Skip to content

Juniper EX Series Switches Layer 2 Switch Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000131-L2S-000014

    Group
  • The Juniper EX switch must be configured to disable non-essential capabilities.

    A compromised switch introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter defense has no oversight or control of attacks...
    Rule High Severity
  • The Juniper layer 2 switch must be configured to disable all dynamic VLAN registration protocols.

    Dynamic VLAN registration protocols provide centralized management of VLAN domains, which can reduce administration in a switched network. Interfaces are assigned to VLANs and the VLAN is dynamical...
    Rule Medium Severity
  • The Juniper EX switch must be configured to enable Root Protection on STP switch ports connecting to access layer switches.

    Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the switched network. Any switch can be the root bridge in a network. Howev...
    Rule Low Severity
  • The Juniper EX switch must be configured to enable STP Loop Protection on all non-designated STP switch ports.

    The Spanning Tree Protocol (STP) Loop Protection feature provides additional protection against STP loops. An STP loop is created when an STP blocking port in a redundant topology erroneously trans...
    Rule Medium Severity
  • The Juniper EX switch must be configured to enable DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.

    In an enterprise network, devices under administrative control are trusted sources. These devices include the switches, routers, and servers in the network. Host interfaces and unknown DHCP servers...
    Rule Medium Severity
  • If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.

    Spanning Tree Protocol (STP) is implemented on bridges and switches to prevent layer 2 loops when a broadcast domain spans multiple bridges and switches and when redundant links are provisioned to ...
    Rule Medium Severity
  • The Juniper EX switch must not be configured with VLANs used for L2 control traffic assigned to any host-facing access interface.

    In a switched Ethernet network, some protocols use L2 Protocol Data Units (PDU) to communicate in-band management or other control information. This control traffic is inappropriate for host-facing...
    Rule Medium Severity
  • The Juniper EX switch must be configured to set all user-facing or untrusted ports as access interfaces.

    Configuring user-facing or untrusted interfaces as trunked may expose network traffic to an unauthorized, or unintended, connected endpoint. Access interfaces can belong to a single VLAN rather tha...
    Rule Medium Severity
  • SRG-NET-000148-L2S-000015

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules