The A10 Networks ADC must restrict management connections to the management network.
An XCCDF Rule
Description
<VulnDiscussion>Remote administration is inherently dangerous because anyone with a sniffer and access to the right LAN segment could acquire the device account and password information. With this intercepted information they could gain access to the infrastructure and cause denial of service attacks, intercept sensitive information, or perform other destructive actions.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-82587r1_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
Configure an ACL or filter to restrict management access to the device from only the management network.
The following commands configure an access control list that only allows traffic from the management network and logs denied traffic:
access-list [acl-num] permit
access-list [acl-num] permit source-ipaddr {filter-mask | /mask-length}
access-list [acl-num] deny any log