Skip to content

Juniper SRX Services Gateway VPN Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-NET-000517

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must renegotiate the IPsec security association after 8 hours or less.

    &lt;VulnDiscussion&gt;The IPsec SA and its corresponding key will expire either after the number of seconds or amount of traffic volume has exceede...
    Rule Medium Severity
  • SRG-NET-000517

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000132

    <GroupDescription></GroupDescription>
    Group
  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must renegotiate the IKE security association after 24 hours or less.

    &lt;VulnDiscussion&gt;When a VPN gateway creates an IPsec Security Association (SA), resources must be allocated to maintain the SA. These resource...
    Rule Medium Severity
  • SRG-NET-000061

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use AES encryption for the IPsec proposal to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use AES encryption for the Internet Key Exchange (IKE) proposal to protect the confidentiality of remote access sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-NET-000062

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must implement a FIPS-140-2 validated Diffie-Hellman (DH) group.

    &lt;VulnDiscussion&gt; Use of an approved DH algorithm ensures the Internet Key Exchange (IKE) (phase 1) proposal uses FIPS-validated key managemen...
    Rule Medium Severity
  • SRG-NET-000063

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must be configured to use IPsec with SHA1 or greater to negotiate hashing to protect the integrity of remote access sessions.

    &lt;VulnDiscussion&gt;Without strong cryptographic integrity protections, information can be altered by unauthorized users without detection. Rem...
    Rule Medium Severity
  • SRG-NET-000019

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.

    &lt;VulnDiscussion&gt;Remote access devices, such as those providing remote access to network devices and information systems, which lack automated...
    Rule Medium Severity
  • SRG-NET-000512

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use Internet Key Exchange (IKE) for IPsec VPN Security Associations (SAs).

    &lt;VulnDiscussion&gt;Without IKE, the SPI is manually specified for each security association. IKE peers will negotiate the encryption algorithm a...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules