STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP Device Management Security Technical Implementation Guide

V-217381

CAT II (Medium)

The BIG-IP appliance must limit the number of concurrent sessions to the Configuration Utility to 10 or an organization-defined number.

Rule ID

SV-217381r960735_rule

STIG

F5 BIG-IP Device Management Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-000054

Discussion

Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator is helpful in limiting risks related to DoS attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions should be defined based upon mission needs and the operational environment for each system.

Check Content

Verify the BIG-IP appliance is configured to limit the number of concurrent sessions to 10 or an organization-defined number.

Navigate to the BIG-IP System manager >> System >> Preferences.

Set "System Settings:" to "Advanced".

Verify "Maximum HTTP Connections to Configuration Utility" is set to the organization-defined number of concurrent sessions.

If neither of these configurations is present, this is a finding.

Fix Text

Configure the BIG-IP appliance either to limit the number of concurrent sessions to 10 or an organization-defined number.