SV-215766r557356_rule
V-215766
SRG-NET-000230-ALG-000113
F5BI-LT-000097
CAT II
10
Configure BIG-IP Core to protect the authenticity of communications sessions.
Verify the BIG-IP Core is configured to protect the authenticity of communications sessions.
Navigate to the BIG-IP System manager >> Local Traffic >> Profiles >> SSL >> Client
Verify a profile exists that is FIPS compliant.
Select FIPS-compliant profile.
Select "Advanced" next to "Configuration".
Verify "Ciphers" under "Configuration" section is configured to use FIPS-compliant ciphers.
Verify the BIG-IP Core is configured to use FIPS-compliant profile:
Navigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.
Select Virtual Server(s) from the list that the LTM module is managing the Client SSL side traffic.
Verify under "Configuration" section, that FIPS-compliant profile is in the "Selected" area for "SSL Profile (Client)".
If the BIG-IP Core is not configured to protect the authenticity of communications sessions, this is a finding.
V-215766
False
F5BI-LT-000097
Verify the BIG-IP Core is configured to protect the authenticity of communications sessions.
Navigate to the BIG-IP System manager >> Local Traffic >> Profiles >> SSL >> Client
Verify a profile exists that is FIPS compliant.
Select FIPS-compliant profile.
Select "Advanced" next to "Configuration".
Verify "Ciphers" under "Configuration" section is configured to use FIPS-compliant ciphers.
Verify the BIG-IP Core is configured to use FIPS-compliant profile:
Navigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.
Select Virtual Server(s) from the list that the LTM module is managing the Client SSL side traffic.
Verify under "Configuration" section, that FIPS-compliant profile is in the "Selected" area for "SSL Profile (Client)".
If the BIG-IP Core is not configured to protect the authenticity of communications sessions, this is a finding.
M
4019