STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Aruba Networking AOS NDM Security Technical Implementation Guide

V-266928

CAT I (High)

AOS must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.

Rule ID

SV-266928r1039805_rule

STIG

HPE Aruba Networking AOS NDM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000382

Discussion

To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocols on information systems. Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the network device must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved. Some network devices have capabilities enabled by default; if these capabilities are not necessary, they must be disabled. If a particular capability is used, it must be documented and approved.

Check Content

Verify the AOS configuration with the following commands: 
show firewall-cp 
show running-config | include ospf 
 
Verify that OSPF is not enabled and only unnecessary and/or nonsecure functions, ports, protocols, and/or services are denied.  
 
If OSPF is enabled or any unnecessary and/or nonsecure functions, ports, protocols, and/or services are allowed, this is a finding.

Fix Text

Configure AOS with the following commands: 
configure terminal 
firewall cp 
ipv4 deny any proto 6 ports 17 17 
ipv4 deny any proto 6 ports 8080 8080 
ipv4 deny any proto 6 ports 8081 8081 
ipv4 deny any proto 6 ports 8082 8082 
ipv4 deny any proto 6 ports 8088 8088 
ipv6 deny any proto 6 ports 17 17 
ipv6 deny any proto 6 ports 8080 8080 
ipv6 deny any proto 6 ports 8081 8081 
ipv6 deny any proto 6 ports 8082 8082 
ipv6 deny any proto 6 ports 8088 8088 
exit 
write memory 
 
For any OSPF entries found: 
no router ospf 
no router ospf router-id <IP address> 
no router ospf redistribute vlan <#> 
no <any other ospf entries> 
write memory 
 
Block any other ports as desired using the following example:  
configure terminal 
firewall cp 
<ipv4/ipv6> deny any proto <ftp, http, telnet, tftp, protocol #> ports <start port 0-65535> <end port 0-65535>  
exit 
write memory