STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to RUCKUS ICX Router Security Technical Implementation Guide

V-273627

CAT II (Medium)

The RUCKUS ICX Router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.

Rule ID

SV-273627r1110934_rule

STIG

RUCKUS ICX Router Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002385

Discussion

Network devices configured via a zero-touch deployment or auto-loading feature can have their startup configuration or image pushed to the device for installation via TFTP or Remote Copy (rcp). Loading an image or configuration file from the network is taking a security risk because the file could be intercepted by an attacker who could corrupt the file, resulting in a denial of service.

Check Content

Examine the startup config ("show conf") and examine whether any interfaces are configured with the keyword "dynamic".  

If the startup config does not exist, this is a finding.

Fix Text

Configure interfaces, as needed.  

When complete, save the running config using "wr mem".