STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cisco ASA IPS Security Technical Implementation Guide

V-239881

CAT II (Medium)

The Cisco ASA must be configured to queue log records locally In the event that the central audit server is down or not reachable.

Rule ID

SV-239881r665956_rule

STIG

Cisco ASA IPS Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000140

Discussion

It is critical that when the IDPS is at risk of failing to process audit logs as required, it take action to mitigate the failure. Audit processing failures include: software/hardware errors; failures in the audit capturing mechanisms; and audit storage capacity being reached or exceeded. Responses to audit failure depend upon the nature of the failure. The IDPS performs a critical security function, so its continued operation is imperative. Since availability of the IDPS is an overriding concern, shutting down the system in the event of an audit failure should be avoided, except as a last resort. The SYSLOG protocol does not support automated synchronization, however this functionality may be provided by Network Management Systems (NMSs) which are not within the scope of this SRG.

Check Content

Verify that TCP is being used to send log data to the syslog server.

Step 1: Navigate to Devices >> Platform Settings >> Syslog Servers.

Step 2: Verify that TCP is listed under the Protocol tab has been selected.

If the Cisco ASA is not configured to use TCP to send log data to the syslog server, this is a finding.

Fix Text

Step 1: Navigate to Devices >> Platform Settings >> Syslog Servers.

Step 2: Click on the pencil icon to edit the applicable server.

Step 3: Select the TCP option.

Step 4: Click OK and Save.