Skip to content

Juniper EX Series Switches Router Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Juniper router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.

    <VulnDiscussion>Information flow control regulates authorized information to travel within a network and between interconnected networks. Con...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000003

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000019-RTR-000009

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for Multicast Source Discovery Protocol (MSDP) must filter received source-active multicast advertisements for any undesirable multicast groups and sources.

    &lt;VulnDiscussion&gt;The interoperability of BGP extensions for interdomain multicast routing and MSDP enables seamless connectivity of multicast ...
    Rule Low Severity
  • SRG-NET-000018-RTR-000008

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for Multicast Source Discovery Protocol (MSDP) must filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.

    &lt;VulnDiscussion&gt;To avoid global visibility of local information, there are a number of source-group (S, G) states in a PIM-SM domain that mus...
    Rule Low Severity
  • SRG-NET-000018-RTR-000009

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for MSDP must limit the amount of source-active messages it accepts on per-peer basis.

    &lt;VulnDiscussion&gt;To reduce any risk of a denial-of-service (DoS) attack from a rogue or misconfigured MSDP router, the router must be configur...
    Rule Low Severity
  • SRG-NET-000018-RTR-000010

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for BGP must reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.

    &lt;VulnDiscussion&gt;Verifying the path a route has traversed will ensure that the local AS is not used as a transit network for unauthorized traf...
    Rule Low Severity
  • SRG-NET-000019-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.

    &lt;VulnDiscussion&gt;The use of POTS lines to modems connecting to network devices provides clear text of authentication traffic over commercial c...
    Rule Low Severity
  • SRG-NET-000019-RTR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.

    &lt;VulnDiscussion&gt;If multicast traffic is forwarded beyond the intended boundary, it is possible that it can be intercepted by unauthorized or ...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000004

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.

    &lt;VulnDiscussion&gt;PIM is a routing protocol used to build multicast distribution trees for forwarding multicast traffic across the network infr...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000005

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.

    &lt;VulnDiscussion&gt;If multicast traffic is forwarded beyond the intended boundary, it is possible that it can be intercepted by unauthorized or ...
    Rule Low Severity
  • SRG-NET-000019-RTR-000007

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to have all inactive interfaces disabled.

    &lt;VulnDiscussion&gt;An inactive interface is rarely monitored or controlled and may expose a network to an undetected attack on that interface. U...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules