A10 Networks ADC ALG Security Technical Implementation Guide

  • Version/Release: V2R1
  • Published: 2021-03-25
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.
b
The A10 Networks ADC, when used for TLS encryption and decryption, must be configured to comply with the required TLS settings in NIST SP 800-52.
AC-17 - Medium - CCI-000068 - V-237032 - SV-237032r639543_rule
RMF Control
AC-17
Severity
Medium
CCI
CCI-000068
Version
AADC-AG-000018
Vuln IDs
  • V-237032
  • V-67957
Rule IDs
  • SV-237032r639543_rule
  • SV-82447
SP 800-52 provides guidance on using the most secure version and configuration of the TLS/SSL protocol. Using older unauthorized versions or incorrectly configuring protocol negotiation makes the gateway vulnerable to known and unknown attacks which exploit vulnerabilities in this protocol. This requirement applies to TLS gateways (also known as SSL gateways) and is not applicable to VPN devices. Application protocols such as HTTPS and DNSSEC use TLS as the underlying security protocol thus are in scope for this requirement. NIS SP 800-52 provides guidance. SP 800-52 sets TLS version 1.1 as a minimum version, thus all versions of SSL are not allowed (including for client negotiation) either on DoD-only or on public facing servers.
Checks: C-40251r695312_chk

If the device does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Review the device configuration. View the configured cipher templates (if any): show slb template cipher The following cipher suites are in compliance: TLS1_RSA_AES_128_SHA TLS1_RSA_AES_128_SHA256 TLS1_RSA_AES_256_SHA TLS1_RSA_AES_256_SHA256 If any of the configured cipher templates contain any cipher suites that are not in compliance, this is a finding. View the configured SLB SSL templates: show slb template server-ssl If any of the configured SLB SSL templates list version 30, 31, 32, this is a finding. If any of the configured SLB SSL templates contain any cipher suites that are not in compliance, this is a finding.

Fix: F-40214r695313_fix

The following command validates real servers based on their certificates: slb template server-ssl [template-name] The following sub-command specifies the version of SSL/TLS used: version [30 | 31 | 32 |33] Note: Options 30, 31, or 32 are not compliant; use option 33 or higher instead. The following sub-command specifies the cipher suite to support for certificates from servers: cipher [cipher suite] The following cipher suites are in compliance: TLS1_RSA_AES_128_SHA TLS1_RSA_AES_128_SHA256 TLS1_RSA_AES_256_SHA TLS1_RSA_AES_256_SHA256 Optionally, a cipher template containing these cipher suites can be configured and applied. The following command creates a cipher template: slb template cipher [template-name] The following command binds the cipher template to the server-ssl template: template cipher [template-name]

a
The A10 Networks ADC, when used to load balance web applications, must enable external logging for accessing Web Application Firewall data event messages.
AU-3 - Low - CCI-000133 - V-237033 - SV-237033r639546_rule
RMF Control
AU-3
Severity
Low
CCI
CCI-000133
Version
AADC-AG-000023
Vuln IDs
  • V-237033
  • V-67959
Rule IDs
  • SV-237033r639546_rule
  • SV-82449
Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. External logging must be enabled for WAF data event messages. Create a server configuration for each log server, and then add a TCP or UDP port to each server configuration, with the port number on which the external log server listens for log messages.
Checks: C-40252r639544_chk

If the device is not used to load balance web servers, this is not applicable. Review the device configuration and ask the device Administrator which templates are used. If no SLB instance for the log server(s) is configured, this is a finding. If there is no service group with assigned members for the log servers or the service group is not included in the logging template, this is a finding. If no logging template is configured and bound to the WAF template, this is a finding.

Fix: F-40215r639545_fix

If the device is used to load balance web servers, configure external logging for WAF data event messages. Create a server configuration for each log server. The following command adds a server: slb server [server-name] [ipaddr] The following command specifies the TCP or UDP port number on which the server will listen for log traffic: port [port-num] [tcp | udp] If multiple log servers are used, add the log servers to a service group. Use the round-robin load-balancing method, which is the default method. The following command creates the service group: slb service-group [group-name] [tcp | udp] The following command adds each log server and its TCP or UDP port to the service group: member [server-name:portnum] The following command creates a logging template: slb template logging [template-name] The following command adds the service group containing the log servers to the logging template: service-group [group-name] The following commands bind the logging template to the WAF template: slb template waf [template-name] template logging [template-name]

a
The A10 Networks ADC must send an alert to, at a minimum, the ISSO and SCA when connectivity to the Syslog servers is lost.
AU-5 - Low - CCI-000139 - V-237034 - SV-237034r639549_rule
RMF Control
AU-5
Severity
Low
CCI
CCI-000139
Version
AADC-AG-000026
Vuln IDs
  • V-237034
  • V-67961
Rule IDs
  • SV-237034r639549_rule
  • SV-82451
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an impending failure of the audit capability and system operation may be adversely affected. Audit processing failures include software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Possible audit processing failures also include the inability of device to write to the central audit log. This requirement applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the centralized audit storage capacity of organizations, (i.e., all audit data storage repositories combined), or both. This does not apply to audit logs generated on behalf of the device itself (management).
Checks: C-40253r639547_chk

Review the device configuration. The following command shows the configured Server Load Balancing instances: show run | sec slb If no Server Load Balancing instance is configured with a health check to the Syslog server, this is a finding. The following command shows the device configuration and filters the output on the string "snmp": show run | inc snmp This will include which SNMP traps the device is configured to send. If the output does not include "snmp-server enable traps slb server-down", this is a finding.

Fix: F-40216r639548_fix

The following command enables the device to send an SNMP trap when the health monitor shows the connection to the server is down: snmp-server enable traps slb server-down The following command enables the device to send an SNMP trap when the health monitor shows the connection to the server is up: snmp enable traps slb server-up The following command creates a health monitor for UDP 514 (the Syslog port): health monitor [monitor name] method udp port 514 The following command creates a Server Load Balancing instance and assigns a health monitor to it: slb server server-name [ipaddr | hostname] health-check [monitor]

b
The A10 Networks ADC must not have unnecessary scripts installed.
CM-7 - Medium - CCI-000381 - V-237035 - SV-237035r639552_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
AADC-AG-000034
Vuln IDs
  • V-237035
  • V-67963
Rule IDs
  • SV-237035r639552_rule
  • SV-82453
Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these functions and services are installed and enabled by default. The organization must determine which functions and services are required to perform the content filtering and other necessary core functionality for each component of the device. Unnecessary capabilities or services are often overlooked and therefore may remain unsecured. They increase the risk to the platform by providing additional attack vectors. The A10 Networks ADC can use a TCL-based scripting language called aFleX. Scripts used by an A10 Networks ADC must be documented so that Administrative and Security personnel understand them.
Checks: C-40254r639550_chk

Review the ALG configuration to determine if any aFleX scripts are used on the device. The following command displays all of the configured aFleX scripts: show aflex all If any scripts are present, ask the Administrator for documentation of each script. If no documents can be provided explaining the script and showing where the ISSM or other responsible Security personnel acknowledged the script is being used, this is a finding.

Fix: F-40217r639551_fix

Do not load any unnecessary aFleX scripts on the device.

b
The A10 Networks ADC must use DNS Proxy mode when Global Server Load Balancing is used.
CM-7 - Medium - CCI-000381 - V-237036 - SV-237036r639555_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
AADC-AG-000035
Vuln IDs
  • V-237036
  • V-67965
Rule IDs
  • SV-237036r639555_rule
  • SV-82455
Unrelated or unneeded proxy services increase the attack vector and add excessive complexity to the securing of the device. Multiple application proxies can be installed on many devices. However, proxy types must be limited to related functions. The A10 Networks ADC is capable of DNS-based Global Server Load Balancing (GSLB), which uses Domain Name Service (DNS) to expand load balancing to larger scales, including globally. Global Server Load Balancing can operate in either Proxy mode or Server mode. In Proxy mode, all DNS queries arriving at the DNS Proxy IP address are forwarded to the existing DNS server. In Server mode, the device directly responds to queries for specific service IP addresses in the GSLB zone and can reply with A, AAAA, MX, NS, PTR, SRV, and SOA records. For all other records, the ACOS device will attempt Proxy mode unless configured as fully authoritative.
Checks: C-40255r639553_chk

If DNS-based Global Server Load Balancing is not configured, this is not applicable. If DNS-based Global Server Load Balancing is configured, review the configuration. Check if real servers are configured for DNS. If they are not, then the device is in Server mode, and this is a finding.

Fix: F-40218r639554_fix

If GSLB is used, configure it for Proxy Mode. The difference is that Proxy mode has real servers configured, while Server mode does not. To configure Proxy mode, follow standard SLB configuration steps (Servers, Service Groups, VIP, etc.) that utilize “external” DNS servers and enable it for GSLB when configuring the virtual port.

b
The A10 Networks ADC must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.
CM-7 - Medium - CCI-000382 - V-237037 - SV-237037r639558_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000382
Version
AADC-AG-000036
Vuln IDs
  • V-237037
  • V-67967
Rule IDs
  • SV-237037r639558_rule
  • SV-82457
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. The device must be configured to prevent or restrict the use of prohibited ports, protocols, and services throughout the network by filtering the network traffic and disallowing or redirecting traffic as necessary. Default and updated policy filters from the vendors will disallow older version of protocols and applications and will address most known non-secure ports, protocols, and/or services. However, sources for further policy filters are the IAVMs and the PPSM requirements.
Checks: C-40256r639556_chk

Review the list of authorized applications, endpoints, services, and protocols that have been added to the PPSM database. Review the configured servers, service groups, and virtual servers. The following command shows information for SLB servers: show slb server The following command shows information for service groups (multiple servers): show slb service-group The following command shows information for virtual servers (the services visible to outside hosts): show slb virtual-server If any of the servers, service groups, or virtual servers allows traffic that is prohibited by the PPSM CAL, this is a finding.

Fix: F-40219r639557_fix

Do not configure a server, service group, or virtual server for any port, protocol, or service that is prohibited by the PPSM CAL.

b
The A10 Networks ADC when used for TLS encryption and decryption must validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation.
IA-5 - Medium - CCI-000185 - V-237038 - SV-237038r639561_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000185
Version
AADC-AG-000042
Vuln IDs
  • V-237038
  • V-67969
Rule IDs
  • SV-237038r639561_rule
  • SV-82459
A certificate's certification path is the path from the end entity certificate to a trusted root certification authority (CA). Certification path validation is necessary for a relying party to make an informed decision regarding acceptance of an end entity certificate. Certification path validation includes checks such as certificate issuer trust, time validity and revocation status for each certificate in the certification path. Revocation status information for CA and subject certificates in a certification path is commonly provided via certificate revocation lists (CRLs) or online certificate status protocol (OCSP) responses. The A10 Networks ADC can be configured to use Open Certificate Status Protocol (OCSP) and/or certificate revocation lists (CRLs) to verify the revocation status of certificates. OCSP is preferred since it reduces the overhead associated with CRLs.
Checks: C-40257r639559_chk

If the ALG does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS), this is not applicable. Verify the ALG validates certificates used for TLS functions by performing RFC 5280-compliant certification path validation. If the ALG does not validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation, this is a finding.

Fix: F-40220r639560_fix

If intermediary services for TLS are provided, configure the device to validate certificates used for TLS functions by performing RFC 5280-compliant certification path validation. The following command configures an authentication-server profile for an Online Certificate Status Protocol (OCSP) server: authentication-server ocsp [profile-name]

b
The A10 Networks ADC must not have any unnecessary or unapproved virtual servers configured.
SC-7 - Medium - CCI-001109 - V-237039 - SV-237039r639564_rule
RMF Control
SC-7
Severity
Medium
CCI
CCI-001109
Version
AADC-AG-000047
Vuln IDs
  • V-237039
  • V-67973
Rule IDs
  • SV-237039r639564_rule
  • SV-82463
A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed. A virtual server is an instance where the device accepts traffic from outside hosts and redirects traffic to one or more real servers. In keeping with a deny-all, permit-by-exception policy, the services that the device provides to outside hosts must be only those that are necessary, documented, and approved.
Checks: C-40258r639562_chk

Review the configured servers, service groups, and virtual servers. The following command shows information for SLB servers: show slb server The following command shows information for service groups (multiple servers): show slb service-group The following command shows information for virtual servers (the services visible to outside hosts): show slb virtual-server Ask the Administrator for the list of approved services being provided by the device and compare this against the output of the command listed above. If there are more configured virtual servers than are approved, this is a finding.

Fix: F-40221r639563_fix

Do not configure a server, service group, or virtual server for any unnecessary or unapproved service.

b
The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers.
SI-11 - Medium - CCI-001312 - V-237040 - SV-237040r639567_rule
RMF Control
SI-11
Severity
Medium
CCI
CCI-001312
Version
AADC-AG-000062
Vuln IDs
  • V-237040
  • V-67975
Rule IDs
  • SV-237040r639567_rule
  • SV-82465
Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response headers can disclose vulnerabilities about a web server. This information can be used by an attacker. The A10 Networks ADC can filter response headers; this removes the web server’s identifying headers in outgoing responses (such as Server, X-Powered-By, and X-AspNet-Version).
Checks: C-40259r639565_chk

If the device is not used to load balance web servers, this is not applicable. If the device is used to load balance web servers, verify that the A10 Networks ADC strips HTTP response headers. The following command displays WAF templates: show slb template waf If the configured WAF templates do not have the "filter-resp-hdrs" option configured, this is a finding.

Fix: F-40222r639566_fix

If the device is used to load balance web servers, configure the device to strip HTTP response headers. The following command configures a WAF template and includes the option to strip HTTP response headers: slb template waf filter-resp-hdrs

b
The A10 Networks ADC, when used to load balance web applications, must replace response codes.
SI-11 - Medium - CCI-001312 - V-237041 - SV-237041r639570_rule
RMF Control
SI-11
Severity
Medium
CCI
CCI-001312
Version
AADC-AG-000063
Vuln IDs
  • V-237041
  • V-67977
Rule IDs
  • SV-237041r639570_rule
  • SV-82467
Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response codes can be used by an attacker to learn how a web server responds to particular inputs. Certain codes reveal that a security device or the web server defended against a particular attack, which enables the attacker to eliminate that attack as an option. Using ambiguous response codes makes it more difficult for an attacker to determine what defenses are in place. The A10 Networks ADC can be configured to cloak 4xx and 5xx response codes for outbound responses from a web server. The acceptable HTTP response codes are contained in the preconfigured WAF policy file named "allowed_resp_codes".
Checks: C-40260r639568_chk

If the device is not used to load balance web servers, this is not applicable. If the device is used to load balance web servers, verify that the A10 Networks ADC replaces error response codes. The following command displays WAF templates: show slb template waf If the configured WAF templates do not have the "hide-resp-codes" option configured, this is a finding.

Fix: F-40223r639569_fix

If the device is used to load balance web servers, configure the device to replace error response codes. The following command configures a WAF template and includes the option to cloak response codes: slb template waf hide-resp-codes

b
To protect against data mining, the A10 Networks ADC must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
AC-23 - Medium - CCI-002346 - V-237042 - SV-237042r639573_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002346
Version
AADC-AG-000074
Vuln IDs
  • V-237042
  • V-67979
Rule IDs
  • SV-237042r639573_rule
  • SV-82469
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of information. Injection attacks allow an attacker to inject code into a program or query or inject malware onto a computer to execute remote commands that can read or modify a database, or change data on a website. Web applications frequently access databases to store, retrieve, and update information. An attacker can construct inputs that the database will execute. This is most commonly referred to as a code injection attack. This type of attack includes XPath and LDAP injections. The A10 Networks ADC contains a WAF policy file that provides a basic collection of SQL special characters and keywords that are common to SQL injection attacks. The terms in this policy file can trigger commands in the back-end SQL database and allow unauthorized users to obtain sensitive information. If a request contains a term that matches a search definition in the “sqlia_defs” policy file, the device can be configured to sanitize the request of the SQL command or deny the request entirely. The "sanitize" option uses more processor cycles than the preferred option of “drop”.
Checks: C-40261r639571_chk

If the ADC is not used to load balance web servers where data can be entered and used in databases or other applications, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers where data can be entered and used in databases or other applications. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "sqlia-check" option configured, this is a finding.

Fix: F-40224r639572_fix

If the ADC is used to load balance web servers where data can be entered and used in databases or other applications, configure the ADC to prevent code injection attacks. A Web Application Firewall (WAF) template is configured and bound to a virtual port. The following command configures a WAF template with the SQLIA Check option: slb template waf <template name> sqlia-check [reject | sanitize] Note: The "sanitize" option is allowed but is not preferred due to the increased CPU load.

b
To protect against data mining, the A10 Networks ADC must detect and prevent code injection attacks launched against application objects including, at a minimum, application URLs and application code.
AC-23 - Medium - CCI-002346 - V-237043 - SV-237043r639576_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002346
Version
AADC-AG-000075
Vuln IDs
  • V-237043
  • V-67981
Rule IDs
  • SV-237043r639576_rule
  • SV-82471
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of information. Injection attacks allow an attacker to inject code into a program or query or inject malware onto a computer to execute remote commands that can read or modify a database, or change data on a website. These attacks include buffer overrun, XML, JavaScript, and HTML injections.
Checks: C-40262r639574_chk

If the ADC is not used to load balance web servers where data can be entered and used in databases or other applications, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers where data can be entered and used in databases or other applications. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "sqlia-check" option configured, this is a finding.

Fix: F-40225r639575_fix

If the ADC is used to load balance web servers where data can be entered and used in databases or other applications, configure the ADC to prevent code injection attacks. A Web Application Firewall (WAF) template is configured and bound to a virtual port. The following command configures a WAF template with the SQLIA Check option: slb template waf <template name> sqlia-check [reject | sanitize] Note: The "sanitize" option is allowed but is not preferred due to the increased CPU load.

b
To protect against data mining, the A10 Networks ADC providing content filtering must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
AC-23 - Medium - CCI-002346 - V-237044 - SV-237044r639579_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002346
Version
AADC-AG-000076
Vuln IDs
  • V-237044
  • V-67983
Rule IDs
  • SV-237044r639579_rule
  • SV-82473
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to prevent attacks launched against organizational information from unauthorized data mining may result in the compromise of information. SQL injection attacks are the most prevalent attacks against web applications and databases. These attacks inject SQL commands that can read, modify, or compromise the meaning of the original SQL query. An attacker can spoof identity; expose, tamper, destroy, or make existing data unavailable; or gain unauthorized privileges on the database server.
Checks: C-40263r639577_chk

If the ADC is not used to load balance web servers where data can be entered and used in databases or other applications, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers where data can be entered and used in databases or other applications. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "sqlia-check" option configured, this is a finding.

Fix: F-40226r639578_fix

If the ADC is used to load balance web servers where data can be entered and used in databases or other applications, configure the ADC to prevent code injection attacks. A Web Application Firewall (WAF) template is configured and bound to a virtual port. The following command configures a WAF template with the SQLIA Check option: slb template waf <template name> sqlia-check [reject | sanitize] Note: The "sanitize" option is allowed but is not preferred due to the increased CPU load.

b
To protect against data mining, the A10 Networks ADC providing content filtering must detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.
AC-23 - Medium - CCI-002347 - V-237045 - SV-237045r639582_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002347
Version
AADC-AG-000077
Vuln IDs
  • V-237045
  • V-67987
Rule IDs
  • SV-237045r639582_rule
  • SV-82477
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in the compromise of information. Injection attacks allow an attacker to inject code into a program or query or inject malware onto a computer to execute remote commands that can read or modify a database, or change data on a website. Web applications frequently access databases to store, retrieve, and update information. An attacker can construct inputs that the database will execute. This is most commonly referred to as a code injection attack. This type of attack includes XPath and LDAP injections.
Checks: C-40264r639580_chk

If the ADC is not used to load balance web servers where data can be entered and used in databases or other applications, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers where data can be entered and used in databases or other applications. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "sqlia-check" option configured, this is a finding.

Fix: F-40227r639581_fix

If the ADC is used to load balance web servers where data can be entered and used in databases or other applications, configure the ADC to prevent code injection attacks. A Web Application Firewall (WAF) template is configured and bound to a virtual port. The following command configures a WAF template with the SQLIA Check option: slb template waf <template name> sqlia-check [reject | sanitize] Note: The "sanitize" option is allowed but is not preferred due to the increased CPU load.

b
To protect against data mining, the A10 Networks ADC providing content filtering must detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.
AC-23 - Medium - CCI-002347 - V-237046 - SV-237046r639585_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002347
Version
AADC-AG-000078
Vuln IDs
  • V-237046
  • V-67989
Rule IDs
  • SV-237046r639585_rule
  • SV-82479
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational databases may result in the compromise of information. SQL injection attacks are the most prevalent attacks against web applications and databases. These attacks inject SQL commands that can read, modify, or compromise the meaning of the original SQL query. An attacker can spoof identity; expose, tamper, destroy, or make existing data unavailable; or gain unauthorized privileges on the database server.
Checks: C-40265r639583_chk

If the ADC is not used to load balance web servers where data can be entered and used in databases or other applications, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers where data can be entered and used in databases or other applications. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "sqlia-check" option configured, this is a finding.

Fix: F-40228r639584_fix

If the ADC is used to load balance web servers where data can be entered and used in databases or other applications, configure the ADC to prevent code injection attacks. A Web Application Firewall (WAF) template is configured and bound to a virtual port. The following command configures a WAF template with the SQLIA Check option: slb template waf <template name> sqlia-check [reject | sanitize] Note: The "sanitize" option is allowed but is not preferred due to the increased CPU load.

b
To protect against data mining, the A10 Networks ADC providing content filtering as part of its intermediary services must detect code injection attacks launched against application objects including, at a minimum, application URLs and application code.
AC-23 - Medium - CCI-002347 - V-237047 - SV-237047r639588_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002347
Version
AADC-AG-000079
Vuln IDs
  • V-237047
  • V-67991
Rule IDs
  • SV-237047r639588_rule
  • SV-82481
Data mining is the analysis of large quantities of data to discover patterns and is used in intelligence gathering. Failure to detect attacks launched against organizational applications may result in the compromise of information. Injection attacks allow an attacker to inject code into a program or query or inject malware onto a computer to execute remote commands that can read or modify a database, or change data on a website. These attacks include buffer overrun, XML, JavaScript, and HTML injections.
Checks: C-40266r639586_chk

If the ADC is not used to load balance web servers where data can be entered and used in databases or other applications, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers where data can be entered and used in databases or other applications. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "sqlia-check" option configured, this is a finding.

Fix: F-40229r639587_fix

If the ADC is used to load balance web servers where data can be entered and used in databases or other applications, configure the ADC to prevent code injection attacks. A Web Application Firewall (WAF) template is configured and bound to a virtual port. The following command configures a WAF template with the SQLIA Check option: slb template waf <template name> sqlia-check [reject | sanitize] Note: The "sanitize" option is allowed but is not preferred due to the increased CPU load.

b
The A10 Networks ADC being used for TLS encryption and decryption using PKI-based user authentication must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certificate Authorities (CAs) for the establishment of protected sessions.
SC-23 - Medium - CCI-002470 - V-237048 - SV-237048r639591_rule
RMF Control
SC-23
Severity
Medium
CCI
CCI-002470
Version
AADC-AG-000098
Vuln IDs
  • V-237048
  • V-67993
Rule IDs
  • SV-237048r639591_rule
  • SV-82483
Non-DoD approved PKIs have not been evaluated to ensure that they have security controls and identity vetting procedures in place which are sufficient for DoD systems to rely on the identity asserted in the certificate. PKIs lacking sufficient security controls and identity vetting procedures risk being compromised and issuing certificates that enable adversaries to impersonate legitimate users. The authoritative list of DoD-approved PKIs is published at http://iase.disa.mil/pki-pke/interoperability. DoD-approved PKI CAs may include Category I, II, and III certificates. Category I DoD-Approved External PKIs are PIV issuers. Category II DoD-Approved External PKIs are Non-Federal Agency PKIs cross certified with the Federal Bridge Certification Authority (FBCA). Category III DoD-Approved External PKIs are Foreign, Allied, or Coalition Partner PKIs. Deploying the device with TLS enabled will require the installation of DoD and/or DoD-Approved CA certificates in the trusted root certificate store of each proxy to be used for TLS traffic. This requirement focuses on communications protection for the application session rather than for the network packet.
Checks: C-40267r639589_chk

If the A10 Networks ADC is not used for TLS/SSL decryption for application traffic, this is not applicable. If the A10 Networks ADC is used for TLS/SSL decryption for application traffic, verify the A10 Networks ADC only accepts end entity certificates issued by DoD PKI or DoD-approved PKI CAs for the establishment of protected sessions. If the A10 Networks ADC accepts non-DoD-approved PKI end entity certificates, this is a finding.

Fix: F-40230r639590_fix

If the A10 Networks ADC is used for TLS/SSL decryption for application traffic, import the root and intermediate CA certificates. The certificates can be imported onto the device using FTP or SCP.

c
The A10 Networks ADC must protect against TCP and UDP Denial of Service (DoS) attacks by employing Source-IP based connection-rate limiting.
SC-5 - High - CCI-002385 - V-237049 - SV-237049r639594_rule
RMF Control
SC-5
Severity
High
CCI
CCI-002385
Version
AADC-AG-000099
Vuln IDs
  • V-237049
  • V-67995
Rule IDs
  • SV-237049r639594_rule
  • SV-82485
If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns of known attacks and monitoring for anomalies in traffic volume/type. Detection components that use rate-based behavior analysis can detect attacks when signatures for the attack do not exist or are not installed. These attacks include zero-day attacks which are new attacks for which vendors have not yet developed signatures. Rate-based behavior analysis can detect sophisticated, Distributed DoS (DDoS) attacks by correlating traffic information from multiple network segments or components. This requirement applies to the communications traffic functionality of the device as it pertains to handling communications traffic, rather than to the device itself. The A10 Networks ADC provides Source-IP based connection-rate limiting to mitigate UDP floods and similar attacks. Source-IP based connection-rate limiting protects the system from excessive connection requests from individual clients. If traffic from a client exceeds the configured threshold, the device should be configured to lock out the client for a specified number of seconds. During the lockout period, all connection requests from the client are dropped. The lockout period ranges from 1-3600 seconds (1 hour); there is no default value.
Checks: C-40268r639592_chk

Review the device configuration. The following command displays the device configuration and filters the output on the string "slb conn-rate-limit": show run | inc slb conn-rate-limit If Source-IP based connection rate limiting is not configured, this is a finding. If no lockout period is configured as an action, this is a finding.

Fix: F-40231r639593_fix

The following command configures Source-IP based connection rate limiting: slb conn-rate-limit src-ip [tcp | udp] conn-limit per [100 | 1000] [exceed-action [log] [lock-out lockout-period]] Note: Thresholds are specific to the expected traffic for the system or enclave.

b
The A10 Networks ADC must implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.
SC-5 - Medium - CCI-002385 - V-237050 - SV-237050r639597_rule
RMF Control
SC-5
Severity
Medium
CCI
CCI-002385
Version
AADC-AG-000100
Vuln IDs
  • V-237050
  • V-67997
Rule IDs
  • SV-237050r639597_rule
  • SV-82487
Although maintaining high availability is normally an operational consideration, load balancing is also a useful strategy in mitigating network-based DoS attacks. If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancing provides service redundancy which reduces the susceptibility of the enclave to many DoS attacks. Since one of the primary purposes of the Application Delivery Controller is to balance loads across multiple servers, it would be extremely unusual for it to not be configured to perform this function.
Checks: C-40269r639595_chk

Review the device configuration. Ask the Administrator which Application Delivery Services are being provided by the device. The following command displays information for Server Load Balancing: show slb If no Server Load Balancing sessions exist, this is a finding.

Fix: F-40232r639596_fix

Configure the device to balance the traffic load of provided services. This will require configuring Server Load Balancing.

b
The A10 Networks ADC must enable DDoS filters.
SC-5 - Medium - CCI-002385 - V-237051 - SV-237051r639600_rule
RMF Control
SC-5
Severity
Medium
CCI
CCI-002385
Version
AADC-AG-000101
Vuln IDs
  • V-237051
  • V-67999
Rule IDs
  • SV-237051r639600_rule
  • SV-82489
If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns of known attacks and monitoring for anomalies in traffic volume, type, or protocol usage. Detection components that use signatures can detect known attacks by using known attack signatures. Signatures are usually obtained from and updated by the vendor.
Checks: C-40270r639598_chk

Review the device configuration. The following command displays the device configuration and filters the output on the string "anomaly-drop": show run | inc anomaly-drop The output should display the following commands: ip anomaly-drop ip-option ip anomaly-drop land-attack ip anomaly-drop ping-of-death ip anomaly-drop frag ip anomaly-drop tcp-no-flag ip anomaly-drop tcp-syn-fin ip anomaly-drop tcp-syn-frag ip anomaly-drop out-of-sequence [threshold] ip anomaly-drop ping-of-death ip anomaly-drop zero-window [threshold] ip anomaly-drop bad-content If the output does not show these commands, this is a finding.

Fix: F-40233r639599_fix

The following commands configure DDoS filters: ip anomaly-drop ip-option ip anomaly-drop land-attack ip anomaly-drop ping-of-death ip anomaly-drop frag ip anomaly-drop tcp-no-flag ip anomaly-drop tcp-syn-fin ip anomaly-drop tcp-syn-frag ip anomaly-drop out-of-sequence [threshold] ip anomaly-drop ping-of-death ip anomaly-drop zero-window [threshold] ip anomaly-drop bad-content Note: Thresholds are specific to the expected traffic for the system or enclave.

b
The A10 Networks ADC, when used to load balance web applications, must examine incoming user requests against the URI White Lists.
SC-7 - Medium - CCI-002403 - V-237052 - SV-237052r639603_rule
RMF Control
SC-7
Severity
Medium
CCI
CCI-002403
Version
AADC-AG-000103
Vuln IDs
  • V-237052
  • V-68001
Rule IDs
  • SV-237052r639603_rule
  • SV-82491
Unrestricted traffic may contain malicious traffic, which poses a threat to an enclave or to other connected networks. Additionally, unrestricted traffic may transit a network, which uses bandwidth and other resources. Access control policies and access control lists implemented on devices that control the flow of network traffic (e.g., application level firewalls and Web content filters), ensure the flow of traffic is only allowed from authorized sources to authorized destinations. Networks with different levels of trust (e.g., the Internet or CDS) must be kept separate. The URI White List defines acceptable destination URIs allowed for incoming requests. The White List Check compares the URI of an incoming request against the rules contained in the URI White List policy file. Connection requests are accepted only if the URI matches a rule in the URI White List. Note: A URI Black List can also be configured, which takes priority over a URI White List. However, since deny-all, permit by exception is a fundamental principle, a URI White List is necessary.
Checks: C-40271r639601_chk

If the device is not used to load balance web servers, this is not applicable. Review the device configuration. The following command displays WAF templates: show slb template waf If the configured WAF template does not have the "uri-wlistcheck" option configured, this is a finding.

Fix: F-40234r639602_fix

If the device is used to load balance web servers, configure the URI White List. The following commands configure the ADC to compare incoming traffic against the URI White List: slb template waf [template-name] uri-wlistcheck [file-name]

a
The A10 Networks ADC, when used to load balance web applications, must enable external logging for WAF data event messages.
SI-4 - Low - CCI-002656 - V-237053 - SV-237053r639606_rule
RMF Control
SI-4
Severity
Low
CCI
CCI-002656
Version
AADC-AG-000107
Vuln IDs
  • V-237053
  • V-68005
Rule IDs
  • SV-237053r639606_rule
  • SV-82495
Without coordinated reporting between separate devices, it is not possible to identify the true scale and possible target of an attack. External logging must be enabled for WAF data event messages. External logging is activated once the WAF template that uses the logging template is bound to an HTTP/HTTPS virtual port.
Checks: C-40272r639604_chk

If the device is not used to load balance web servers, this is not applicable. Review the device configuration and ask the device Administrator which templates are used. If no SLB instance for the log server(s) is configured, this is a finding. If there is no service group with assigned members for the log servers or the service group is not included in the logging template, this is a finding. If no logging template is configured and bound to the WAF template, this is a finding.

Fix: F-40235r639605_fix

If the device is used to load balance web servers, configure external logging for WAF data event messages. Create a server configuration for each log server. The following command adds a server: slb server [server-name] [ipaddr] The following command specifies the TCP or UDP port number on which the server will listen for log traffic: port [port-num] [tcp | udp] If multiple log servers are used, add the log servers to a service group. Use the round-robin load-balancing method, which is the default method. The following command creates the service group: slb service-group [group-name] [tcp | udp] The following command adds each log server and its TCP or UDP port to the service group: member [server-name:portnum] The following command creates a logging template: slb template logging [template-name] The following command adds the service group containing the log servers to the logging template: service-group [group-name] The following commands bind the logging template to the WAF template: slb template waf [template-name] template logging [template-name]

b
The A10 Networks ADC must enable logging for packet anomaly events.
SI-4 - Medium - CCI-002664 - V-237054 - SV-237054r639609_rule
RMF Control
SI-4
Severity
Medium
CCI
CCI-002664
Version
AADC-AG-000113
Vuln IDs
  • V-237054
  • V-68009
Rule IDs
  • SV-237054r639609_rule
  • SV-82499
Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay may result in the loss or compromise of information. Since these incidents require immediate action, these messages are assigned a critical or level 1 priority/severity, depending on the system's priority schema. These systems must generate an alert when detection events from real-time monitoring occur. Alerts may be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. The device must either send the alert to a management console that is actively monitored by authorized personnel or use a messaging capability to send the alert directly to designated personnel. The A10 Networks ADC must be configured to generate a log message when IP anomalies are detected.
Checks: C-40273r639607_chk

Review the device configuration. The following command displays the device configuration and filters the output on the string "log": show run | inc log If the output does not include the command "system anomaly log", this is a finding.

Fix: F-40236r639608_fix

The following command enables logging of packet anomaly events: system anomaly log

b
The A10 Networks ADC must generate an alert to, at a minimum, the ISSO and ISSM when threats identified by authoritative sources (e.g., IAVMs or CTOs) are detected.
SI-4 - Medium - CCI-002664 - V-237055 - SV-237055r639612_rule
RMF Control
SI-4
Severity
Medium
CCI
CCI-002664
Version
AADC-AG-000114
Vuln IDs
  • V-237055
  • V-68105
Rule IDs
  • SV-237055r639612_rule
  • SV-82595
Without an alert, security personnel may be unaware of major detection incidents that require immediate action and this delay may result in the loss or compromise of information. The device generates an alert which notifies designated personnel of the Indicators of Compromise (IOCs) which require real-time alerts. These messages should include a severity level indicator or code as an indicator of the criticality of the incident. These indicators reflect the occurrence of a compromise or a potential compromise. Since these incidents require immediate action, these messages are assigned a critical or level 1 priority/severity, depending on the system's priority schema. Alerts may be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. The device must either send the alert to a management console that is actively monitored by authorized personnel or use a messaging capability to send the alert directly to designated personnel.
Checks: C-40274r639610_chk

Ask the device administrator which method is used to send messages when threats are detected. Review the device configuration. If there is no method and target configured, this is a finding.

Fix: F-40237r639611_fix

These are two of the three possible methods of notification that can be configured. The following command enables SNMP traps: snmp-server enable traps Note: This will enable sending all traps. The following command configures the SNMPv3 trap receiver (target): snmp-server host trap-receiver version v3 Up to 16 trap receivers can be configured. For security, SNMP and SNMP trap are disabled on all data interfaces. Use the enable-management command to enable SNMP on the management interface. The following command configures log email settings: logging email buffer number [num] time [minutes] By default, emailing of log messages is disabled. If this is enabled, the buffer options have the following default values: number – 50, time – 10. The following command configures an email filter: logging email filter filter-num conditions operators [trigger] Since there are alerts that require immediate action, use the "trigger" option. This immediately sends the messages rather than buffering them. The following command specifies the email address to which to email the log messages: logging email-address [address] More than one email address can be set.

b
The A10 Networks ADC must enable logging of Denial of Service (DoS) attacks.
SI-4 - Medium - CCI-002664 - V-237056 - SV-237056r639615_rule
RMF Control
SI-4
Severity
Medium
CCI
CCI-002664
Version
AADC-AG-000117
Vuln IDs
  • V-237056
  • V-68011
Rule IDs
  • SV-237056r639615_rule
  • SV-82501
Without an alert, security personnel may be unaware of major detection incidents that require immediate action, and this delay may result in the loss or compromise of information. CJCSM 6510.01B, "Cyber Incident Handling Program", lists nine Cyber Incident and Reportable Event Categories. DoD has determined that categories identified by CJCSM 6510.01B Major Indicators (category 1, 2, 4, or 7 detection events) will require an alert when an event is detected. Alerts may be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. The device must either send the alert to a management console that is actively monitored by authorized personnel or use a messaging capability to send the alert directly to designated personnel. The A10 Networks ADC must be configured to generate a log message when IP anomalies and DoS attacks are detected.
Checks: C-40275r639613_chk

Review the device configuration. The following command displays the device configuration and filters the output on the string "log": show run | inc log If the output does not include the command "system attack log", this is a finding.

Fix: F-40238r639614_fix

The following command enables logging of DDoS attacks: system attack log

b
The A10 Networks ADC, when used for load-balancing web servers, must not allow the HTTP TRACE and OPTIONS methods.
SI-10 - Medium - CCI-001310 - V-237057 - SV-237057r639618_rule
RMF Control
SI-10
Severity
Medium
CCI
CCI-001310
Version
AADC-AG-000122
Vuln IDs
  • V-237057
  • V-68013
Rule IDs
  • SV-237057r639618_rule
  • SV-82503
HTTP offers a number of methods that can be used to perform actions on the web server. Some of these HTTP methods can be used for nefarious purposes if the web server is misconfigured. The two HTTP methods used for normal requests are GET and POST, so incoming requests should be limited to those methods. Although the HTTP TRACE method is useful for debugging, it enables cross-site scripting attacks. By exploiting certain browser vulnerabilities, an attacker may manipulate the TRACE method. The HEAD, GET, POST, and CONNECT methods are generally regarded as safe. For a WAF template, the GET and POST are the default values and are the safest options, so restriction the methods to GET and POST is recommended.
Checks: C-40276r639616_chk

If the ADC is not used to load balance web servers, this is not applicable. Interview the device administrator to determine which WAF template is used for web servers. Review the device configuration. The following command displays the configuration and filters the output on the WAF template section: show run | sec slb template waf If there is no WAF template, this is a finding. If the WAF template allows the HTTP TRACE method, this is a finding.

Fix: F-40239r639617_fix

The following commands configure the ADC to restrict the HTTP methods: slb template waf [template-name] allowed-http-methods GET POST HEAD PUT DELETE CONNECT PURGE Note: GET and POST are the default values and are the safest choices. Restricting the methods to GET and POST is recommended.

b
The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
SI-11 - Medium - CCI-001314 - V-237058 - SV-237058r639621_rule
RMF Control
SI-11
Severity
Medium
CCI
CCI-001314
Version
AADC-AG-000123
Vuln IDs
  • V-237058
  • V-68015
Rule IDs
  • SV-237058r639621_rule
  • SV-82505
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can give configuration details about the network element. Limiting access to system logs and administrative consoles to authorized personnel will help to mitigate this risk. However, user feedback and error messages should also be restricted by type and content in accordance with security best practices (e.g., ICMP messages). In the A10 Networks ADC, the audit log is maintained in a separate file separate from the system log. Access to the audit log is role-based. The audit log messages that are displayed for an admin depend upon that administrator’s role (privilege level). Administrators with Root, Read Write, or Read Only privileges who view the audit log can view all the messages, for all system partitions.
Checks: C-40277r639619_chk

Review the device configuration. Enter the following command to view detailed information about the administrative accounts: show admin detail The output of this command will show the Access type, the Privilege level, and GUI role among other parameters. If persons other than other than the authorized individuals (ISSO, ISSM, and SA) have Root, Read Write, or Read Only privileges, this is a finding.

Fix: F-40240r639620_fix

Do not assign anyone who is not the ISSO, ISSM, and authorized System Administrators to be Administrators with Root, Read Write, or Read Only privileges. Do not configure accounts with Root, Read Write, or Read Only privileges for anyone other than the authorized individuals (ISSO, ISSM, and SA).

a
The A10 Networks ADC must, at a minimum, off-load audit log records onto a centralized log server.
AU-4 - Low - CCI-001851 - V-237059 - SV-237059r639624_rule
RMF Control
AU-4
Severity
Low
CCI
CCI-001851
Version
AADC-AG-000140
Vuln IDs
  • V-237059
  • V-68019
Rule IDs
  • SV-237059r639624_rule
  • SV-82509
Off-loading ensures audit information does not get overwritten if the limited audit storage capacity is reached and also protects the audit record in case the system/component being audited is compromised. Off-loading is a common process in information systems with limited audit storage capacity. The audit storage on the device is used only in a transitory fashion until the system can communicate with the centralized log server designated for storing the audit records, at which point the information is transferred. However, DoD requires that the log be transferred in real time which indicates that the time from event detection to off-loading is seconds or less. This does not apply to audit logs generated on behalf of the device itself (management).
Checks: C-40278r639622_chk

Review the device configuration. The following command shows the portion of the device configuration that includes the string "host": show run | inc host If the output does not display the "logging auditlog host" commands, this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.

Fix: F-40241r639623_fix

Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] “ipaddr | hostname” is the IP address or hostname of the server. “facility-name” is the name of a log facility.

b
The A10 Networks ADC, when used for load balancing web servers, must deploy the WAF in active mode.
CM-6 - Medium - CCI-000366 - V-237060 - SV-237060r639627_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
AADC-AG-000143
Vuln IDs
  • V-237060
  • V-68021
Rule IDs
  • SV-237060r639627_rule
  • SV-82511
The Web Application Firewall (WAF) supports three operational modes - Learning, Passive, and Active. Active is the standard operational mode and must be used in order to drop or sanitize traffic. Learning mode is used in lab environments to initially set thresholds for certain WAF checks and should not be used in production networks. Passive mode applies enabled WAF checks, but no action is taken upon matching traffic. This mode is useful in identifying false positives for filtering. Only Active mode filters web traffic.
Checks: C-40279r639625_chk

Review the device configuration. The following command displays the configuration and filters the output on the WAF template section: show run | sec slb template waf If the output contains either "deploy-mode passive" or "deploy-mode learning", this is a finding. Note: Since deploy-mode active is the default value, it will not appear in the output.

Fix: F-40242r639626_fix

The following command sets the deployment mode of the WAF template: slb template waf [template name] deploy-mode active

b
If the Data Owner requires it, the A10 Networks ADC must be configured to perform CCN Mask, SSN Mask, and PCRE Mask Request checks.
CM-6 - Medium - CCI-000366 - V-237061 - SV-237061r639630_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
AADC-AG-000154
Vuln IDs
  • V-237061
  • V-68023
Rule IDs
  • SV-237061r639630_rule
  • SV-82513
If outbound communications traffic is not continuously monitored, hostile activity may not be detected and prevented. Output from application and traffic monitoring serves as input to continuous monitoring and incident response programs. The A10 Networks ADC can be configured to mask data traversing outbound through the device. This is useful in preventing data exfiltration. If any data must be masked before it leaves the enclave (such as Credit Card Numbers, Social Security Numbers, or other sensitive information), a WAF template can be configured with CCN Mask, SSN Mask, and PCRE Mask Request checks. The Mask Request check depends on what information must be masked. This includes using Perl Compatible Regular Expressions (PCRE) for custom masks.
Checks: C-40280r639628_chk

Review the device configuration and ask the device Administrator which templates are used for masking sensitive data. The following command displays the configuration and filters the output on the WAF template section: show run | sec slb template waf If there is no WAF template with the required Mask Request checks, this is a finding.

Fix: F-40243r639629_fix

Review the system or enclave documentation and confer with the data owner(s) if necessary. If any data must be masked before it leaves the enclave (such as credit card numbers, Social Security numbers, or other sensitive information), configure the CCN Mask, SSN Mask, and PCRE Mask Request checks. These checks are applied to a WAF template. The following command replaces all but the last four digits of credit card numbers with an “x” character: ccn-mask The following command replaces all but the last four digits of US Social Security numbers with an “x” character: ssn-mask The following command cloaks patterns in a response that match the specified PCRE pattern: pcre-scrub [pcre-pattern] [keep-end [num-length] |keep-start [num-length] |mask [character]]

c
The A10 Networks ADC must protect against ICMP-based Denial of Service (DoS) attacks by employing ICMP Rate Limiting.
SC-5 - High - CCI-002385 - V-237062 - SV-237062r639633_rule
RMF Control
SC-5
Severity
High
CCI
CCI-002385
Version
AADC-AG-000155
Vuln IDs
  • V-237062
  • V-68025
Rule IDs
  • SV-237062r639633_rule
  • SV-82515
If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation of content filtering gateways and application layer firewalls at key boundaries in the architecture mitigates the risk of DoS attacks. These attacks can be detected by matching observed communications traffic with patterns of known attacks and monitoring for anomalies in traffic volume/type. Detection components that use rate-based behavior analysis can detect attacks when signatures for the attack do not exist or are not installed. These attacks include zero-day attacks which are new attacks for which vendors have not yet developed signatures. Rate-based behavior analysis can detect sophisticated, Distributed DoS (DDoS) attacks by correlating traffic information from multiple network segments or components. The A10 Networks ADC provides an ICMP Rate Limiting feature that monitors the rate of ICMP traffic and drops ICMP packets when the configured thresholds (the normal rate) are exceeded.
Checks: C-40281r639631_chk

Review the device configuration. The following command displays the device configuration and filters the output on the string "icmp-rate-limit": show run | inc icmp-rate-limit If ICMP rate limiting is not configured, this is a finding. If no lockout period and maximum rates are configured as an action, this is a finding.

Fix: F-40244r639632_fix

The following command configures ICMP rate limiting: icmp-rate-limit [normal-rate] lockup [max-rate] [lockup-time]

b
The A10 Networks ADC must protect against TCP SYN floods by using TCP SYN Cookies.
CM-6 - Medium - CCI-000366 - V-237063 - SV-237063r639636_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
AADC-AG-000156
Vuln IDs
  • V-237063
  • V-68027
Rule IDs
  • SV-237063r639636_rule
  • SV-82517
A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target in an attempt to consume resources, making the device unresponsive to legitimate traffic. TCP SYN Cookies are commonly implemented by the Operating System on endpoints, but are also often implemented on network devices. A10 Networks ADCs provide protection against TCP SYN flood attacks by using SYN cookies. SYN cookies enable the device to continue to serve legitimate clients during a TCP SYN flood attack without allowing illegitimate traffic to consume system resources.
Checks: C-40282r639634_chk

Review the device configuration. The following command displays the device configuration and filters the output on the string "syn-cookie": show run | inc syn-cookie If SYN cookies are not enabled, this is a finding.

Fix: F-40245r639635_fix

The following command enables hardware-based SYN cookies: syn-cookie on-threshold [num] off-threshold [num] Note: Hardware-based SYN cookies are available only on some models. If the "on-threshold" and "off-threshold" options are omitted, SYN cookies are enabled and are always on regardless of the number of half-open TCP connections.

c
The A10 Networks ADC must be a FIPS-compliant version.
CM-6 - High - CCI-000366 - V-237064 - SV-237064r639639_rule
RMF Control
CM-6
Severity
High
CCI
CCI-000366
Version
AADC-AG-000157
Vuln IDs
  • V-237064
  • V-68029
Rule IDs
  • SV-237064r639639_rule
  • SV-82519
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated. FIPS compliance is mandated for many functions of network devices. The A10 Networks ADC platforms are either FIPS-compliant versions or non-compliant versions. It is necessary to deploy the FIPS-compliant versions of the model(s). FIPS versions are identified by the designation "FIPS" in the stock keeping unit (SKU).
Checks: C-40283r639637_chk

The following command shows the version of ACOS used and other related information: show version If the output does not include "Platform features: fips", this is a finding.

Fix: F-40246r639638_fix

Verify that the units deployed are the FIPS-compliant versions. This is identified by the designation "FIPS" in the stock keeping unit (SKU).