STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Riverbed NetProfiler Security Technical Implementation Guide

Version

V2R1

Release Date

Jun 10, 2024

SCAP Benchmark ID

RB_NetProfiler_STIG

Total Checks

25

Tags

other
CAT I: 6CAT II: 17CAT III: 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (25)

V-256071LOWThe Riverbed NetProfiler must be configured to limit the number of concurrent sessions to one for the locally defined administrator account.V-256072HIGHThe Riverbed NetProfiler must be configured to automatically generate DOD-required audit records with sufficient information to support incident reporting to a central log server.V-256073MEDIUMThe Riverbed NetProfiler must enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 30 minutes, at a minimum.V-256074MEDIUMThe Riverbed NetProfiler must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.V-256075MEDIUMThe Riverbed NetProfiler must be configured to retain the Standard Mandatory DOD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.V-256077MEDIUMThe Riverbed NetProfiler must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.V-256078MEDIUMThe Riverbed NetProfiler must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.V-256079HIGHThe Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.V-256080MEDIUMThe Riverbed NetProfiler must be configured to enforce a minimum 15-character password length.V-256081MEDIUMThe Riverbed NetProfiler must configure the local account password to "require mixed case".V-256082MEDIUMThe Riverbed NetProfiler must require that at least one special character be used.V-256084HIGHThe Riverbed NetProfiler must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.V-256085MEDIUMThe Riverbed NetProfiler must be configured to synchronize internal information system clocks using redundant authoritative time sources.V-256086MEDIUMThe Riverbed NetProfiler must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).V-256087MEDIUMThe Riverbed NetProfiler must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.V-256088MEDIUMThe Riverbed NetProfiler must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).V-256089MEDIUMThe Riverbed NetProfiler must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.V-256090HIGHThe Riverbed NetProfiler must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 validated algorithm to protect the confidentiality and integrity of all cryptographic functions.V-256091MEDIUMThe Riverbed NetProfiler must be configured to protect against known types of denial-of-service (DOS) attacks by restricting web and SSH access to the appliance.V-256092MEDIUMThe Riverbed NetProfiler must be configured to use redundant Syslog servers that are configured on a different system than the NetProfiler appliance.V-256093HIGHThe Riverbed NetProfiler must be configured to use an authentication server to authenticate users prior to granting administrative access.V-256094MEDIUMThe Riverbed NetProfiler must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.V-256095HIGHThe Riverbed NetProfiler must be configured to run an operating system release that is currently supported by the vendor.V-256096LOWThe Riverbed NetProfiler must be configured to conduct backups of system-level information and system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.V-256097MEDIUMThe network device must terminate shared/group account credentials when members leave the group.