Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000148-NDM-000246

    Group
  • The A10 Networks ADC must not use the default enable password.

    To assure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and authenticated for all network management accesses to prevent potential mis...
    Rule High Severity
  • SRG-APP-000411-NDM-000330

    Group
  • The A10 Networks ADC must only allow the use of secure protocols that implement cryptographic mechanisms to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.

    This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryp...
    Rule Medium Severity
  • SRG-APP-000038-NDM-000213

    Group
  • The A10 Networks ADC must restrict management connections to the management network.

    Remote administration is inherently dangerous because anyone with a sniffer and access to the right LAN segment could acquire the device account and password information. With this intercepted info...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000344

    Group
  • The A10 Networks ADC must use DoD-approved PKI rather than proprietary or self-signed device certificates.

    For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000333

    Group
  • The A10 Networks ADC must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.

    By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged into the network device. An example of a mechanism t...
    Rule Medium Severity
  • SRG-APP-000516-NDM-000338

    Group
  • The A10 Networks ADC must employ centrally managed authentication server(s).

    The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrato...
    Rule Medium Severity
  • SRG-APP-000001-NDM-000200

    Group
  • The A10 Networks ADC must limit the number of concurrent sessions to one (1) for each administrator account and/or administrator account type.

    Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administr...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules