STIGQter STIGQter: STIG Summary: A10 Networks ADC NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 15 Apr 2016:

The A10 Networks ADC must restrict management connections to the management network.

DISA Rule

SV-82587r1_rule

Vulnerability Number

V-68097

Group Title

SRG-APP-000038-NDM-000213

Rule Version

AADC-NM-000143

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure an ACL or filter to restrict management access to the device from only the management network.

The following commands configure an access control list that only allows traffic from the management network and logs denied traffic:
access-list [acl-num] permit
access-list [acl-num] permit source-ipaddr {filter-mask | /mask-length}
access-list [acl-num] deny any log
Note: The source-ipadd and mask must be the subnet used for the management network.

The following commands apply the ACL to the management interface:
interface management
access-list [acl-num] in
Note that acl-num is the number assigned to the ACL configured above.

Check Contents

Ask the device administrator what the subnet assigned to the management network is and which access-list is used to restrict management traffic.

Review the device configuration.

The following command displays a configured access-list:
show access-list [ipv4 | ipv6] [acl-id]

If no access list for the management network is configured, this is a finding.

If the access list for the management network does not restrict traffic solely to the management network, this is a finding.

The following command displays information about the management interface:
show interface management

If the access list is not applied to the management interface, this is a finding.

Vulnerability Number

V-68097

Documentable

False

Rule Version

AADC-NM-000143

Severity Override Guidance

Ask the device administrator what the subnet assigned to the management network is and which access-list is used to restrict management traffic.

Review the device configuration.

The following command displays a configured access-list:
show access-list [ipv4 | ipv6] [acl-id]

If no access list for the management network is configured, this is a finding.

If the access list for the management network does not restrict traffic solely to the management network, this is a finding.

The following command displays information about the management interface:
show interface management

If the access list is not applied to the management interface, this is a finding.

Check Content Reference

M

Target Key

2915

Comments