UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

WLAN Authentication Server Security Technical Implementation Guide


Overview

Date Finding Count (3)
2011-10-10 CAT I (High): 0 CAT II (Med): 3 CAT III (Low): 0
STIG Description
This STIG contains the technical security controls for the operation of a WLAN Authentication Server in the DoD environment.

Available Profiles



Findings (MAC II - Mission Support Sensitive)

Finding ID Severity Title
V-19900 Medium The WLAN implementation of EAP-TLS must be FIPS 140-2 validated.
V-3692 Medium WLAN must use EAP-TLS.
V-30257 Medium WLAN EAP-TLS implementation must use CAC authentication to connect to DoD networks.