Skip to content

F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The BIG-IP Core implementation must be configured to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users) when connecting to virtual servers.

    <VulnDiscussion>Lack of authentication enables anyone to gain access to the network or possibly a network element that provides opportunity f...
    Rule Medium Severity
  • SRG-NET-000213-ALG-000107

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000318-ALG-000152

    <GroupDescription></GroupDescription>
    Group
  • The BIG-IP Core implementation must terminate all communications sessions at the end of the session or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity, and for user sessions (nonprivileged sessions), the session must be terminated after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-NET-000230-ALG-000113

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules