STIGQter STIGQter: STIG Summary: F5 BIG-IP Local Traffic Manager 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The BIG-IP Core implementation must be configured to remove or disable any functions, ports, protocols, and/or services that are not documented as required.

DISA Rule

SV-215756r557356_rule

Vulnerability Number

V-215756

Group Title

SRG-NET-000131-ALG-000086

Rule Version

F5BI-LT-000069

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure Virtual Servers in the BIG-IP LTM module with only proxy services that are related to the purpose of the BIG-IP Core.

Check Contents

Review the BIG-IP Core configuration to determine if application proxies are installed that are not related to the purpose of the gateway.

Navigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.

Review the Virtual Service List and validate there are only ports listed in the "Service Port" column that are providing proxy services related to the purpose of the BIG-IP Core.

If the BIG-IP Core has unrelated or unneeded application proxy services installed, this is a finding.

Vulnerability Number

V-215756

Documentable

False

Rule Version

F5BI-LT-000069

Severity Override Guidance

Review the BIG-IP Core configuration to determine if application proxies are installed that are not related to the purpose of the gateway.

Navigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.

Review the Virtual Service List and validate there are only ports listed in the "Service Port" column that are providing proxy services related to the purpose of the BIG-IP Core.

If the BIG-IP Core has unrelated or unneeded application proxy services installed, this is a finding.

Check Content Reference

M

Target Key

4019

Comments