The F5 BIG-IP appliance must be configured to restrict a consistent inbound IP for the entire management session.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-266135 | F5BI-DM-300099 | SV-266135r1024669_rule | Medium |
| Description |
| This security measure helps limit the effects of denial-of-service (DoS) attacks by employing anti-session hijacking security safeguards. Session hijacking, also called cookie hijacking, is the exploitation of a valid computer session to gain unauthorized access to an application. The attacker steals (or hijacks) the cookies from a valid user and attempts to use them for authentication. |
| STIG | Date |
| F5 BIG-IP TMOS NDM Security Technical Implementation Guide | 2025-06-12 |
Details
| Check Text (C-70059r1023654_chk) |
| From the BIG-IP GUI: 1. System. 2. Preferences. 3. Under "Security Settings", verify "Require A Consistent Inbound IP For The Entire Web Session" box is checked. If the BIG-IP appliance is not configured to require a consistent inbound IP for the entire session for management sessions, this is a finding. |
| Fix Text (F-69962r1023655_fix) |
| From the BIG-IP GUI: 1. System. 2. Preferences. 3. Under "Security Settings", check "Require A Consistent Inbound IP For The Entire Web Session". 4. Update. |