Skip to content

Juniper SRX Services Gateway VPN Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000517

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must renegotiate the IPsec security association after 8 hours or less.

    &lt;VulnDiscussion&gt;The IPsec SA and its corresponding key will expire either after the number of seconds or amount of traffic volume has exceede...
    Rule Medium Severity
  • SRG-NET-000517

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must renegotiate the IKE security association after 24 hours or less.

    &lt;VulnDiscussion&gt;When a VPN gateway creates an IPsec Security Association (SA), resources must be allocated to maintain the SA. These resource...
    Rule Medium Severity
  • SRG-NET-000061

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use AES encryption for the IPsec proposal to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use AES encryption for the Internet Key Exchange (IKE) proposal to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must implement a FIPS-140-2 validated Diffie-Hellman (DH) group.

    &lt;VulnDiscussion&gt; Use of an approved DH algorithm ensures the Internet Key Exchange (IKE) (phase 1) proposal uses FIPS-validated key managemen...
    Rule Medium Severity
  • SRG-NET-000063

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must be configured to use IPsec with SHA1 or greater to negotiate hashing to protect the integrity of remote access sessions.

    &lt;VulnDiscussion&gt;Without strong cryptographic integrity protections, information can be altered by unauthorized users without detection. Rem...
    Rule Medium Severity
  • SRG-NET-000019

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).

    &lt;VulnDiscussion&gt;Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...
    Rule High Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • If IDPS inspection is performed separately from the Juniper SRX Services Gateway VPN device, the VPN must route sessions to an IDPS for inspection.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must not accept certificates that have been revoked when using PKI for authentication.

    &lt;VulnDiscussion&gt;Situations may arise in which the certificate issued by a Certificate Authority (CA) may need to be revoked before the lifeti...
    Rule High Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must specify Perfect Forward Secrecy (PFS).

    &lt;VulnDiscussion&gt;PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use Encapsulating Security Payload (ESP) in tunnel mode.

    &lt;VulnDiscussion&gt;ESP provides confidentiality, data origin authentication, integrity, and anti-replay services within the IPsec suite of proto...
    Rule Medium Severity
  • SRG-NET-000131

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.

    &lt;VulnDiscussion&gt;Network devices are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these ...
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use IKEv2 for IPsec VPN security associations.

    &lt;VulnDiscussion&gt;Use of IKEv2 leverages DoS protections because of improved bandwidth management and leverages more secure encryption algorith...
    Rule Medium Severity
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-NET-000138

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-NET-000140

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use multifactor authentication (e.g., DoD PKI) for network access to non-privileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...
    Rule High Severity
  • SRG-NET-000168

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module.

    &lt;VulnDiscussion&gt;Unapproved mechanisms that are used for authentication to the cryptographic module are not verified, and therefore cannot be ...
    Rule Medium Severity
  • SRG-NET-000169

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).

    &lt;VulnDiscussion&gt;Lack of authentication and identification enables non-organizational users to gain access to the network or possibly a networ...
    Rule Medium Severity
  • The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.

    &lt;VulnDiscussion&gt;Idle TCP sessions can be susceptible to unauthorized access and hijacking attacks. By default, routers do not continually tes...
    Rule Low Severity
  • SRG-NET-000352

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule High Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule Medium Severity
  • SRG-NET-000230

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must configure Internet Key Exchange (IKE) with SHA1 or greater to protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule High Severity
  • SRG-NET-000355

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted certificate authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules