STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Network WLAN Controller Platform Security Technical Implementation Guide

Version

V7R3

Release Date

Feb 13, 2023

SCAP Benchmark ID

Network_WLAN_Controller_Platform_STIG

Total Checks

6

Tags

network
CAT I: 0CAT II: 6CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (6)

V-243233MEDIUMThe WLAN inactive/idle session timeout must be set for 30 minutes or less.V-243234MEDIUMWLAN must use EAP-TLS.V-243235MEDIUMWLAN components must be FIPS 140-2 or FIPS 140-3 certified and configured to operate in FIPS mode.V-243236MEDIUMWLAN EAP-TLS implementation must use certificate-based PKI authentication to connect to DoD networks.V-243237MEDIUMThe network device must be configured to only permit management traffic that ingresses and egresses the out-of-band management (OOBM) interface.V-243238MEDIUMThe network device must not be configured to have any feature enabled that calls home to the vendor.