STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE Aruba Networking AOS Wireless Security Technical Implementation Guide

V-266708

CAT III (Low)

AOS wireless local area network (WLAN) service set identifiers (SSIDs) must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.

Rule ID

SV-266708r1040614_rule

STIG

HPE Aruba Networking AOS Wireless Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

An SSID that identifies the unit, site, or purpose of the WLAN or is set to the manufacturer default may cause an operational security vulnerability.

Check Content

Review AOS WLAN configuration by navigating to Configuration >> WLANs. 

If the WLAN SSIDs listed in the "NAME (SSID)" column are not pseudo random words, this is a finding.

Fix Text

Configure AOS using the web interface: 

1. Navigate to Configuration >> WLANs and click on the "+" sign to create a guest WLAN. 
2. Configure the SSID with a pseudo random word. 
3. Finish configuring the WLAN. 
4. Click Pending Changes >> Deploy Changes.