F5BI-LT-000217 - The BIG-IP Core implementation must be configured to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks to virtual servers - Reaper Low-water Mark

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancing provides service redundancy; which service redundancy reduces the susceptibility of the ALG to many DoS attacks.

The ALG must be configured to prevent or mitigate the impact on network availability and traffic flow of DoS attacks that have occurred or are ongoing.

This requirement applies to the functionality of the device as it pertains to handling network traffic. Some types of attacks may be specialized to certain network technologies, functions, or services. For each technology, known and potential DoS attacks must be identified and solutions for each type implemented.

Solution

Configure the BIG-IP Core to implement load balancing to limit the effects of known and unknown types of Denial of Service (DoS) attacks.

Navigate to the BIG-IP System manager >> System >> Configuration >> Local Traffic >> General.

Make the following configurations under 'Properties'.

Set 'Reaper High-water Mark' to 95.

Set 'Reaper Low-water Mark' to 85.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_F5_BIG-IP_11-x_Y23M11_STIG.zip

Item Details

References: CAT|I, CCI|CCI-002385, Rule-ID|SV-215791r831474_rule, STIG-ID|F5BI-LT-000217, STIG-Legacy|SV-74793, STIG-Legacy|V-60363, Vuln-ID|V-215791

Plugin: F5

Control ID: 516be3449fafa572115b93823e68625b1676f2dfb517f801fc54219b3a32ffe9