Skip to content

The Cisco router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.

An XCCDF Rule

Description

<VulnDiscussion>For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority (CA) at medium assurance or higher, this Certification Authority will suffice.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-216546r961863_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Configure the router to obtain its public key certificates from an appropriate certificate policy through an approved service provider as show in the example below.

RP/0/0/CPU0:R3(config)#crypto ca trustpoint CA_X
RP/0/0/CPU0:R3(config-trustp)#enrollment url http://trustpoint1.example.com