Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000362-RTR-000118

    <GroupDescription></GroupDescription>
    Group
  • The Juniper BGP router must be configured to limit the prefix size on any inbound route advertisement to /24 or the least significant prefixes issued to the customer.

    &lt;VulnDiscussion&gt;The effects of prefix de-aggregation can degrade router performance due to the size of routing tables and also result in blac...
    Rule Low Severity
  • SRG-NET-000512-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.

    &lt;VulnDiscussion&gt;Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability o...
    Rule Low Severity
  • SRG-NET-000512-RTR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Juniper MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.

    &lt;VulnDiscussion&gt;Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability o...
    Rule Low Severity
  • SRG-NET-000512-RTR-000003

    <GroupDescription></GroupDescription>
    Group
  • The Juniper MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.

    &lt;VulnDiscussion&gt;Packet loss can occur when an IGP adjacency is established and the router begins forwarding packets using the new adjacency b...
    Rule Low Severity
  • SRG-NET-000193-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper MPLS router with RSVP-TE enabled must be configured to enable refresh reduction features.

    &lt;VulnDiscussion&gt;RSVP-TE can be used to perform constraint-based routing when building LSP tunnels within the network core that will support Q...
    Rule Low Severity
  • SRG-NET-000512-RTR-000004

    <GroupDescription></GroupDescription>
    Group
  • The Juniper MPLS router must be configured to have TTL Propagation disabled.

    &lt;VulnDiscussion&gt;The head end of the label-switched path (LSP), the label edge router (LER) will decrement the IP packet's time-to-live (TTL) ...
    Rule Medium Severity
  • SRG-NET-000512-RTR-000005

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance bound to the appropriate physical or logical interfaces to maintain traffic separation between all MPLS L3VPNs.

    &lt;VulnDiscussion&gt;The primary security model for an MPLS L3VPN infrastructure is traffic separation. The service provider must guarantee the cu...
    Rule High Severity
  • SRG-NET-000512-RTR-000006

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to have each Virtual Routing and Forwarding (VRF) instance with the appropriate Route Target (RT).

    &lt;VulnDiscussion&gt;The primary security model for an MPLS L3VPN as well as a VRF-lite infrastructure is traffic separation. Each interface can o...
    Rule High Severity
  • SRG-NET-000512-RTR-000007

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).

    &lt;VulnDiscussion&gt;An RD provides uniqueness to the customer address spaces within the MPLS L3VPN infrastructure. The concept of the VPN-IPv4 an...
    Rule Medium Severity
  • SRG-NET-000343-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router providing MPLS Layer 2 Virtual Private Network (L2VPN) services must be configured to authenticate targeted Label Distribution Protocol (LDP) sessions used to exchange virtual circuit (VC) information using a FIPS-approved message authentication code algorithm.

    &lt;VulnDiscussion&gt;LDP provides the signaling required for setting up and tearing down pseudowires (virtual circuits used to transport Layer 2 f...
    Rule Medium Severity
  • SRG-NET-000512-RTR-000008

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.

    &lt;VulnDiscussion&gt;VPWS is an L2VPN technology that provides a virtual circuit between two PE routers to forward Layer 2 frames between two cust...
    Rule High Severity
  • SRG-NET-000512-RTR-000009

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the routing instance with the globally unique VPLS ID assigned for each customer VLAN.

    &lt;VulnDiscussion&gt;VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network. Customer Layer 2 frames are for...
    Rule High Severity
  • SRG-NET-000193-RTR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have traffic storm control thresholds on CE-facing interfaces.

    &lt;VulnDiscussion&gt;A traffic storm occurs when packets flood a VPLS bridge, creating excessive traffic and degrading network performance. Traffi...
    Rule Medium Severity
  • SRG-NET-000362-RTR-000119

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to implement Protocol Independent Multicast (PIM) snooping for each Virtual Private LAN Services (VPLS) bridge domain.

    &lt;VulnDiscussion&gt;PIM snooping provides a way to constrain multicast traffic at Layer 2. By monitoring PIM join and prune packets on each inter...
    Rule Low Severity
  • SRG-NET-000192-RTR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.

    &lt;VulnDiscussion&gt;VPLS defines an architecture that delivers Ethernet multipoint services over an MPLS network. Customer Layer 2 frames are for...
    Rule Medium Severity
  • SRG-NET-000205-RTR-000007

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to block any traffic that is destined to IP core infrastructure.

    &lt;VulnDiscussion&gt;IP/MPLS networks providing VPN and transit services must provide, at the least, the same level of protection against denial-o...
    Rule High Severity
  • SRG-NET-000205-RTR-000008

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.

    &lt;VulnDiscussion&gt;The uRPF feature is a defense against spoofing and denial-of-service (DoS) attacks by verifying if the source address of any ...
    Rule Medium Severity
  • SRG-NET-000205-RTR-000016

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to ignore or block all packets with any IP options.

    &lt;VulnDiscussion&gt;Packets with IP options are not fast switched and therefore must be punted to the router processor. Hackers who initiate deni...
    Rule Medium Severity
  • SRG-NET-000193-RTR-000113

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile.

    &lt;VulnDiscussion&gt;Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availabi...
    Rule Low Severity
  • SRG-NET-000193-RTR-000114

    <GroupDescription></GroupDescription>
    Group
  • The Juniper P router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile.

    &lt;VulnDiscussion&gt;Different applications have unique requirements and toleration levels for delay, jitter, bandwidth, packet loss, and availabi...
    Rule Low Severity
  • SRG-NET-000193-RTR-000112

    <GroupDescription></GroupDescription>
    Group
  • The Juniper PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. Packet flooding distributed denial-of-service (DDoS...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000003

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.

    &lt;VulnDiscussion&gt;If multicast traffic is forwarded beyond the intended boundary, it is possible that it can be intercepted by unauthorized or ...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000004

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.

    &lt;VulnDiscussion&gt;PIM is a routing protocol used to build multicast distribution trees for forwarding multicast traffic across the network infr...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000005

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.

    &lt;VulnDiscussion&gt;If multicast traffic is forwarded beyond the intended boundary, it is possible that it can be intercepted by unauthorized or ...
    Rule Low Severity
  • SRG-NET-000362-RTR-000120

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast Rendezvous Point (RP) router must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.

    &lt;VulnDiscussion&gt;MSDP peering between networks enables sharing of multicast source information. Enclaves with an existing multicast topology u...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules