Network WLAN Controller Platform Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- WLAN-NW-000300
- Vuln IDs
-
- V-243233
- Rule IDs
-
- SV-243233r720154_rule
Checks: C-46508r720152_chk
1. Review the relevant configuration screen of the WLAN controller or access point. 2. Verify the session timeout setting is set for 30 minutes or less. If this session timeout is not set to 30 minutes or less for the entire WLAN or the WLAN does not have the capability to enable the session timeout feature, this is a finding.
Fix: F-46465r720153_fix
Set the WLAN inactive session timeout to 30 minutes or less.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001444
- Version
- WLAN-NW-000500
- Vuln IDs
-
- V-243234
- Rule IDs
-
- SV-243234r720157_rule
Checks: C-46509r720155_chk
Note: If the equipment is WPA2/WPA3 certified by the Wi-Fi Alliance, it is capable of supporting this requirement. Review the WLAN equipment configuration to verify that EAP-TLS is actively used and no other methods are enabled. If EAP-TLS is not used or if the WLAN system allows users to connect with other methods, this is a finding.
Fix: F-46466r720156_fix
Change the WLAN configuration so it supports EAP-TLS, implementing supporting PKI and AAA infrastructure as necessary. If the WLAN equipment is not capable of supporting EAP-TLS, procure new equipment capable of such support.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- WLAN-NW-000600
- Vuln IDs
-
- V-243235
- Rule IDs
-
- SV-243235r720160_rule
Checks: C-46510r720158_chk
Review the WLAN equipment specification and verify it is FIPS 140-2/3 (CMVP) certified for data in transit, including authentication credentials. If the WLAN equipment is not is FIPS 140-2/3 (CMVP) certified, this is a finding.
Fix: F-46467r720159_fix
Use WLAN equipment that is FIPS 140-2/3 (CMVP) certified.
- RMF Control
- AC-18
- Severity
- M
- CCI
- CCI-001444
- Version
- WLAN-NW-000700
- Vuln IDs
-
- V-243236
- Rule IDs
-
- SV-243236r720163_rule
Checks: C-46511r720161_chk
Interview the site ISSO and SA. Determine if the site's network is configured to require certificate-based PKI authentication before a WLAN user is connected to the network. If certificate-based PKI authentication is not required prior to a DoD WLAN user accessing the DoD network, this is a finding. Note: This check does not apply to medical devices. Medical devices are permitted to connect to the WLAN using pre-shared keys.
Fix: F-46468r720162_fix
Integrate certificate-based PKI authentication into the WLAN authentication process.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-001097
- Version
- WLAN-NW-001200
- Vuln IDs
-
- V-243237
- Rule IDs
-
- SV-243237r720166_rule
Checks: C-46512r720164_chk
Review the device configuration to determine if the OOB management interface is assigned an appropriate IP address from the authorized OOB management network. If an IP address assigned to the interface is not from an authorized OOB management network, this is a finding.
Fix: F-46469r720165_fix
Configure the network device so that only management traffic that ingresses and egresses the OOBM interface is permitted.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- WLAN-NW-001300
- Vuln IDs
-
- V-243238
- Rule IDs
-
- SV-243238r720169_rule
Checks: C-46513r720167_chk
Review the device configuration to determine if the call home service or feature is disabled on the device. If the call home service is enabled on the device, this is a finding. Note: This feature can be enabled if the communication is only to a server residing in the local area network or enclave.
Fix: F-46470r720168_fix
Configure the network device to disable the call home service or feature. Note: This feature can be enabled if the communication is only to a server residing in the local area network or enclave.