UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Operators of the A10 Networks ADC must not use the Telnet client built into the device.


Overview

Finding ID Version Rule ID IA Controls Severity
V-68087 AADC-NM-000118 SV-82577r1_rule Medium
Description
If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions. Telnet is an unsecure protocol; use SSH instead. Note: This requirement does not refer to the device accepting incoming Telnet connections (server), but instead being used as an originator of Telnet requests (client). This is the exec level command "telnet".
STIG Date
A10 Networks ADC NDM Security Technical Implementation Guide 2016-04-15

Details

Check Text ( C-68647r1_chk )
Determine if any operators have used Telnet. Evidence of the use of Telnet will be in the audit log.

The following command shows any instances of the word "telnet" in the audit log:
show audit | inc telnet

If the log shows the use of the Telnet command, this is a finding.
Fix Text (F-74201r1_fix)
The device has a Telnet client that is available at the privileged exec level. Do not use it; use SSH from a management workstation instead.