STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Aruba Networking AOS NDM Security Technical Implementation Guide

V-266937

CAT I (High)

AOS must transmit only encrypted representations of passwords.

Rule ID

SV-266937r1039832_rule

STIG

HPE Aruba Networking AOS NDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000197

Discussion

Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised. Network devices can accomplish this by making direct function calls to encryption modules or by leveraging operating system encryption capabilities.

Check Content

Verify the AOS configuration with the following commands: 
show aaa authentication-server all 
show snmp user-table 
 
If the LDAP servers are not configured to use port 636, or if the SNMP users are not configured to use AES encryption, this is a finding.

Fix Text

Configure AOS with the following commands: 
configure terminal 
aaa authentication-server ldap <server name> 
authport 636 
preferred-conn-type ldap-s 
exit 
snmp-server user <username> auth-prot sha <passphrase> priv-prot AES <passphrase> 
write memory