The F5 BIG-IP appliance must be configured to restrict a consistent inbound IP for the entire management session.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-266167F5BI-AP-300156SV-266167r1024399_ruleCCI-001184medium
Description
This security measure helps limit the effects of denial-of-service attacks by employing antisession hijacking security safeguards. Session hijacking, also called cookie hijacking, is the exploitation of a valid computer session to gain unauthorized access to an application. The attacker steals (or hijacks) the cookies from a valid user and attempts to use them for authentication.
STIGDate
F5 BIG-IP TMOS ALG Security Technical Implementation Guide2025-06-09

Details

Check Text (C-266167r1024399_chk)

From the BIG-IP GUI: 1. System. 2. Preferences. 3. Under Security Settings, verify "Require A Consistent Inbound IP For The Entire Web Session" box is checked. From the BIG-IP Console: tmsh list sys httpd auth-pam-validate-ip Note: This returns a value of "on". If the BIG-IP appliance is not configured to require a consistent inbound IP for the entire session for management sessions, this is a finding.

Fix Text (F-69994r1023748_fix)

From the BIG-IP GUI: 1. System. 2. Preferences. 3. Under Security Settings, check "Require A Consistent Inbound IP For The Entire Web Session". 4. Click "Update". From the BIG-IP Console: tmsh modify sys httpd auth-pam-validate-ip on tmsh save sys config