STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP TMOS ALG Security Technical Implementation Guide

V-266168

CAT III (Low)

The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.

Rule ID

SV-266168r1024400_rule

STIG

F5 BIG-IP TMOS ALG Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001184

Discussion

The "Restrict to Single Client IP” is a safeguard against session hijacking or cookie theft. Even if an attacker manages to steal a session cookie, the cookie cannot be used from a different source IP address that the address used to initiate the session. This security measure is set within the APM Access Profiles. This setting has been recommended by F5 as a defense-in-depth measure. However, in some networks, this may result in false positives or rejection of legitimate connections. Users behind a shared proxy address may be denied access. Thus, sites must test this setting within their network prior to implementing to determine if there are operational impacts that prevent the use of this setting. If so, the site must document the impacts and get approval from the authorizing official (AO) if this required setting will not be implemented.

Check Content

If the site has documented an adverse operational impact and has AO approval, this is not a finding.

From the BIG-IP GUI:
1. System.
2. Access.
3. Profiles/Policies.
4. Access Profiles.
5. Click the access profile name.
6. Under Settings, verify "Restrict to Single Client IP" is checked.

If the BIG-IP appliance is not configured to limit authenticated client sessions to initial session source IP, this is a finding.

Fix Text

Note: Setting must be tested. If there are operational impacts that prevent the use of this setting, document the impacts, and obtain approval from the AO if this requirement will not be implemented. 

From the BIG-IP GUI:
1. System.
2. Access.
3. Profiles/Policies.
4. Access Profiles.
5. Click the access profile name.
6. Under Settings, check "Restrict to Single Client IP".
Note: If the box is grayed out, check the box all the way to the right of the setting first and then check the box.
7. Click "Update".
8. Click "Apply Access Policy".