STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP TMOS DNS Security Technical Implementation Guide

V-265987

CAT II (Medium)

The F5 BIG-IP DNS server implementation must validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer).

Rule ID

SV-265987r1024862_rule

STIG

F5 BIG-IP TMOS DNS Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366CCI-001904

Discussion

Validation of the binding of the information prevents the modification of information between production and review. The validation of bindings can be achieved, for example, by the use of cryptographic checksums. Validations must be performed automatically. DNSSEC and TSIG/SIG(0) technologies are not effective unless the digital signatures they generate are validated to ensure that the information has not been tampered with and that the producer's identity is legitimate.

Check Content

From the BIG-IP GUI:
1. DNS.
2. Delivery.
3. Nameservers.
4. Click the Name of the Nameserver.
5. Verify that a value is selected for "TSIG Key".

If the BIG-IP appliance is not configured to validate the binding of the other DNS server's identity to the DNS information for a server-to-server transaction (e.g., zone transfer), this is a finding.

Fix Text

From the BIG-IP GUI:
1. DNS.
2. Delivery.
3. Nameservers.
4. Click the Name of the Nameserver.
5. Select a value from the "TSIG Key" drop-down menu.
Note: To create a TSIG Key, go to DNS >> Delivery >> Keys >> TSIG Key List.
6. Click "Finished".