U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A10 Networks Application Delivery Controller (ADC) Y24M07 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
A10 Networks Application Delivery Controller cpe:/a:a10networks:application_delivery_controller (View CVEs)

Checklist Highlights

Checklist Name:
A10 Networks Application Delivery Controller (ADC)
Checklist ID:
780
Version:
Y24M07
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
04/15/2016

Checklist Summary:

The A10 Networks Application Delivery Controller (ADC) Application Layer Gateway (ALG) Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the A10 Networks AX and Thunder platforms (physical and virtual machine). This document is meant for use in conjunction with the A10 Networks ADC Network Device Management STIG and is required to be used for each deployment of the A10 Networks ADC. The A10 Networks AX and Thunder ADCs are advanced load balancers with additional capabilities, including an integrated Web Application Firewall (WAF), HTTP and Domain Name System (DNS) protocol compliance checking, and Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption. These platforms are not intended as enclave perimeter protection devices and are used primarily to increase availability of services by managing connections to servers. The A10 Networks ADC platforms come in both FIPS-compliant and non-FIPS-compliant versions. For use within the DoD, FIPS-compliant versions must be used. FIPS-compliant versions are identified by the designation “FIPS” in the stock keeping unit (SKU).

Checklist Role:

  • Domain Controller
  • Firewall

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

NIST does not guarantee or warrant the checklist’s accuracy or completeness. NIST is not responsible for loss, damage, or problems that may be caused by using the checklist.

Product Support:

All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component Authorizing Official (AO) personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil

Point of Contact:

disa.stig_spt@mail.mil.

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

New Checklist Candidate - 07/18/2017
Updated URL to reflect change to the DISA website - http --> https
Moved to FINAL - 03/30/2018
Updated URLs - 6/4/19
updated URLs - 4/28/2021
Updated Version, Resources, References, SHA and Status - 08/08/2024 

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 08/08/2024