STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to F5 BIG-IP Access Policy Manager Security Technical Implementation Guide

V-260055

CAT III (Low)

The F5 BIG-IP appliance must be configured to limit authenticated client sessions to initial session source IP.

Rule ID

SV-260055r947390_rule

STIG

F5 BIG-IP Access Policy Manager Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-001184

Discussion

The "Restrict to Single Client IP" is a safeguard against session hijacking or cookie theft. Even if an attacker manages to steal a session cookie, the cookie cannot be used from a different source IP address that the address used to initiate the session. This security measure is set within the APM Access Pro?les. Sites should test this setting within their network prior to implementing. Users behind a shared proxy address may be denied access. Optionally, the F5 BIG-IP APM can be installed and used to produce access reports to find recurring IP sources within the user community.

Check Content

If the site has documented that this setting has been tested operationally and is operationally harmful because of false positives, this is not a finding.

From the BIG-IP GUI:
1. System.
2. Access.
3. Profiles/Policies.
4. Access Profiles.
5. Click the Access profile name.
6. Under "Settings", verify "Restrict to Single Client IP" is checked.

If the BIG-IP appliance is not configured to limit authenticated client sessions to initial session source IP, this is a finding.

Fix Text

Note: Implementation is OPTIONAL. Setting should be tested to ensure that a denial of service (DoS) does not result. 

From the BIG-IP GUI:
1. System.
2. Access.
3. Profiles/Policies.
4. Access Profiles.
5. Click the Access profile name.
6. Under "Settings", check "Restrict to Single Client IP".
Note: If the box is grayed out, check the box all the way to the right of the setting first and then check the box.
7. Click "Update".
8. Click "Apply Access Policy".