STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to A10 Networks ADC NDM Security Technical Implementation Guide

V-255623

CAT I (High)

The A10 Networks ADC must not use the default enable password.

Rule ID

SV-255623r961863_rule

STIG

A10 Networks ADC NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000764, CCI-000366

Discussion

To assure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and authenticated for all network management accesses to prevent potential misuse and compromise of the system. The use of a default password for any account, especially one for administrative access, can quickly lead to a compromise of the device and subsequently, the entire enclave or system. The "admin" account is intended solely for the initial setup of the device and must be disabled when the device is initially configured. The default password for this account must immediately be changed at the first logon of an authorized administrator. The default enable password on the A10 is blank password, which can immediately be guessed and lead to a compromise. This password must be immediately set.

Check Content

After successfully logging on to the device, attempt to enter enable mode using the default (blank) password. 

If that is successful, this is a finding.

Fix Text

The following command changes the enable password to the character string entered: 
enable-password [newpassword]