Network WLAN Bridge Platform Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- WLAN-NW-000200
- Vuln IDs
-
- V-243227
- Rule IDs
-
- SV-243227r720136_rule
Checks: C-46502r720134_chk
Review device configuration. 1. Obtain the SSID using a wireless scanner or the AP or WLAN controller management software. 2. Verify the name is not meaningful (e.g., site name, product name, room number, etc.) and is not set to the manufacturer's default value. If the SSID does not meet the requirement listed above, this is a finding.
Fix: F-46459r720135_fix
Change the SSID to a pseudo random word that does not identify the unit, base, or organization.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- WLAN-NW-000400
- Vuln IDs
-
- V-243228
- Rule IDs
-
- SV-243228r720139_rule
Checks: C-46503r720137_chk
Review the WLAN equipment specification and verify it is Wi-Fi Alliance certified with either the older WPA2 certification or the newer WPA3 certification. WPA3 is preferred but not required at this time. If the WLAN equipment is not Wi-Fi Alliance certified with WPA2 or WPA3, this is a finding.
Fix: F-46460r720138_fix
Use WLAN equipment that is Wi-Fi Alliance certified with WPA2 or WPA3.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WLAN-NW-000600
- Vuln IDs
-
- V-243229
- Rule IDs
-
- SV-243229r891323_rule
Checks: C-46504r891321_chk
Review the WLAN equipment specification and verify it is FIPS 140-2/3 (CMVP) certified for data in transit, including authentication credentials. Verify the component is configured to operate in FIPS mode. If the WLAN equipment is not is FIPS 140-2/3 (CMVP) certified or is not configured to operate in FIPS mode, this is a finding.
Fix: F-46461r891322_fix
Use WLAN equipment that is FIPS 140-2/3 (CMVP) certified. Configure the component to operate in FIPS mode.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- WLAN-NW-001100
- Vuln IDs
-
- V-243230
- Rule IDs
-
- SV-243230r720145_rule
Checks: C-46505r720143_chk
Review network architecture with the network administrator. 1. Verify compliance by inspecting the site network topology diagrams. 2. Since many network diagrams are not kept up to date, walk through the connections with the network administrator using network management tools or diagnostic commands to verify the diagrams are current. If the site's wireless infrastructure, such as access points and bridges, is not isolated from the enclave network, this is a finding.
Fix: F-46462r720144_fix
Remove wireless network devices with direct connections to an enclave network. If feasible, reconfigure network connections to isolate the WLAN infrastructure from the enclave network, separating them with a firewall or equivalent protection.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- WLAN-NW-001200
- Vuln IDs
-
- V-243231
- Rule IDs
-
- SV-243231r720148_rule
Checks: C-46506r720146_chk
Review the device configuration to determine if the OOB management interface is assigned an appropriate IP address from the authorized OOB management network. If an IP address assigned to the interface is not from an authorized OOB management network, this is a finding.
Fix: F-46463r720147_fix
Configure the network device so that only management traffic that ingresses and egresses the OOBM interface is permitted.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- WLAN-NW-001300
- Vuln IDs
-
- V-243232
- Rule IDs
-
- SV-243232r856611_rule
Checks: C-46507r720149_chk
Review the device configuration to determine if the call home service or feature is disabled on the device. If the call home service is enabled on the device, this is a finding. Note: This feature can be enabled if the communication is only to a server residing in the local area network or enclave.
Fix: F-46464r720150_fix
Configure the network device to disable the call home service or feature. Note: This feature can be enabled if the communication is only to a server residing in the local area network or enclave.