UCF STIG Viewer Logo

WLAN Authentication Server Security Technical Implementation Guide (STIG)


Overview

Date Finding Count (3)
2013-03-14 CAT I (High): 0 CAT II (Med): 3 CAT III (Low): 0
STIG Description
This STIG contains the technical security controls for the operation of a WLAN Authentication Server in the DoD environment.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-19900 Medium The WLAN implementation of EAP-TLS must be FIPS 140-2 validated.
V-3692 Medium WLAN must use EAP-TLS.
V-30257 Medium WLAN EAP-TLS implementation must use CAC authentication to connect to DoD networks.