The F5 BIG-IP must be configured to identify and authenticate all endpoint devices or peers before establishing a connection.
An XCCDF Rule
Description
<VulnDiscussion>Without identifying and authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-266171r1024403_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
From the BIG-IP GUI:
1. Access.
2. Profiles/Policies.
3. Access Profiles.
4. Click "Edit..." in the "Per-Session Policy" column for the Access Profile.
5. Configure the Access Profile to uniquely identify and authenticate network devices.