UCF STIG Viewer Logo

Network WLAN Controller Platform Security Technical Implementation Guide


Date Finding Count (6)
2022-02-03 CAT I (High): 0 CAT II (Med): 6 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles

Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-243238 Medium The network device must not be configured to have any feature enabled that calls home to the vendor.
V-243237 Medium The network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.
V-243236 Medium WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.
V-243235 Medium WLAN components must be FIPS 140-2 or FIPS 140-3 certified.
V-243234 Medium WLAN must use EAP-TLS.
V-243233 Medium The WLAN inactive/idle session timeout must be set for 30 minutes or less.