Capacity
CCI-002205
Uniquely identify and authenticate source by organization, system, application, service, and/or individual for information transfer.
Choose one
2
Rule
Severity: Medium
The ALG that is part of a CDS must uniquely identify and authenticate source by organization, system, application, and/or individual for information transfer.
1
Rule
Severity: Medium
The Arista Multilayer Switch must enable neighbor router authentication for control plane protocols except RIP.
2
Rule
Severity: Medium
The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.
2
Rule
Severity: Medium
The Arista BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
1
Rule
Severity: Medium
The HP FlexFabric Switch must enable neighbor authentication for all control plane protocols.
4
Rule
Severity: Medium
The Juniper router must be configured to implement message authentication for all control plane protocols.
4
Rule
Severity: Medium
The Juniper router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
4
Rule
Severity: Medium
The Juniper BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
1
Rule
Severity: Medium
The router must be configured to implement message authentication for all control plane protocols.
1
Rule
Severity: Medium
The BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
1
Rule
Severity: Medium
The router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
1
Rule
Severity: Medium
The NSX-T Tier-0 Gateway must be configured to implement message authentication for all control plane protocols.
1
Rule
Severity: Medium
The NSX-T Tier-0 Gateway must be configured to use a unique key for each autonomous system (AS) with which it peers.
6
Rule
Severity: Medium
The Cisco router must be configured to enable routing protocol authentication using FIPS 198-1 algorithms with keys not exceeding 180 days of lifetime.
6
Rule
Severity: Medium
The Cisco BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.
4
Rule
Severity: Medium
The Cisco switch must be configured to enable routing protocol authentication using FIPS 198-1 algorithms with keys not exceeding 180 days of lifetime.
4
Rule
Severity: Medium
The Cisco BGP switch must be configured to use a unique key for each autonomous system (AS) that it peers with.
2
Rule
Severity: Medium
The Cisco switch must be configured to implement message authentication for all control plane protocols.
2
Rule
Severity: Medium
The Cisco switch must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
1
Rule
Severity: High
The NSX Tier-0 Gateway router must be configured to implement message authentication for all control plane protocols.
1
Rule
Severity: Medium
The NSX Tier-0 Gateway must be configured to use a unique password for each autonomous system (AS) with which it peers.
1
Rule
Severity: High
The NSX Tier-0 Gateway router must be configured to use encryption for border gateway protocol (BGP) routing protocol authentication.
Patternfly
PatternFly elements
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Modules
66%