STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC ALG Security Technical Implementation Guide

V-237040

CAT II (Medium)

The A10 Networks ADC, when used to load balance web applications, must strip HTTP response headers.

Rule ID

SV-237040r639567_rule

STIG

A10 Networks ADC ALG Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-001312

Discussion

Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response headers can disclose vulnerabilities about a web server. This information can be used by an attacker. The A10 Networks ADC can filter response headers; this removes the web server’s identifying headers in outgoing responses (such as Server, X-Powered-By, and X-AspNet-Version).

Check Content

If the device is not used to load balance web servers, this is not applicable. If the device is used to load balance web servers, verify that the A10 Networks ADC strips HTTP response headers. 

The following command displays WAF templates:
show slb template waf

If the configured WAF templates do not have the "filter-resp-hdrs" option configured, this is a finding.

Fix Text

If the device is used to load balance web servers, configure the device to strip HTTP response headers.

The following command configures a WAF template and includes the option to strip HTTP response headers:
slb template waf
filter-resp-hdrs