STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC NDM Security Technical Implementation Guide

V-255615

CAT II (Medium)

Operators of the A10 Networks ADC must not use the Telnet client built into the device.

Rule ID

SV-255615r961554_rule

STIG

A10 Networks ADC NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-002890

Discussion

If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions. Telnet is an unsecure protocol; use SSH instead. Note: This requirement does not refer to the device accepting incoming Telnet connections (server), but instead being used as an originator of Telnet requests (client). This is the exec level command "telnet".

Check Content

Determine if any operators have used Telnet. Evidence of the use of Telnet will be in the audit log.

The following command shows any instances of the word "telnet" in the audit log:
show audit | inc telnet

If the log shows the use of the Telnet command, this is a finding.

Fix Text

The device has a Telnet client that is available at the privileged exec level. Do not use it; use SSH from a management workstation instead.