STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP Device Management Security Technical Implementation Guide

V-259332

CAT II (Medium)

The F5 BIG-IP appliance must be configured to restrict a consistent inbound IP for the entire management session.

Rule ID

SV-259332r961620_rule

STIG

F5 BIG-IP Device Management Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-002385

Discussion

This security measure helps limit the effects of denial-of-service attacks by employing anti-session hijacking security safeguards. Session hijacking, also called cookie hijacking, is the exploitation of a valid computer session to gain unauthorized access to an application. The attacker steals (or hijacks) the cookies from a valid user and attempts to use them for authentication.

Check Content

From the BIG-IP GUI:
1. System.
2. Preferences.
3. Under "Security Settings", verify "Require A Consistent Inbound IP For The Entire Web Session" box is checked.

If the BIG-IP appliance is not configured to require a consistent inbound IP for the entire session for management sessions, this is a finding.

Fix Text

Enable the "Require A Consistent Inbound IP For The Entire Web Session" setting using the Configuration utility.

From the BIG-IP GUI:
1. System.
2. Preferences.
3. Under "Security Settings", check "Require A Consistent Inbound IP For The Entire Web Session".
4. Click "Update".