostname(config)#aaa accounting connection {default | list-name | guarantee- first} {start-stop | stop-only | none} {radius | group group-name}

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_118_set_aaa_accounting_exec.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_118_set_aaa_accounting_exec.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.rule_118_set_aaa_accounting_exec:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-0520BCEF-89FB-4505-A5DF-D7F1389F1BBA
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a1.html#GUID-0520BCEF-89FB-4505-A5DF-D7F1389F1BBA
55

66

77
Remediation: Configure AAA accounting for EXEC shell session. hostname(config)#aaa accounting exec {default | list-name | guarantee-first} {start-stop | stop-only | none} {radius | group group-name}

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_119_set_aaa_accounting_network.py

100644100755
File mode changed.

CIS/Cisco_ios/11_local_authentication_authorization_and_accounting_rules/rule_119_set_aaa_accounting_network.ref

100644100755
File mode changed.

CIS/Cisco_ios/12_access_rules/rule_1210_set_http_secure_server_limit.py

100644100755
File mode changed.

CIS/Cisco_ios/12_access_rules/rule_1210_set_http_secure_server_limit.ref

100644100755
File mode changed.

CIS/Cisco_ios/12_access_rules/rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip_http.py

100644100755
File mode changed.

CIS/Cisco_ios/12_access_rules/rule_1211_set_exec_timeout_to_less_than_or_equal_to_10_min_on_ip_http.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-76805E6F-9E89-4457-A9DC-5944C8FE5419
55

66

7-
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
7+
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
88
ip http timeout-policy idle 600 life {nnnn} requests {nn}
99

1010
.

CIS/Cisco_ios/12_access_rules/rule_121_set_privilege_1_for_local_users.py

100644100755
File mode changed.
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
.rule_121_set_privilege_1_for_local_users:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-cr-t2-z.html#GUID-34B3E43E-0F79-40E8-82B6-A4B5F1AFF1AD
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-cr-t2-z.html#GUID-34B3E43E-0F79-40E8-82B6-A4B5F1AFF1AD
55

66

7-
Remediation: Set the local user to privilege level 1.
7+
Remediation: Set the local user to privilege level 1.
88
hostname(config)#username <LOCAL_USERNAME> privilege 1
99

1010
.

CIS/Cisco_ios/12_access_rules/rule_122_set_transport_input_ssh_for_line_vty_connections.py

100644100755
File mode changed.

CIS/Cisco_ios/12_access_rules/rule_122_set_transport_input_ssh_for_line_vty_connections.ref

100644100755
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios/termserv/command/reference/tsv_s1.html#wp1069219
55

66

7-
Remediation: Apply SSH to transport input on all VTY management lines
8-
hostname(config)#line vty <line-number> <ending-line-number>
7+
Remediation: Apply SSH to transport input on all VTY management lines
8+
hostname(config)#line vty <line-number> <ending-line-number>
99
hostname(config-line)#transport input ssh
1010

1111
.

CIS/Cisco_ios/12_access_rules/rule_123_set_no_exec_for_line_aux_0.py

100644100755
File mode changed.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_123_set_no_exec_for_line_aux_0:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-429A2B8C-FC26-49C4-94C4-0FD99C32EC34
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-429A2B8C-FC26-49C4-94C4-0FD99C32EC34
55

66

7-
Remediation: Disable the EXEC process on the auxiliary port.
8-
hostname(config)#line aux 0
7+
Remediation: Disable the EXEC process on the auxiliary port.
8+
hostname(config)#line aux 0
99
hostname(config-line)#no exec
1010

1111
.

CIS/Cisco_ios/12_access_rules/rule_124_create_access_list_for_use_with_line_vty.py

100644100755
File mode changed.
Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
.rule_124_create_access_list_for_use_with_line_vty:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-9EA733A3-1788-4882-B8C3-AB0A2949120C
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-9EA733A3-1788-4882-B8C3-AB0A2949120C
55

66

7-
Remediation: Configure the VTY ACL that will be used to restrict management access to the device.
8-
hostname(config)#access-list <vty_acl_number> permit tcp <vty_acl_block_with_mask> any
9-
hostname(config)#access-list <vty_acl_number> permit tcp host <vty_acl_host> any
7+
Remediation: Configure the VTY ACL that will be used to restrict management access to the device.
8+
hostname(config)#access-list <vty_acl_number> permit tcp <vty_acl_block_with_mask> any
9+
hostname(config)#access-list <vty_acl_number> permit tcp host <vty_acl_host> any
1010
hostname(config)#deny ip any any log
1111

1212
.

CIS/Cisco_ios/12_access_rules/rule_125_set_access_class_for_line_vty.py

100644100755
File mode changed.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_125_set_access_class_for_line_vty:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-FB9BC58A-F00A-442A-8028-1E9E260E54D3
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-FB9BC58A-F00A-442A-8028-1E9E260E54D3
55

66

7-
Remediation: Configure remote management access control restrictions for all VTY lines.
8-
hostname(config)#line vty <line-number> <ending-line-number>
7+
Remediation: Configure remote management access control restrictions for all VTY lines.
8+
hostname(config)#line vty <line-number> <ending-line-number>
99
hostname(config-line)# access-class <vty_acl_number> in
1010

1111
.

CIS/Cisco_ios/12_access_rules/rule_126_set_exec_timeout_to_less_than_or_equal_to_10_minutes_for_line_aux_0.py

100644100755
File mode changed.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_126_set_exec_timeout_to_less_than_or_equal_to_10_minutes_for_line_aux_0:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-76805E6F-9E89-4457-A9DC-5944C8FE5419
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-76805E6F-9E89-4457-A9DC-5944C8FE5419
55

66

7-
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8-
hostname(config)#line aux 0
7+
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8+
hostname(config)#line aux 0
99
hostname(config-line)#exec-timeout <timeout_in_minutes> <timeout_in_seconds>
1010

1111
.

CIS/Cisco_ios/12_access_rules/rule_127_set_exec_timeout_to_less_than_or_equal_to_10_minutes_line_console_0.py

100644100755
File mode changed.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_127_set_exec_timeout_to_less_than_or_equal_to_10_minutes_line_console_0:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-76805E6F-9E89-4457-A9DC-5944C8FE5419
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/D_through_E.html#GUID-76805E6F-9E89-4457-A9DC-5944C8FE5419
55

66

7-
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8-
hostname(config)#line con 0
7+
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8+
hostname(config)#line con 0
99
hostname(config-line)#exec-timeout <timeout_in_minutes> <timeout_in_seconds>
1010

1111
.

CIS/Cisco_ios/12_access_rules/rule_128_set_exec_timeout_to_less_than_or_equal_to_10_minutes_line_vty.py

100644100755
File mode changed.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_128_set_exec_timeout_to_less_than_or_equal_to_10_minutes_line_vty:
22

33

4-
Reference: 1. https://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/sw/command/b_cisco_mds_9000_cr_book/l_commands.html#wp3716128869
4+
Reference: 1. https://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/sw/command/b_cisco_mds_9000_cr_book/l_commands.html#wp3716128869
55

66

7-
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8-
hostname(config)#line vty {line_number} [ending_line_number]
7+
Remediation: Configure device timeout (10 minutes or less) to disconnect sessions after a fixed idle time.
8+
hostname(config)#line vty {line_number} [ending_line_number]
99
hostname(config-line)#exec-timeout <<span>timeout_in_minutes> <timeout_in_seconds</span>>
1010

1111
.

CIS/Cisco_ios/12_access_rules/rule_129_set_transport_input_none_for_line_aux_0.py

100644100755
File mode changed.

CIS/Cisco_ios/12_access_rules/rule_129_set_transport_input_none_for_line_aux_0.ref

100644100755
File mode changed.

CIS/Cisco_ios/13_banner_rules/rule_131_set_the_banner_text_for_banner_exec.py

100644100755
File mode changed.

CIS/Cisco_ios/13_banner_rules/rule_131_set_the_banner_text_for_banner_exec.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/A_through_B.html#GUID-0DEF5B57-A7D9-4912-861F-E837C82A3881 Additional Information: The default is no banner.
55

66

7-
Remediation: Configure the EXEC banner presented to a user when accessing the devices enable prompt.
7+
Remediation: Configure the EXEC banner presented to a user when accessing the devices enable prompt.
88
hostname(config)#banner exec c Enter TEXT message. End with the character 'c'. <banner-text> c
99

1010
.

CIS/Cisco_ios/13_banner_rules/rule_132_set_the_banner_text_for_banner_login.py

100644100755
File mode changed.

CIS/Cisco_ios/13_banner_rules/rule_132_set_the_banner_text_for_banner_login.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/A_through_B.html#GUID-FF0B6890-85B8-4B6A-90DD-1B7140C5D22F
55

66

7-
Remediation: Configure the device so a login banner presented to a user attempting to access the device.
7+
Remediation: Configure the device so a login banner presented to a user attempting to access the device.
88
hostname(config)#banner login c Enter TEXT message. End with the character 'c'. <banner-text> c
99

1010
.

CIS/Cisco_ios/13_banner_rules/rule_133_set_the_banner_text_for_banner_motd.py

100644100755
File mode changed.

CIS/Cisco_ios/13_banner_rules/rule_133_set_the_banner_text_for_banner_motd.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/fundamentals/command/A_through_B.html#GUID-7416C789-9561-44FC-BB2A-D8D8AFFB77DD
55

66

7-
Remediation: Configure the message of the day (MOTD) banner presented when a user first connects to the device.
7+
Remediation: Configure the message of the day (MOTD) banner presented when a user first connects to the device.
88
hostname(config)#banner motd c Enter TEXT message. End with the character 'c'. <banner-text> c
99

1010
.

CIS/Cisco_ios/13_banner_rules/rule_134_set_the_banner_text_for_webauth_banner.py

100644100755
File mode changed.

CIS/Cisco_ios/13_banner_rules/rule_134_set_the_banner_text_for_webauth_banner.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-9/configuration_guide/sec/b_169_sec_9500_cg/configuring_web_based_authentication.html
55

66

7-
Remediation: Configure the webauth banner presented when a user connects to the device.
7+
Remediation: Configure the webauth banner presented when a user connects to the device.
88
hostname(config)#ip admission auth-proxy-banner http {banner-text | filepath}
99

1010
.

CIS/Cisco_ios/14_password_rules/rule_141_set_password_for_enable_secret.py

100644100755
File mode changed.

CIS/Cisco_ios/14_password_rules/rule_141_set_password_for_enable_secret.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
Additional Information: Note: You cannot recover a lost encrypted password. You must clear NVRAM and set a new password.
66

77

8-
Remediation: Configure a strong, enable secret password.
8+
Remediation: Configure a strong, enable secret password.
99
hostname(config)#enable secret 9 {ENABLE_SECRET_PASSWORD}
1010

1111
.

CIS/Cisco_ios/14_password_rules/rule_142_enable_service_password_encryption.py

100644100755
File mode changed.
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_142_enable_service_password_encryption:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-cr-s1.html#GUID-CC0E305A-604E-4A74-8A1A-975556CE5871
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/s1/sec-cr-s1.html#GUID-CC0E305A-604E-4A74-8A1A-975556CE5871
55
Additional Information: Caution: This command does not provide a high level of network security. If you use this command, you should also take additional network security measures. Note: You cannot recover a lost encrypted password. You must clear NVRAM and set a new password.
66

77

8-
Remediation: Enable password encryption service to protect sensitive access passwords in the device configuration.
8+
Remediation: Enable password encryption service to protect sensitive access passwords in the device configuration.
99
hostname(config)#service password-encryption
1010

1111
.

CIS/Cisco_ios/14_password_rules/rule_143_set_username_secret_for_all_local_users.py

100644100755
File mode changed.

CIS/Cisco_ios/14_password_rules/rule_143_set_username_secret_for_all_local_users.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9600/software/release/16-12/configuration_guide/sec/b_1612_sec_9600_cg/controlling_switch_access_with_passwords_and_privilege_levels.html
55

66

7-
Remediation: Create a local user with an encrypted, complex (not easily guessed) password.
7+
Remediation: Create a local user with an encrypted, complex (not easily guessed) password.
88
hostname(config)#username {{em}LOCAL_USERNAME{/em}} secret {{em}LOCAL_PASSWORD{/em}}
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_1510_require_aes_128_as_minimum_for_snmp_server.py

100644100755
File mode changed.
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
.rule_1510_require_aes_128_as_minimum_for_snmp_server_user_when_using_snmpv3:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s5.html#GUID-4EED4031-E723-4B84-9BBF-610C3CF60E31
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s5.html#GUID-4EED4031-E723-4B84-9BBF-610C3CF60E31
55

66

7-
Remediation: For each SNMPv3 user created on your router add privacy options by issuing the following command.
7+
Remediation: For each SNMPv3 user created on your router add privacy options by issuing the following command.
88
hostname(config)#snmp-server user {user_name} {group_name} v3 auth sha {auth_password} priv aes 128 {priv_password} {acl_name_or_number}
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_151_set_no_snmp_server_to_disable_snmp_when_unused.py

100644100755
File mode changed.

CIS/Cisco_ios/15_snmp_rules/rule_151_set_no_snmp_server_to_disable_snmp_when_unused.ref

100644100755
File mode changed.

CIS/Cisco_ios/15_snmp_rules/rule_152_unset_private_for_snmp_server_community.py

100644100755
File mode changed.

CIS/Cisco_ios/15_snmp_rules/rule_152_unset_private_for_snmp_server_community.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s2.html#GUID-2F3F13E4-EE81-4590-871D-6AE1043473DE
55

66

7-
Remediation: Disable the default SNMP community string private
7+
Remediation: Disable the default SNMP community string private
88
hostname(config)#no snmp-server community {private}
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_153_unset_public_for_snmp_server_community.py

100644100755
File mode changed.

CIS/Cisco_ios/15_snmp_rules/rule_153_unset_public_for_snmp_server_community.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s2.html#GUID-2F3F13E4-EE81-4590-871D-6AE1043473DE
55

66

7-
Remediation: Disable the default SNMP community string "public"
7+
Remediation: Disable the default SNMP community string "public"
88
hostname(config)#no snmp-server community {public}
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_154_do_not_set_rw_for_any_snmp_server_community.py

100644100755
File mode changed.
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
.rule_154_do_not_set_rw_for_any_snmp_server_community:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s2.html#GUID-2F3F13E4-EE81-4590-871D-6AE1043473DE
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s2.html#GUID-2F3F13E4-EE81-4590-871D-6AE1043473DE
55

66

7-
Remediation: Disable SNMP write access.
7+
Remediation: Disable SNMP write access.
88
hostname(config)#no snmp-server community {<em>write_community_string</em>}
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_155_set_the_acl_for_each_snmp_server_community.py

100644100755
File mode changed.

CIS/Cisco_ios/15_snmp_rules/rule_155_set_the_acl_for_each_snmp_server_community.ref

100644100755
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s2.html#GUID-2F3F13E4-EE81-4590-871D-6AE1043473DE
55

66

7-
Remediation: Configure authorized SNMP community string and restrict access to authorized management systems.
7+
Remediation: Configure authorized SNMP community string and restrict access to authorized management systems.
88
hostname(config)#snmp-server community <<em>community_string</em>> ro {<em>snmp_access-list_number | <span>snmp_access-list_name</span></em><span>}</span>
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_156_create_an_access_list_for_use_with_snmp.py

100644100755
File mode changed.
Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
.rule_156_create_an_access_list_for_use_with_snmp:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-9EA733A3-1788-4882-B8C3-AB0A2949120C
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-a2.html#GUID-9EA733A3-1788-4882-B8C3-AB0A2949120C
55

66

7-
Remediation: Configure SNMP ACL for restricting access to the device from authorized management stations segmented in a trusted management zone.
8-
hostname(config)#access-list <<em>snmp_acl_number</em>> permit <<em>snmp_access-list</em>>
7+
Remediation: Configure SNMP ACL for restricting access to the device from authorized management stations segmented in a trusted management zone.
8+
hostname(config)#access-list <<em>snmp_acl_number</em>> permit <<em>snmp_access-list</em>>
99
hostname(config)#access-list deny any log
1010

1111
.

CIS/Cisco_ios/15_snmp_rules/rule_157_set_snmp_server_host_when_using_snmp.py

100644100755
File mode changed.
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
.rule_157_set_snmp_server_host_when_using_snmp:
22

33

4-
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s5.html#GUID-D84B2AB5-6485-4A23-8C26-73E50F73EE61
4+
Reference: 1. http://www.cisco.com/en/US/docs/ios-xml/ios/snmp/command/nm-snmp-cr-s5.html#GUID-D84B2AB5-6485-4A23-8C26-73E50F73EE61
55

66

7-
Remediation: Configure authorized SNMP trap community string and restrict sending messages to authorized management systems.
7+
Remediation: Configure authorized SNMP trap community string and restrict sending messages to authorized management systems.
88
hostname(config)#snmp-server host {ip_address} {trap_community_string} {notification-type}
99

1010
.

CIS/Cisco_ios/15_snmp_rules/rule_158_set_snmp_server_enable_traps_snmp.py

100644100755
File mode changed.

0 commit comments

Comments
 (0)