STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HP FlexFabric Switch NDM Security Technical Implementation Guide

V-230167

CAT II (Medium)

The HP FlexFabric Switch must prohibit password reuse for a minimum of five generations.

Rule ID

SV-230167r1113775_rule

STIG

HP FlexFabric Switch NDM Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-000200

Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the HP FlexFabric Switch allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements.

Check Content

Determine if the HP FlexFabric Switch  prohibits password reuse for a minimum of five generations.

[HP] display password-control

Global password control configurations:
 Password control:                    Enabled
 Password aging:                      Enabled (60 days)
 Password length:                     Enabled (15 characters)
 Password composition:                Enabled (1 types, 1 characters per type)
 Password history:                    Enabled (max history records: 4)

If the HP FlexFabric Switch does not have password control enabled and does not prohibit password reuse for a minimum of five generations, this is a finding.

Fix Text

Configure the HP FlexFabric Switch server to prohibit password reuse for a minimum of five generations.

[HP] password-control enable
[HP] password-control history 5