UCF STIG Viewer Logo

The A10 Networks ADC must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.


Overview

Finding ID Version Rule ID IA Controls Severity
V-237037 AADC-AG-000036 SV-237037r639558_rule Medium
Description
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. The device must be configured to prevent or restrict the use of prohibited ports, protocols, and services throughout the network by filtering the network traffic and disallowing or redirecting traffic as necessary. Default and updated policy filters from the vendors will disallow older version of protocols and applications and will address most known non-secure ports, protocols, and/or services. However, sources for further policy filters are the IAVMs and the PPSM requirements.
STIG Date
A10 Networks ADC ALG Security Technical Implementation Guide 2021-03-25

Details

Check Text ( C-40256r639556_chk )
Review the list of authorized applications, endpoints, services, and protocols that have been added to the PPSM database.

Review the configured servers, service groups, and virtual servers.

The following command shows information for SLB servers:
show slb server

The following command shows information for service groups (multiple servers):
show slb service-group

The following command shows information for virtual servers (the services visible to outside hosts):
show slb virtual-server

If any of the servers, service groups, or virtual servers allows traffic that is prohibited by the PPSM CAL, this is a finding.
Fix Text (F-40219r639557_fix)
Do not configure a server, service group, or virtual server for any port, protocol, or service that is prohibited by the PPSM CAL.