STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC ALG Security Technical Implementation Guide

V-237037

CAT II (Medium)

The A10 Networks ADC must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the PPSM CAL and vulnerability assessments.

Rule ID

SV-237037r639558_rule

STIG

A10 Networks ADC ALG Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000382

Discussion

In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types); organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. The device must be configured to prevent or restrict the use of prohibited ports, protocols, and services throughout the network by filtering the network traffic and disallowing or redirecting traffic as necessary. Default and updated policy filters from the vendors will disallow older version of protocols and applications and will address most known non-secure ports, protocols, and/or services. However, sources for further policy filters are the IAVMs and the PPSM requirements.

Check Content

Review the list of authorized applications, endpoints, services, and protocols that have been added to the PPSM database.

Review the configured servers, service groups, and virtual servers. 

The following command shows information for SLB servers:
show slb server

The following command shows information for service groups (multiple servers):
show slb service-group

The following command shows information for virtual servers (the services visible to outside hosts):
show slb virtual-server

If any of the servers, service groups, or virtual servers allows traffic that is prohibited by the PPSM CAL, this is a finding.

Fix Text

Do not configure a server, service group, or virtual server for any port, protocol, or service that is prohibited by the PPSM CAL.