UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Network WLAN Controller Platform Security Technical Implementation Guide


Overview

Date Finding Count (6)
2022-02-03 CAT I (High): 0 CAT II (Med): 6 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC II - Mission Support Public)

Finding ID Severity Title
V-243238 Medium The network device must not be configured to have any feature enabled that calls home to the vendor.
V-243237 Medium The network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.
V-243236 Medium WLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.
V-243235 Medium WLAN components must be FIPS 140-2 or FIPS 140-3 certified.
V-243234 Medium WLAN must use EAP-TLS.
V-243233 Medium The WLAN inactive/idle session timeout must be set for 30 minutes or less.