Skip to content

Juniper EX Series Switches Router Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Juniper router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.

    <VulnDiscussion>Information flow control regulates authorized information to travel within a network and between interconnected networks. Con...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000003

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000019-RTR-000009

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for Multicast Source Discovery Protocol (MSDP) must filter received source-active multicast advertisements for any undesirable multicast groups and sources.

    &lt;VulnDiscussion&gt;The interoperability of BGP extensions for interdomain multicast routing and MSDP enables seamless connectivity of multicast ...
    Rule Low Severity
  • SRG-NET-000018-RTR-000008

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for Multicast Source Discovery Protocol (MSDP) must filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.

    &lt;VulnDiscussion&gt;To avoid global visibility of local information, there are a number of source-group (S, G) states in a PIM-SM domain that mus...
    Rule Low Severity
  • SRG-NET-000018-RTR-000009

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for MSDP must limit the amount of source-active messages it accepts on per-peer basis.

    &lt;VulnDiscussion&gt;To reduce any risk of a denial-of-service (DoS) attack from a rogue or misconfigured MSDP router, the router must be configur...
    Rule Low Severity
  • SRG-NET-000018-RTR-000010

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router configured for BGP must reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.

    &lt;VulnDiscussion&gt;Verifying the path a route has traversed will ensure that the local AS is not used as a transit network for unauthorized traf...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules