STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC NDM Security Technical Implementation Guide

V-255591

CAT III (Low)

The A10 Networks ADC must produce audit log records containing information (FQDN, unique hostname, management or loopback IP address) to establish the source of events.

Rule ID

SV-255591r960900_rule

STIG

A10 Networks ADC NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000133

Discussion

In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event. The source may be a component, module, or process within the device or an external session, administrator, or device. Associating information about where the source of the event occurred provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured device. When the event log or system log is written to a syslog server, the hostname is included with each record.

Check Content

Observe someone logging onto the device. The prompt will appear after a successful logon.

If the prompt is not a unique hostname assigned by the organization, this is a finding.

Note: The device automatically includes the hostname in each Syslog message.

Fix Text

The following command will change the hostname:
hostname [string]

The string can contain 1 to 31 characters and can contain the following characters: a-z A-Z 0-9 - . ( )

Note: The device automatically includes the hostname in each Syslog message.