SV-215762r557356_rule
V-215762
SRG-NET-000164-ALG-000100
F5BI-LT-000083
CAT II
10
If intermediary services for TLS are provided, configure the BIG-IP Core to validate certificates used for TLS functions by constructing a certification path with status information to an accepted trust anchor.
If the BIG-IP Core does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS) for virtual servers, this is not applicable.
When intermediary services for TLS are provided, verify the BIG-IP Core is configured to validate certificates used for TLS functions by constructing a certification path to an accepted trust anchor.
Navigate to the BIG-IP System manager >> Local traffic >> Profiles >> SSL >> Server.
Select a FIPS-compliant profile.
Review the configuration under "Server Authentication" section.
Verify "Server Certificate" is set to "Required".
Verify "Trusted Certificate Authorities" is set to a DoD-approved CA bundle.
If the BIG-IP Core is not configured to validate certificates used for TLS functions by constructing a certification path to an accepted trust anchor, this is a finding.
V-215762
False
F5BI-LT-000083
If the BIG-IP Core does not provide intermediary services for TLS, or application protocols that use TLS (e.g., DNSSEC or HTTPS) for virtual servers, this is not applicable.
When intermediary services for TLS are provided, verify the BIG-IP Core is configured to validate certificates used for TLS functions by constructing a certification path to an accepted trust anchor.
Navigate to the BIG-IP System manager >> Local traffic >> Profiles >> SSL >> Server.
Select a FIPS-compliant profile.
Review the configuration under "Server Authentication" section.
Verify "Server Certificate" is set to "Required".
Verify "Trusted Certificate Authorities" is set to a DoD-approved CA bundle.
If the BIG-IP Core is not configured to validate certificates used for TLS functions by constructing a certification path to an accepted trust anchor, this is a finding.
M
4019