################################################################################
DOCUMENT         : Cisco_IOS-XE_Router_NDM_STIG
VERSION          : 003.004.016
CHECKSUM         : 45b1286845bd055297781667b814ec36acb992c390822892e4e6bca151dd71a2
MANUAL QUESTIONS : 5

IMPORTANT: Make sure to save the completed version of this file to: 
<SCC Install>/Resources/Content/Manual_Questions/Completed_Files

This file contains all of the non-automated STIG requirements found in the STIG.
Results from this file will be combined with automated checks in SCC to provide
complete STIG compliance results.

This file will be programmaticaly imported, so do not modify anything in this file
except for placing an '[X]' to select a Single answer, and entering text comments.

The list of questions is printed in order of severity, listing CAT I (High), then CAT II, etc..

################################################################################

QUESTION         : 1 of 5
TITLE            : CAT I, V-220140, SV-220140r961863, SRG-APP-000516-NDM-000351
TEST_ACTION_ID   : ocil:navy.navwar.niwcatlantic.scc.iosxe:testaction:8301
QUESTION_ID      : ocil:navy.navwar.niwcatlantic.scc.iosxe:question:8301
RULE             : The Cisco router must be running an IOS release that is currently supported by Cisco Systems.
QUESTION_TEXT    : Verify that the router is in compliance with this requirement by having the router administrator enter the following command: 

show version

Verify that the release is still supported by Cisco. All releases supported by Cisco can be found on the following URL:

www.cisco.com/c/en/us/support/ios-nx-os-software

If the router is not running a supported release, this is a finding.

References:
SV-105507
V-96369
CCI-000366
     ===========================================================================
     Select One of the following by entering an X in the brackets
     [ ] Finding
     [ ] Not a Finding
     [ ] Not Applicable
     [X] Not Reviewed
     Enter any comments : 

******************************* end of question 1 *******************************

QUESTION         : 2 of 5
TITLE            : CAT II, V-215818, SV-215818r960897, SRG-APP-000097-NDM-000227
TEST_ACTION_ID   : ocil:navy.navwar.niwcatlantic.scc.iosxe:testaction:2101
QUESTION_ID      : ocil:navy.navwar.niwcatlantic.scc.iosxe:question:2101
RULE             : The Cisco router must produce audit records containing information to establish where the events occurred.
QUESTION_TEXT    : Review the deny statements in all interface ACLs to determine if the log-input parameter has been configured as shown in the example below.
Note: log-input can only apply to interface bound ACLs.

ip access-list extended BLOCK_INBOUND
 deny  icmp any any log-input

If the router is not configured with the log-input parameter after any deny statements to note where packets have been dropped via an ACL, this is a finding.

References:
SV-105363
V-96225
CCI-000132
     ===========================================================================
     Select One of the following by entering an X in the brackets
     [ ] Finding
     [ ] Not a Finding
     [ ] Not Applicable
     [X] Not Reviewed
     Enter any comments : 

******************************* end of question 2 *******************************

QUESTION         : 3 of 5
TITLE            : CAT II, V-215841, SV-215841r1107207, SRG-APP-000395-NDM-000310
TEST_ACTION_ID   : ocil:navy.navwar.niwcatlantic.scc.iosxe:testaction:5901
QUESTION_ID      : ocil:navy.navwar.niwcatlantic.scc.iosxe:question:5901
RULE             : The Cisco router must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
QUESTION_TEXT    : Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example below.

snmp-server group V3GROUP v3 auth read V3READ write V3WRITE 
snmp-server host x.x.x.x version 3 auth V3USER

Authentication used by the SNMP users can be viewed via the show snmp user command as shown in the example below:

R4#show snmp user

User name: V3USER
Engine ID: 800000090300C2042B540000
storage-type: nonvolatile active
Authentication Protocol: SHA
Privacy Protocol: None
Group-name: V3GROUP

If the Cisco router is not configured to authenticate SNMP messages using a FIPS-validated HMAC, this is a finding.

References:
SV-105455
V-96317
CCI-001967
     ===========================================================================
     Select One of the following by entering an X in the brackets
     [ ] Finding
     [ ] Not a Finding
     [ ] Not Applicable
     [X] Not Reviewed
     Enter any comments : 

******************************* end of question 3 *******************************

QUESTION         : 4 of 5
TITLE            : CAT II, V-215842, SV-215842r961506, SRG-APP-000395-NDM-000310
TEST_ACTION_ID   : ocil:navy.navwar.niwcatlantic.scc.iosxe:testaction:6101
QUESTION_ID      : ocil:navy.navwar.niwcatlantic.scc.iosxe:question:6101
RULE             : The Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.
QUESTION_TEXT    : Review the Cisco router configuration to verify that it is compliant with this requirement as shown in the example below.

snmp-server group V3GROUP v3 priv read V3READ write V3WRITE
snmp-server view V3READ iso included
snmp-server view V3WRITE iso included
snmp-server host x.x.x.x version 3 auth V3USER

Encryption used by the SNMP users can be viewed via the show snmp user command as shown in the example below.

R4#show snmp user

User name: V3USER
Engine ID: 800000090300C2042B540000
storage-type: nonvolatile active
Authentication Protocol: SHA
Privacy Protocol: AES256
Group-name: V3GROUP

If the Cisco router is not configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm, this is a finding.

References:
SV-105457
V-96319
CCI-000068
     ===========================================================================
     Select One of the following by entering an X in the brackets
     [ ] Finding
     [ ] Not a Finding
     [ ] Not Applicable
     [X] Not Reviewed
     Enter any comments : 

******************************* end of question 4 *******************************

QUESTION         : 5 of 5
TITLE            : CAT II, V-215856, SV-215856r991889, SRG-APP-000516-NDM-000344
TEST_ACTION_ID   : ocil:navy.navwar.niwcatlantic.scc.iosxe:testaction:7901
QUESTION_ID      : ocil:navy.navwar.niwcatlantic.scc.iosxe:question:7901
RULE             : The Cisco router must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
QUESTION_TEXT    : Review the router configuration to determine if a CA trust point has been configured. The CA trust point will contain the URL of the CA in which the router has enrolled with. Verify this is a DOD or DOD-approved CA. This will ensure the router has enrolled and received a certificate from a trusted CA. The CA trust point configuration would look similar to the example below.

crypto pki trustpoint CA_X
 enrollment url http://trustpoint1.example.com

Note: A remote end-point's certificate will always be validated by the router by verifying the signature of the CA on the certificate using the CA's public key, which is contained in the router's certificate it received at enrollment.

Note: This requirement is not applicable if the router does not have any public key certificates.

If the Cisco router is not configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.

References:
SV-105501
V-96363
CCI-001159
CCI-004909
     ===========================================================================
     Select One of the following by entering an X in the brackets
     [ ] Finding
     [ ] Not a Finding
     [ ] Not Applicable
     [X] Not Reviewed
     Enter any comments : 

******************************* end of question 5 *******************************

