Skip to content

The F5 BIG-IP must be configured to identify and authenticate all endpoint devices or peers before establishing a connection.

An XCCDF Rule

Description

Without identifying and authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity.

ID
SV-266171r1024403_rule
Version
F5BI-AP-300160
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

From the BIG-IP GUI:
1. Access.
2. Profiles/Policies.
3. Access Profiles.
4. Click "Edit..." in the "Per-Session Policy" column for the Access Profile.
5. Configure the Access Profile to uniquely identify and authenticate network devices.
6. Click "Apply Access Policy".