STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC NDM Security Technical Implementation Guide

V-255620

CAT II (Medium)

The A10 Networks ADC must use DoD-approved PKI rather than proprietary or self-signed device certificates.

Rule ID

SV-255620r961863_rule

STIG

A10 Networks ADC NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366, CCI-001159

Discussion

For user certificates, each organization obtains certificates from an approved, shared service provider, as required by OMB policy. For federal agencies operating a legacy public key infrastructure cross-certified with the Federal Bridge Certification Authority at medium assurance or higher, this Certification Authority will suffice.

Check Content

Review the device configuration.

This can be checked using the GUI:
Log on to the device and navigate to Config >> System >> Settings >> Web Certificate.

In the certificate pane, view the issuer information.

If each certificate is not issued by an approved service provider, this is a finding.

Fix Text

Only import public key certificates from an appropriate certificate policy through an approved service provider.

Use the commands "import ssl-cert" and "import ssl-key" or "slb ssl-load" to import SSL certificates and keys.