A10 Networks ADC NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +38 −37
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 38
- V-255587 Medium The A10 Networks ADC must limit the number of concurrent sessions to one (1) for each administrator account and/or administrator account type.
- V-255588 Medium The A10 Networks ADC must enforce the limit of three consecutive invalid logon attempts.
- V-255589 Low The A10 Networks ADC must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- V-255590 Medium The A10 Networks ADC must allow only the ISSM (or individuals or roles appointed by the ISSM) Root, Read Write, or Read Only privileges.
- V-255591 Low The A10 Networks ADC must produce audit log records containing information (FQDN, unique hostname, management or loopback IP address) to establish the source of events.
- V-255592 Low The A10 Networks ADC must have command auditing enabled.
- V-255593 Low The A10 Networks ADC must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- V-255594 Low The A10 Networks ADC must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- V-255595 Medium The A10 Networks ADC must disable management protocol access to all interfaces except the management interface.
- V-255596 Medium The A10 Networks ADC must not have any shared accounts (other than the emergency administration account).
- V-255597 High The A10 Networks ADC must not use the default admin account.
- V-255598 Medium The A10 Networks ADC must implement replay-resistant authentication mechanisms for network access to privileged accounts.
- V-255599 Medium The A10 Networks ADC must prohibit the use of unencrypted protocols for network access to privileged accounts.
- V-255600 High The A10 Networks ADC must terminate management sessions after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
- V-255601 Medium The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
- V-255602 High The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are created.
- V-255603 Medium The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are modified.
- V-255604 Medium The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are disabled.
- V-255605 Medium The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are removed.
- V-255606 Medium When anyone who has access to the emergency administration account no longer requires access to it or leaves the organization, the password for the emergency administration account must be changed.
- V-255607 Medium The A10 Networks ADC must notify System Administrators (SAs) and Information System Security Officers (ISSMs) when accounts are created, or enabled when previously disabled.
- V-255608 Medium The A10 Networks ADC must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-255609 Low The A10 Networks ADC must send Emergency messages to the Console, Syslog, and Monitor.
- V-255610 Low The A10 Networks ADC must compare internal information system clocks at least every 24 hours with an authoritative time server.
- V-255611 Low The A10 Networks ADC must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
- V-255612 Medium The A10 Networks ADC must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- V-255613 Medium The A10 Networks ADC must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-255614 Medium The A10 Networks ADC must authenticate Network Time Protocol sources.
- V-255615 Medium Operators of the A10 Networks ADC must not use the Telnet client built into the device.
- V-255616 High The A10 Networks ADC must not use SNMP Versions 1 or 2.
- V-255617 Medium The A10 Networks ADC must off-load audit records onto a different system or media than the system being audited.
- V-255618 Medium The A10 Networks ADC must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.
- V-255619 Medium The A10 Networks ADC must employ centrally managed authentication server(s).
- V-255620 Medium The A10 Networks ADC must use DoD-approved PKI rather than proprietary or self-signed device certificates.
- V-255621 Medium The A10 Networks ADC must restrict management connections to the management network.
- V-255622 Medium The A10 Networks ADC must only allow the use of secure protocols that implement cryptographic mechanisms to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.
- V-255623 High The A10 Networks ADC must not use the default enable password.
- V-264426 High The A10 Networks NDM must be using a version supported by the vendor.
Removed rules 37
- V-68031 Medium The A10 Networks ADC must limit the number of concurrent sessions to one (1) for each administrator account and/or administrator account type.
- V-68033 Medium The A10 Networks ADC must enforce the limit of three consecutive invalid logon attempts.
- V-68035 Low The A10 Networks ADC must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- V-68037 Medium The A10 Networks ADC must allow only the ISSM (or individuals or roles appointed by the ISSM) Root, Read Write, or Read Only privileges.
- V-68039 Low The A10 Networks ADC must produce audit log records containing information (FQDN, unique hostname, management or loopback IP address) to establish the source of events.
- V-68041 Low The A10 Networks ADC must have command auditing enabled.
- V-68043 Low The A10 Networks ADC must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- V-68045 Low The A10 Networks ADC must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- V-68047 Medium The A10 Networks ADC must disable management protocol access to all interfaces except the management interface.
- V-68049 Medium The A10 Networks ADC must not have any shared accounts (other than the emergency administration account).
- V-68051 High The A10 Networks ADC must not use the default admin account.
- V-68053 Medium The A10 Networks ADC must implement replay-resistant authentication mechanisms for network access to privileged accounts.
- V-68055 Medium The A10 Networks ADC must prohibit the use of unencrypted protocols for network access to privileged accounts.
- V-68057 High The A10 Networks ADC must terminate management sessions after 10 minutes of inactivity except to fulfill documented and validated mission requirements.
- V-68059 Medium The A10 Networks ADC must reveal error messages only to authorized individuals (ISSO, ISSM, and SA).
- V-68061 High The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are created.
- V-68063 Medium The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are modified.
- V-68065 Medium The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are disabled.
- V-68067 Medium The A10 Networks ADC must generate alerts to the administrators and ISSO when accounts are removed.
- V-68069 Medium When anyone who has access to the emergency administration account no longer requires access to it or leaves the organization, the password for the emergency administration account must be changed.
- V-68071 Medium The A10 Networks ADC must notify System Administrators (SAs) and Information System Security Officers (ISSMs) when accounts are created, or enabled when previously disabled.
- V-68073 Medium The A10 Networks ADC must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-68075 Low The A10 Networks ADC must send Emergency messages to the Console, Syslog, and Monitor.
- V-68077 Low The A10 Networks ADC must compare internal information system clocks at least every 24 hours with an authoritative time server.
- V-68079 Low The A10 Networks ADC must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
- V-68081 Medium The A10 Networks ADC must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.
- V-68083 Medium The A10 Networks ADC must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- V-68085 Medium The A10 Networks ADC must authenticate Network Time Protocol sources.
- V-68087 Medium Operators of the A10 Networks ADC must not use the Telnet client built into the device.
- V-68089 High The A10 Networks ADC must not use SNMP Versions 1 or 2.
- V-68091 Medium The A10 Networks ADC must off-load audit records onto a different system or media than the system being audited.
- V-68093 High The A10 Networks ADC must not use the default enable password.
- V-68095 Medium The A10 Networks ADC must only allow the use of secure protocols that implement cryptographic mechanisms to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.
- V-68097 Medium The A10 Networks ADC must restrict management connections to the management network.
- V-68099 Medium The A10 Networks ADC must use DoD-approved PKI rather than proprietary or self-signed device certificates.
- V-68101 Medium The A10 Networks ADC must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.
- V-68103 Medium The A10 Networks ADC must employ centrally managed authentication server(s).
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- AADC-NM-000001
- Vuln IDs
-
- V-255587
- V-68031
- Rule IDs
-
- SV-255587r960735_rule
- SV-82521
Checks: C-59260r873550_chk
Review the device configuration. The following command shows the configuration with an output modifier to display only the phrase "multiple-auth-reject": show run | inc multiple-auth-reject If the output is blank, this is a finding.
Fix: F-59203r873551_fix
The following command disables concurrent logons for any administrative account: authentication multiple-auth-reject
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- AADC-NM-000015
- Vuln IDs
-
- V-255588
- V-68033
- Rule IDs
-
- SV-255588r960840_rule
- SV-82523
Checks: C-59261r873553_chk
Review the configuration. The following command shows the device configuration and filters the output on the keyword "lockout": show run | inc lockout View the output; it will contain these commands: admin lockout enable admin lockout reset-time 15 admin lockout threshold 3 If it does not, this is a finding.
Fix: F-59204r873554_fix
The following command enables admin lockout: admin lockout enable The following example locks the admin account after three failed logon attempts sets the A10 ADC to remember the last failed logon for 15 minutes: admin lockout threshold 3 admin lockout reset-time 15 Note: This will be applied to all administrative accounts.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- AADC-NM-000016
- Vuln IDs
-
- V-255589
- V-68035
- Rule IDs
-
- SV-255589r960843_rule
- SV-82525
Checks: C-59262r873556_chk
Observe someone logging onto the device. If the device does not present a DoD-approved banner, this is a finding. For the CLI, the short form of the banner is acceptable. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't."
Fix: F-59205r873557_fix
The following command sets the banner to be displayed when an administrator logs onto the CLI: banner login multi-line "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. I've read and consent to the terms in the IS User Agreement." Note: The " is the end-marker that delineates the banner text. The following process adds a Logon Banner to CLI and a Web Logon Message: In the WebGUI, navigate to Config Mode >> System >> Settings >> Terminal >> Banner For Banner Type: Select multi-line. Enter the approved text (short version) in the Logon Banner: text entry area. Enter the approved text (either version) in the Web Logon Message: text entry area. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreem't." Select the "OK" box at the bottom of the screen.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000171
- Version
- AADC-NM-000023
- Vuln IDs
-
- V-255590
- V-68037
- Rule IDs
-
- SV-255590r961863_rule
- SV-82527
Checks: C-59263r873559_chk
Review the device configuration. Enter the following command to view detailed information about the administrative accounts: show admin detail The output of this command will show the Access type, Privilege level, and GUI role, among other parameters. If persons other than the ISSM (or individuals or roles appointed by the ISSM) have Root, Read Write, or Read Only privileges, this is a finding.
Fix: F-59206r873560_fix
Do not configure accounts with Root, Read Write, or Read Only privileges for anyone other than the ISSM (or individuals or roles appointed by the ISSM).
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000133
- Version
- AADC-NM-000029
- Vuln IDs
-
- V-255591
- V-68039
- Rule IDs
-
- SV-255591r960900_rule
- SV-82529
Checks: C-59264r873562_chk
Observe someone logging onto the device. The prompt will appear after a successful logon. If the prompt is not a unique hostname assigned by the organization, this is a finding. Note: The device automatically includes the hostname in each Syslog message.
Fix: F-59207r873563_fix
The following command will change the hostname: hostname [string] The string can contain 1 to 31 characters and can contain the following characters: a-z A-Z 0-9 - . ( ) Note: The device automatically includes the hostname in each Syslog message.
- RMF Control
- AU-3
- Severity
- L
- CCI
- CCI-000135
- Version
- AADC-NM-000032
- Vuln IDs
-
- V-255592
- V-68041
- Rule IDs
-
- SV-255592r960909_rule
- SV-82531
Checks: C-59265r873565_chk
Review the device configuration. The following command displays the configuration and includes an output modifier to filter on the word "audit": show run | inc audit If the output does not include "audit enable privilege", this is a finding.
Fix: F-59208r873566_fix
The following command enables command auditing: audit enable privilege The privilege option enables logging of Privileged EXEC commands also. Without this option, only configuration commands are logged. Use this option.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-000139
- Version
- AADC-NM-000033
- Vuln IDs
-
- V-255593
- V-68043
- Rule IDs
-
- SV-255593r961863_rule
- SV-82533
Checks: C-59266r873568_chk
Review the device configuration. The following command shows the configured Server Load Balancing instances: show run | sec slb If no Server Load Balancing instance is configured with a health check to the Syslog server, this is a finding. The following command shows the device configuration and filters the output on the string "snmp": show run | inc snmp This will include which SNMP traps the device is configured to send. If the output does not include "snmp-server enable traps slb server-down", this is a finding.
Fix: F-59209r873569_fix
The following command enables the device to send an SNMP trap when the health monitor shows the connection to the server is down: snmp-server enable traps slb server-down The following command enables the device to send an SNMP trap when the health-monitor shows the connection to the server is up: snmp enable traps slb server-up The following command creates a health monitor for UDP 514 (the Syslog port): health monitor [monitor name] method udp port 514 The following command creates a Server Load Balancing instance and assigns a health monitor to it: slb server server-name [ipaddr | hostname] health-check [monitor]
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- AADC-NM-000042
- Vuln IDs
-
- V-255594
- V-68045
- Rule IDs
-
- SV-255594r961863_rule
- SV-82535
Checks: C-59267r873571_chk
This requirement can be met by use of a syslog/audit log server if the device is configured to send logs to that server. Review the device configuration. Enter the command to view the logging policy: sho log policy If the output shows syslog hosts are configured, this not is a finding. If the output shows syslog as enabled, this is not a finding. If it is not configured to send audit and event logs to a syslog server, enter the command to view the scheduled backup of the log: show backup If the there is no backup configured, this is a finding. If the backup period is not seven days or less, this is a finding. If the last backup failed and it has been more than seven days since the last backup, this is a finding.
Fix: F-59210r873572_fix
To configure the network device to send audit and event logs to a syslog server: The following command enables logging using the syslog protocol: logging syslog [severity-level] The severity level can be any one of the following options: emergency, alert, critical, error, warning, notification, information, debugging. The following command specifies where to send syslog messages: logging host [ipaddr][port protocol-port] "ipaddr" is the IP address of the syslog server. Up to 10 remote logging servers are supported. "port" is the protocol port number to which to send messages. All logging servers must use the same port. The default port is 514. The following command sends the audit log records to a specific syslog server (Note: The event log and the audit log are separate logs): logging auditlog host [ipaddr | hostname] [facility facility-name] "ipaddr" is the IP address of the syslog server. "hostname" is the hostname of the syslog server. "facility" is the facility code to use for messages sent from the device. To configure the network device to backup logs to a file server: The following command periodically backs up (copies) the log to a specific server: backup periodically log [hour num | day num | week num] [use-mgmt-port] url The hour, day, and week options are the frequency of backups. The use-mgmt-port option uses the management interface as the source interface for the connection to the remote device. The url specifies the file transfer protocol, username (if required), and directory path. Since secure protocols are required, use either SCP or SFTP: scp://[user@]host/file/ or sftp://[user@]host/file/ "user" is the account configured on the backup server. "host" is the backup server. "file" is the name of the file on the backup server. When the command is entered, the device will prompt for the password of the backup server. This password is saved to a profile.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- AADC-NM-000046
- Vuln IDs
-
- V-255595
- V-68047
- Rule IDs
-
- SV-255595r960966_rule
- SV-82537
Checks: C-59268r873574_chk
Review the device configuration. The following command displays the types of management access allowed on each of the device's interfaces: show management If SSH, Telnet, HTTP, HTTPS, or SNMP is "on" for any of the interfaces other than the management interface, this is a finding. Note: Ping may be used on inward-facing interfaces.
Fix: F-59211r873575_fix
The following command disables ping, SSH, Telnet, HTTP, HTTPS, and SNMP to a range of interfaces: no enable-management service all ethernet [number] to [number] Note: Ping may be used on inward-facing interfaces.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- AADC-NM-000047
- Vuln IDs
-
- V-255596
- V-68049
- Rule IDs
-
- SV-255596r961863_rule
- SV-82539
Checks: C-59269r873577_chk
Review the device configuration. Enter the following command to view all administrative accounts: show admin detail If there are any shared accounts other than the emergency administration account, this is a finding. Obtain the list of accounts configured on the authentication server. If there are any shared accounts other than the emergency administration account, this is a finding.
Fix: F-59212r873578_fix
Do not configure any shared accounts, either on the A10 ADC itself or on the authentication servers. The only exception to this is the emergency administration account.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- AADC-NM-000048
- Vuln IDs
-
- V-255597
- V-68051
- Rule IDs
-
- SV-255597r961863_rule
- SV-82541
Checks: C-59270r873580_chk
Attempt to log on to the device using the default administrator logon and password. If the logon is successful, this is a finding. Review the device configuration. The following command shows all of the configured accounts on the device: show admin If the admin account is enabled, this is a finding.
Fix: F-59213r873581_fix
The following command changes the admin password for the account "admin" to the character string entered: admin admin password [newpassword] The prompt will change to show that the admin account is being configured. The following command disables the account: disable
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- AADC-NM-000052
- Vuln IDs
-
- V-255598
- V-68053
- Rule IDs
-
- SV-255598r960993_rule
- SV-82543
Checks: C-59271r873583_chk
Review the device configuration. Since the device supports RADIUS, TACACS+, and LDAP, one of these must be configured. The following is a sample verification for TACACS+. The following command shows the parts of the configuration with the word "tacplus": show run | inc tacplus If the output is blank, this is a finding. The following command shows information for all configured TACACS servers: show tacacs-server If no servers are configured, this is a finding. If RADIUS is used, ask the Administrator whether or not the device is a FIPS version of the platform. This is identified by the designation "FIPS" in the stock keeping unit (SKU). The following command shows the version of ACOS used and other related information: show version If the output does not include "Platform features: fips", this is a finding.
Fix: F-59214r873584_fix
Since the device supports RADIUS, TACACS+, and LDAP, one of these must be configured. The following is a sample configuration for TACACS+. The following command sets the authentication method to TACACS+ for administrative access to the device: authentication type tacplus The local database (local option) must be included as one of the authentication sources, regardless of the order is which the sources are used. Authentication using only a remote server is not supported. The following command configures the device to use a TACACS+ server: tacacs-server host [hostname | ipaddr] secret [secret-string] "hostname | ipaddr" is the hostname or IP address of the TACACS+ server. "secret-string" is the secret key to authenticate the switch to the TACACS+ server. Up to two TACACS+ servers can be configured. The secondary server is used only if the primary server does not respond. The servers are used in the order in which you add them to the configuration. Use a separate command for each of the servers. If RADIUS is used, the device must be the FIPS version of the platform. The FIPS version of the platform is identified by the designation "FIPS" in the stock keeping unit (SKU) when purchasing the device. It is imperative that the correct version of the device be procured.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000197
- Version
- AADC-NM-000062
- Vuln IDs
-
- V-255599
- V-68055
- Rule IDs
-
- SV-255599r961029_rule
- SV-82545
Checks: C-59272r873586_chk
Review the device configuration. The following command show the types of management access allowed on each of the interfaces: show management [ipv4 | ipv6] The following command shows IPv4 management access information: show management ipv4 If either Telnet or HTTP is listed as "on" for any interface, this is a finding. The following command shows IPv6 management access information: show management ipv6 If either Telnet or HTTP is listed as "on" for any interface, this is a finding. Verify that HTTP for management is disabled. show web-service If HTTP is enabled, this is a finding. HTTPS is allowed for management and is enabled by default.
Fix: F-59215r873587_fix
Configure the device to prohibit the use of Telnet and HTTP for device management. The following commands enable management access to the device and the use of SSH, HTTPS, Syslog, and SNMP: enable-management service ssh https syslog snmp snmp-trap Disable HTTP on the management interface: no enable-management service http management Note: Do not configure any management protocols on any of the other interfaces. Disable the web server (HTTP for management). no web-service server
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- AADC-NM-000070
- Vuln IDs
-
- V-255600
- V-68057
- Rule IDs
-
- SV-255600r961068_rule
- SV-82547
Checks: C-59273r873589_chk
Review the device configuration. The following command shows the terminal settings: show terminal If the idle-timeout is greater than 10 minutes or is set to zero (no timeout), this is a finding. The following command shows the web management (GUI) settings: show web-service If the idle time is greater than 10 minutes or is set to zero (no timeout), this is a finding.
Fix: F-59216r873590_fix
The following command sets the terminal idle timeout to 10 minutes: terminal idle-timeout 10 The following command sets the Web GUI timeout to 10 minutes: web-service timeout-policy idle 10 Note: 10 minutes is the default setting.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- AADC-NM-000076
- Vuln IDs
-
- V-255601
- V-68059
- Rule IDs
-
- SV-255601r961863_rule
- SV-82549
Checks: C-59274r873592_chk
Review the device configuration. Enter the following command to view detailed information about the administrative accounts: show admin detail The output of this command will show the Access type, Privilege level, and GUI role, among other parameters. If persons other than other than the authorized individuals (ISSO, ISSM, and SA) have Root, Read Write, or Read Only privileges, this is a finding.
Fix: F-59217r873593_fix
Do not assign anyone who is not the ISSO, ISSM, and authorized System Administrators to be Administrators with Root, Read Write, or Read Only privileges. Do not configure accounts with Root, Read Write, or Read Only privileges for anyone other than the authorized individuals (ISSO, ISSM, and SA).
- RMF Control
- AC-2
- Severity
- H
- CCI
- CCI-001683
- Version
- AADC-NM-000078
- Vuln IDs
-
- V-255602
- V-68061
- Rule IDs
-
- SV-255602r961863_rule
- SV-82551
Checks: C-59275r873595_chk
The A10 Networks ADC records in the audit log when an account is created. This appears as the command that created the account and contains the keyword "admin". These messages must be forwarded to the ISSO and administrators. This is met by sending audit log messages to the Syslog servers or SNMP management station, which is continuously monitored. Review the device configuration. The following command shows the portion of the device configuration that includes the word "host": show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands (no log targets are configured), this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59218r873596_fix
The following command specifies the severity levels of event messages to send to a Syslog server: logging syslog [severity-level] The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. You can enter IP addresses for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- AADC-NM-000079
- Vuln IDs
-
- V-255603
- V-68063
- Rule IDs
-
- SV-255603r961863_rule
- SV-82553
Checks: C-59276r873598_chk
The A10 Networks ADC records in the audit log when an account is modified. This appears as the command that created the account and contains the keyword "admin". These messages must be forwarded to the ISSO and administrators. This is met by sending audit log messages to the Syslog servers or SNMP management station which is continuously monitored. Review the device configuration. The following command shows the portion of the device configuration that includes the word "host". show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands (no log targets are configured), this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59219r873599_fix
The following command specifies the severity levels of event messages to send to a Syslog server: logging syslog [severity-level] The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. IP addresses can be entered for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- AADC-NM-000080
- Vuln IDs
-
- V-255604
- V-68065
- Rule IDs
-
- SV-255604r961863_rule
- SV-82555
Checks: C-59277r873601_chk
The A10 Networks ADC records in the audit log when an account is disabled. This appears as the command that created the account and contains the keyword "admin". These messages must be forwarded to the ISSO and administrators. This is met by sending audit log messages to the Syslog servers or SNMP management station, which is continuously monitored. Review the device configuration. The following command shows the portion of the device configuration that includes the word "host": show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands (no log targets are configured), this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59220r873602_fix
The following command specifies the severity levels of event messages to send to a Syslog server: logging syslog [severity-level] The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. IP addresses can be entered for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- AADC-NM-000081
- Vuln IDs
-
- V-255605
- V-68067
- Rule IDs
-
- SV-255605r961863_rule
- SV-82557
Checks: C-59278r873604_chk
The A10 Networks ADC records in the audit log when an account is removed. This appears as the command that created the account and contains the keyword "admin". These messages must be forwarded to the ISSO and administrators. These messages must be forwarded to the ISSO and administrators. This is met by sending audit log messages to the Syslog servers or SNMP management station, which is continuously monitored. Review the device configuration. The following command shows the portion of the device configuration that includes the word "host": show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands (no log targets are configured), this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59221r873605_fix
The following command specifies the severity levels of event messages to send to a Syslog server: logging syslog [severity-level] The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. IP addresses can be entered for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- AADC-NM-000085
- Vuln IDs
-
- V-255606
- V-68069
- Rule IDs
-
- SV-255606r984107_rule
- SV-82559
Checks: C-59279r873607_chk
Review the list of personnel who are authorized access to the emergency administration account and determine when someone either changed roles or left the organization. Compare this against the documented last change of the emergency administration account password. If the emergency administration account was not changed, this is a finding.
Fix: F-59222r873608_fix
When anyone who has access to the emergency administration account no longer requires access to it or leaves the organization, change the password for the emergency administration account.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- AADC-NM-000087
- Vuln IDs
-
- V-255607
- V-68071
- Rule IDs
-
- SV-255607r961863_rule
- SV-82561
Checks: C-59280r873610_chk
The A10 Networks ADC records in the audit log when an account is created (enabled). This appears as the command that created the account and contains the keyword "admin". These messages must be forwarded to the ISSO and administrators. This is met by sending audit log messages to the Syslog servers. Review the device configuration. The following command shows the portion of the device configuration that includes the word "host": show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands (no log targets are configured), this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59223r873611_fix
The following command specifies the severity levels of event messages to send to a Syslog server: logging syslog [severity-level] The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. IP addresses can be entered for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- AADC-NM-000093
- Vuln IDs
-
- V-255608
- V-68073
- Rule IDs
-
- SV-255608r961863_rule
- SV-82563
Checks: C-59281r873613_chk
Attempt to log on to an administrator account three times. On each attempt, deliberately enter an incorrect password. Attempt to log on a fourth time with a correct password. If the attempt succeeds, this is a finding. This can also be verified using the following command to view the lockout status of all administrative accounts: show admin detail If the Lock Status is not Locked, this is a finding.
Fix: F-59224r873614_fix
Use the following command to enable admin lockout: admin lockout enable The following command locks the admin account after three failed logon attempts sets the A10 ADC to remember the last failed logon for 15 minutes. admin lockout threshold 3 admin lockout reset-time 15 Use the following command to enable admin lockout: admin lockout enable The following command keeps a locked admin account locked until it is manually unlocked by an authorized admin: admin lockout duration 0
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001858
- Version
- AADC-NM-000098
- Vuln IDs
-
- V-255609
- V-68075
- Rule IDs
-
- SV-255609r961401_rule
- SV-82565
Checks: C-59282r873616_chk
Review the device configuration. The following command shows the logging policy: show log policy If the level of logging for the Console, Syslog, and Monitor is not at least Emergency, this is a finding. Since each severity level includes the levels below it, other levels are permitted. However, the debugging level may generate too many messages when used and must be used carefully.
Fix: F-59225r873617_fix
The following command sets the severity level for a particular destination: log [destination] [severity] Note: Each severity level includes the levels below it. However, the debugging level may generate too many messages when used and must be used carefully.
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-001891
- Version
- AADC-NM-000099
- Vuln IDs
-
- V-255610
- V-68077
- Rule IDs
-
- SV-255610r961863_rule
- SV-82567
Checks: C-59283r873619_chk
Review the device configuration. The following command shows clock information: show clock detail If the output does not show NTP as the time source, this is a finding. If a dot appears in front of the time, the device has been configured to use NTP, but NTP is not synchronized. This is also a finding.
Fix: F-59226r873620_fix
Up to four NTP servers can be configured. The following commands set the NTP server and enable the Network Time Protocol: ntp server [hostname | ipaddr] ntp enable
- RMF Control
- AU-8
- Severity
- L
- CCI
- CCI-002046
- Version
- AADC-NM-000100
- Vuln IDs
-
- V-255611
- V-68079
- Rule IDs
-
- SV-255611r961863_rule
- SV-82569
Checks: C-59284r873622_chk
Review the device configuration. The following command shows clock information: show clock detail If the output does not show NTP as the time source, this is a finding. If a dot appears in front of the time, the device has been configured to use NTP, but NTP is not synchronized. This is also a finding.
Fix: F-59227r873623_fix
Up to four NTP servers can be configured. The following commands set the NTP server and enable the Network Time Protocol: ntp server [hostname | ipaddr] ntp enable
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AADC-NM-000101
- Vuln IDs
-
- V-255612
- V-68081
- Rule IDs
-
- SV-255612r987682_rule
- SV-82571
Checks: C-59285r873625_chk
Review the device configuration. The following command shows the configuration with an output modifier to display only NTP-related configuration: show run | include ntp Alternately, enter the command to display the configured NTP servers and whether or not NTP is enabled: show ntp servers If the output shows fewer than two configured NTP servers, this is a finding. Ask the device administrator where the Primary NTP Server and Secondary NTP Server are located. If they are not in different geographic regions, this is a finding.
Fix: F-59228r873626_fix
Up to four NTP servers can be configured. The following commands set the NTP server and enable the Network Time Protocol: ntp server [hostname | ipaddr] ntp enable Note: The primary and secondary time sources must be located in different geographic regions.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- AADC-NM-000102
- Vuln IDs
-
- V-255613
- V-68083
- Rule IDs
-
- SV-255613r961443_rule
- SV-82573
Checks: C-59286r873628_chk
Review the device configuration. The following command shows clock information: show clock detail If the output does not show GMT as the time zone, this is a finding.
Fix: F-59229r873629_fix
The device uses GMT as the default time zone. The following command sets the time zone: clock timezone timezone [nodst] "nodst" disables Daylight Savings Time.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- AADC-NM-000113
- Vuln IDs
-
- V-255614
- V-68085
- Rule IDs
-
- SV-255614r961506_rule
- SV-82575
Checks: C-59287r873631_chk
Review the device configuration. The following command includes an output modifier to display only NTP-related configuration: show run | include ntp The output should contain either the "ntp auth-key" command or the "ntp trusted-key" command. If it does not, this is a finding.
Fix: F-59230r873632_fix
The following command configures NTP authentication: ntp [auth-key ID-num M string] This creates an authentication key. For ID-num, enter a value between 1-65535. For string, enter a series of 1-31 alphanumeric characters for the key. This value is stored in the system using the A10 encryption algorithm. The following command also configures NTP authentication: ntp [trusted-key ID-num] This adds an authentication key to the list of trusted keys. For num, enter the identification number of a configured authentication key to add the key to the trusted key list. You can enter more than one number, separated by whitespace, to simultaneously add multiple authentication keys to the trusted key list.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- AADC-NM-000118
- Vuln IDs
-
- V-255615
- V-68087
- Rule IDs
-
- SV-255615r961554_rule
- SV-82577
Checks: C-59288r873634_chk
Determine if any operators have used Telnet. Evidence of the use of Telnet will be in the audit log. The following command shows any instances of the word "telnet" in the audit log: show audit | inc telnet If the log shows the use of the Telnet command, this is a finding.
Fix: F-59231r873635_fix
The device has a Telnet client that is available at the privileged exec level. Do not use it; use SSH from a management workstation instead.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- AADC-NM-000119
- Vuln IDs
-
- V-255616
- V-68089
- Rule IDs
-
- SV-255616r961557_rule
- SV-82579
Checks: C-59289r873637_chk
Review the device configuration. The following command shows the running configuration and filters the output on the string "snmp-server": show run | inc snmp-server If the output shows servers using SNMPv1 or SNMPv2, this is a finding.
Fix: F-59232r873638_fix
The following commands enable SNMP and SNMP traps: snmp-server enable snmp-server enable traps Note: This will enable sending all traps. The following command sets Unique engineID: snmp-server engineID [hex-string] The commands below define SNMP OIDs to include when discovering the device via an SNMPv3 manager. The following command defines the group view: snmp-server view [view-name] 1.3.6 included The following command defines SNMPv3 user-based groups: snmp-server user [username] group [groupname] v3 [auth [md5 | sha] password [encrypted]]: Note: Use the SHA option since MD5 is not compliant. The following command defines the SNMPv3 console: snmp host [IP_address] version v3 user [name] udp-port 162 The following command enables SNMP on the management interface: enable-management service snmp management
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- AADC-NM-000130
- Vuln IDs
-
- V-255617
- V-68091
- Rule IDs
-
- SV-255617r961860_rule
- SV-82581
Checks: C-59290r873640_chk
Review the device configuration. The following command shows the portion of the device configuration that includes the word "host": show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands, this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59233r873641_fix
The following command specifies the severity levels of event messages to send to a Syslog server: logging syslog [severity-level] The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. IP addresses can be entered for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AADC-NM-000132
- Vuln IDs
-
- V-255618
- V-68101
- Rule IDs
-
- SV-255618r961863_rule
- SV-82591
Checks: C-59291r873643_chk
Verify a log destination is configured for a CNDSP or other mechanism that is monitored by security personnel. Obtain the IP address of a Syslog server monitored by the CNDSP. Review the device configuration. The following command shows the portion of the device configuration that includes the word "host": show run | inc host If the output does not display the "logging host" and "logging auditlog host" commands, or does not include the IP address of the Syslog server used by the CNDSP, this is a finding. The following command shows the logging policy: show log policy If Syslog logging is disabled, this is a finding.
Fix: F-59234r873644_fix
Obtain the IP address of a Syslog server monitored by the CNDSP. The following command specifies a Syslog server to which to send event messages: logging host ipaddr [ipaddr...][port protocol-port] "ipaddr" is the IP address of the Syslog server. IP addresses can be entered for up to 10 remote logging Syslog servers. "protocolport" is the port number to which to send messages. Only one protocol port can be specified with the command. All servers must use the same port to listen for syslog messages. Since the Audit log is separate from the Event log, it must have its own target to write messages to: logging auditlog host [ipaddr | hostname][facility facility-name] "ipaddr | hostname" is the IP address or hostname of the server. "facility-name" is the name of a log facility.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AADC-NM-000137
- Vuln IDs
-
- V-255619
- V-68103
- Rule IDs
-
- SV-255619r961863_rule
- SV-82593
Checks: C-59292r873646_chk
Review the device configuration. Since the device supports RADIUS, TACACS+, and LDAP, one of these must be configured. The following is a sample verification for TACACS+. The following command shows the parts of the configuration with the word "tacplus": show run | inc tacplus If the output is blank, this is a finding. The following command shows information for all configured TACACS servers: show tacacs-server If no servers are configured, this is a finding.
Fix: F-59235r873647_fix
Since the device supports RADIUS, TACACS+, and LDAP, one of these must be configured. The following is a sample configuration for TACACS+. The following command sets the authentication method to TACACS+ for administrative access to the device: authentication type tacplus The local database (local option) must be included as one of the authentication sources, regardless of the order in which the sources are used. Authentication using only a remote server is not supported. The following command configures the device to use a TACACS+ server: tacacs-server host [hostname | ipaddr] secret [secret-string] "hostname | ipaddr" is the hostname or IP address of the TACACS+ server. "secret-string" is the secret key to authenticate the switch to the TACACS+ server. Up to two TACACS+ servers can be configured. The secondary server is used only if the primary server does not respond. The servers are used in the order in which you add them to the configuration. Use a separate command for each of the servers.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- AADC-NM-000142
- Vuln IDs
-
- V-255620
- V-68099
- Rule IDs
-
- SV-255620r961863_rule
- SV-82589
Checks: C-59293r873649_chk
Review the device configuration. This can be checked using the GUI: Log on to the device and navigate to Config >> System >> Settings >> Web Certificate. In the certificate pane, view the issuer information. If each certificate is not issued by an approved service provider, this is a finding.
Fix: F-59236r873650_fix
Only import public key certificates from an appropriate certificate policy through an approved service provider. Use the commands "import ssl-cert" and "import ssl-key" or "slb ssl-load" to import SSL certificates and keys.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001368
- Version
- AADC-NM-000143
- Vuln IDs
-
- V-255621
- V-68097
- Rule IDs
-
- SV-255621r960801_rule
- SV-82587
Checks: C-59294r873652_chk
Ask the device administrator what the subnet assigned to the management network is and which access-list is used to restrict management traffic. Review the device configuration. The following command displays a configured access-list: show access-list [ipv4 | ipv6] [acl-id] If no access list for the management network is configured, this is a finding. If the access list for the management network does not restrict traffic solely to the management network, this is a finding. The following command displays information about the management interface: show interface management If the access list is not applied to the management interface, this is a finding.
Fix: F-59237r873653_fix
Configure an ACL or filter to restrict management access to the device from only the management network. The following commands configure an access control list that only allows traffic from the management network and logs denied traffic: access-list [acl-num] permit access-list [acl-num] permit source-ipaddr {filter-mask | /mask-length} access-list [acl-num] deny any log Note: The source-ipadd and mask must be the subnet used for the management network. The following commands apply the ACL to the management interface: interface management access-list [acl-num] in Note that acl-num is the number assigned to the ACL configured above.
- RMF Control
- MA-4
- Severity
- M
- CCI
- CCI-002890
- Version
- AADC-NM-000144
- Vuln IDs
-
- V-255622
- V-68095
- Rule IDs
-
- SV-255622r961554_rule
- SV-82585
Checks: C-59295r873655_chk
Review the device configuration. The following command shows the types of management access allowed on each of the interfaces: show management [ipv4 | ipv6] The following command shows IPv4 management access information: show management ipv4 If either Telnet or HTTP is listed as "on" for any interface, this is a finding. The following command shows IPv6 management access information: show management ipv6 If either Telnet or HTTP is listed as "on" for any interface, this is a finding. Verify that HTTP for management is disabled. show web-service If HTTP is enabled, this is a finding. HTTPS is allowed for management and is enabled by default.
Fix: F-59238r873656_fix
The following commands enable management access to the device and the use of SSH, HTTPS, Syslog, and SNMP: enable-management service ssh https syslog snmp snmp-trap Disable HTTP on the management interface: no enable-management service http management Note: Do not configure any management protocols on any of the other interfaces. Disable the web server (HTTP for management): no web-service server
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- AADC-NM-000145
- Vuln IDs
-
- V-255623
- V-68093
- Rule IDs
-
- SV-255623r961863_rule
- SV-82583
Checks: C-59296r873658_chk
After successfully logging on to the device, attempt to enter enable mode using the default (blank) password. If that is successful, this is a finding.
Fix: F-59239r873659_fix
The following command changes the enable password to the character string entered: enable-password [newpassword]
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- AADC-NM-000160
- Vuln IDs
-
- V-264426
- Rule IDs
-
- SV-264426r992075_rule
Checks: C-68340r992073_chk
This STIG is sunset and no longer updated. Compare the version running to the supported version by the vendor. If the system is using an unsupported version from the vendor, this is a finding.
Fix: F-68248r992074_fix
Upgrade to a version supported by the vendor.