STIGQter STIGQter: STIG Summary: F5 BIG-IP Local Traffic Manager 11.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic to virtual servers.

DISA Rule

SV-215802r557356_rule

Vulnerability Number

V-215802

Group Title

SRG-NET-000512-ALG-000065

Rule Version

F5BI-LT-000305

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

If the BIG-IP Core provides intermediary/proxy services for FTP and FTPS communications traffic, configure the BIG-IP Core as follows:

Configure the BIG-IP LTM module to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic.

Check Contents

If the BIG-IP Core does not provide intermediary/proxy services for FTP and FTPS communications traffic for virtual servers, this is not applicable.

When intermediary/proxy services for FTP and FTPS communications traffic are provided, verify the BIG-IP Core is configured as follows:

Verify the BIG-IP LTM module is configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic.

Navigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.

Select a Virtual Server that has been configured as an FTP proxy.

Verify that "FTP Profile" under the "Configuration" section is set to a locally configured FTP profile.

Verify the configuration of the selected FTP profile:

Navigate to the BIG-IP System manager >> Local Traffic >> Profiles >> Services >> FTP.

Select the FTP profile that was to configure the Virtual Server.

Verify that "Protocol Security" is Enabled under the "Settings" section.

If the BIG-IP Core does not inspect inbound FTP and FTPS communications traffic for protocol compliance and protocol anomalies, this is a finding.

Vulnerability Number

V-215802

Documentable

False

Rule Version

F5BI-LT-000305

Severity Override Guidance

If the BIG-IP Core does not provide intermediary/proxy services for FTP and FTPS communications traffic for virtual servers, this is not applicable.

When intermediary/proxy services for FTP and FTPS communications traffic are provided, verify the BIG-IP Core is configured as follows:

Verify the BIG-IP LTM module is configured to inspect for protocol compliance and protocol anomalies in inbound FTP and FTPS communications traffic.

Navigate to the BIG-IP System manager >> Local Traffic >> Virtual Servers >> Virtual Servers List tab.

Select a Virtual Server that has been configured as an FTP proxy.

Verify that "FTP Profile" under the "Configuration" section is set to a locally configured FTP profile.

Verify the configuration of the selected FTP profile:

Navigate to the BIG-IP System manager >> Local Traffic >> Profiles >> Services >> FTP.

Select the FTP profile that was to configure the Virtual Server.

Verify that "Protocol Security" is Enabled under the "Settings" section.

If the BIG-IP Core does not inspect inbound FTP and FTPS communications traffic for protocol compliance and protocol anomalies, this is a finding.

Check Content Reference

M

Target Key

4019

Comments