STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Network WLAN Bridge Platform Security Technical Implementation Guide

Version

V7R2

Release Date

Feb 13, 2023

SCAP Benchmark ID

Network_WLAN_Bridge_Platform_STIG

Total Checks

6

Tags

network
CAT I: 0CAT II: 5CAT III: 1

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (6)

V-243227LOWWLAN SSIDs must be changed from the manufacturer's default to a pseudo random word that does not identify the unit, base, organization, etc.V-243228MEDIUMWLAN components must be Wi-Fi Alliance certified with WPA2 or WPA3.V-243229MEDIUMWLAN components must be FIPS 140-2 or FIPS 140-3 certified and configured to operate in FIPS mode.V-243230MEDIUMWireless access points and bridges must be placed in dedicated subnets outside the enclave's perimeter.V-243231MEDIUMThe network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.V-243232MEDIUMThe network device must not be configured to have any feature enabled that calls home to the vendor.