STIGQter STIGQter: STIG Summary: A10 Networks ADC ALG Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The A10 Networks ADC when used for TLS encryption and decryption must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.

DISA Rule

SV-237038r639561_rule

Vulnerability Number

V-237038

Group Title

SRG-NET-000164-ALG-000100

Rule Version

AADC-AG-000042

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If intermediary services for TLS are provided, configure the device to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.

The following command configures an authentication-server profile for an Online Certificate Status Protocol (OCSP) server:
authentication-server ocsp [profile-name]

Check Contents

If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable.

Verify the ALG validates certificates used for TLS functions by performing RFC 5280-compliant certification path validation.

If the ALG does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.

Vulnerability Number

V-237038

Documentable

False

Rule Version

AADC-AG-000042

Severity Override Guidance

If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable.

Verify the ALG validates certificates used for TLS functions by performing RFC 5280-compliant certification path validation.

If the ALG does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.

Check Content Reference

M

Target Key

5285

Comments