Check: AADC-NM-000118
A10 Networks ADC NDM STIG:
AADC-NM-000118
(in version v1 r1)
Title
Operators of the A10 Networks ADC must not use the Telnet client built into the device. (Cat II impact)
Discussion
If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions. Telnet is an unsecure protocol; use SSH instead. Note: This requirement does not refer to the device accepting incoming Telnet connections (server), but instead being used as an originator of Telnet requests (client). This is the exec level command "telnet".
Check Content
Determine if any operators have used Telnet. Evidence of the use of Telnet will be in the audit log. The following command shows any instances of the word "telnet" in the audit log: show audit | inc telnet If the log shows the use of the Telnet command, this is a finding.
Fix Text
The device has a Telnet client that is available at the privileged exec level. Do not use it; use SSH from a management workstation instead.
Additional Identifiers
Rule ID: SV-82577r1_rule
Vulnerability ID: V-68087
Group Title: SRG-APP-000411-NDM-000330
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002890 |
The information system implements cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications. |
Controls
Number | Title |
---|---|
MA-4 (6) |
Cryptographic Protection |