Juniper SRX Services Gateway ALG Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-NET-000015-ALG-000016
<GroupDescription></GroupDescription>Group -
For User Role Firewalls, the Juniper SRX Services Gateway Firewall must employ user attribute-based security policies to enforce approved authorizations for logical access to information and system resources.
<VulnDiscussion>Successful authentication must not automatically give an entity access to an asset or security boundary. The lack of authoriz...Rule Medium Severity -
SRG-NET-000492-ALG-000027
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must generate log records when firewall filters, security screens and security policies are invoked and the traffic is denied or restricted.
<VulnDiscussion>Without generating log records that log usage of objects by subjects and other objects, it would be difficult to establish, c...Rule Medium Severity -
SRG-NET-000493-ALG-000028
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must generate audit records when unsuccessful attempts to access security zones occur.
<VulnDiscussion>Without generating log records that are specific to the security and mission needs of the organization, it would be difficult...Rule Medium Severity -
SRG-NET-000333-ALG-000049
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must be configured to support centralized management and configuration of the audit log.
<VulnDiscussion>Without the ability to centrally manage the content captured in the audit records, identification, troubleshooting, and corre...Rule Medium Severity -
SRG-NET-000089-ALG-000055
<GroupDescription></GroupDescription>Group -
In the event that communications with the Syslog server is lost, the Juniper SRX Services Gateway must continue to queue traffic log records locally.
<VulnDiscussion>It is critical that when the network element is at risk of failing to process audit logs as required, it take action to mitig...Rule Medium Severity -
SRG-NET-000131-ALG-000085
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
<VulnDiscussion>Network devices are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these ...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must not be configured as an NTP server since providing this network service is unrelated to the role as a firewall.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must not be configured as a DNS proxy since providing this network service is unrelated to the role as a Firewall.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000131-ALG-000086
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must not be configured as a DHCP server since providing this network service is unrelated to the role as a Firewall.
<VulnDiscussion>Information systems are capable of providing a wide variety of functions (capabilities or processes) and services. Some of th...Rule Medium Severity -
SRG-NET-000132-ALG-000087
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway Firewall must be configured to prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services, as defined in the PPSM CAL, vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.