1. Home
  2. Security Hardening
  3. DISA STIG Cisco ASA VPN V1R1
  4. CASA-VN-000080 – The Cisco ASA must be configured to queue log records locally in the event that the central audit server is down or not reachable. – logging queue

CASA-VN-000080 – The Cisco ASA must be configured to queue log records locally in the event that the central audit server is down or not reachable. – logging queue

Details

If the system were to continue processing after audit failure, actions can be taken on the system that cannot be tracked and recorded for later forensic analysis.

Because of the importance of ensuring mission/business continuity, organizations may determine that the nature of the audit failure is not so severe that it warrants a complete shutdown of the application supporting the core organizational missions/business operations. In those instances, partial application shutdowns or operating in a degraded mode with reduced capability may be viable alternatives.

This requirement only applies to components where this is specific to the function of the device (e.g., IDPS sensor logs, firewall logs). This does not apply to audit logs generated on behalf of the device itself (management).

Solution

To continue to allow new connections and queue log records in the event the syslog server is not reachable, configure logging permit-hostdown and increase the queue size.

ASA(config)# logging permit-hostdown
ASA(config)# logging queue 8192

Supportive Information

The following resource is also helpful.

This security hardening control applies to the following category of controls within NIST 800-53: Audit and Accountability.This control applies to the following type of system Cisco.

References

Source

Updated on July 16, 2022
Was this article helpful?

Related Articles