No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000148-L2S-000015
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.
<VulnDiscussion>Controlling LAN access via 802.1x authentication can assist in preventing a malicious user from connecting an unauthorized PC...Rule High Severity -
SRG-NET-000168-L2S-000019
<GroupDescription></GroupDescription>Group -
The Juniper layer 2 switch must be configured to disable all dynamic VLAN registration protocols.
<VulnDiscussion>Dynamic VLAN registration protocols provide centralized management of VLAN domains, which can reduce administration in a swit...Rule Medium Severity -
SRG-NET-000193-L2S-000020
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.
<VulnDiscussion>DoS attacks can be mitigated by ensuring sufficient capacity is available for mission-critical traffic. Managing capacity may...Rule Medium Severity -
SRG-NET-000331-L2S-000001
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to permit authorized users to select a user session to capture.
<VulnDiscussion>Without the capability to select a user session to capture/record or view/hear, investigations into suspicious or harmful eve...Rule Medium Severity -
SRG-NET-000332-L2S-000002
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to permit authorized users to remotely view, in real time, all content related to an established user session from a component separate from the layer 2 switch.
<VulnDiscussion>Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activ...Rule Medium Severity -
SRG-NET-000343-L2S-000016
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...Rule Medium Severity -
SRG-NET-000362-L2S-000021
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to enable Root Protection on STP switch ports connecting to access layer switches.
<VulnDiscussion>Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the...Rule Low Severity -
SRG-NET-000362-L2S-000022
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports.
<VulnDiscussion>If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priori...Rule Medium Severity -
SRG-NET-000362-L2S-000023
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured to enable STP Loop Protection on all non-designated STP switch ports.
<VulnDiscussion>The Spanning Tree Protocol (STP) Loop Protection feature provides additional protection against STP loops. An STP loop is cre...Rule Medium Severity -
SRG-NET-000362-L2S-000024
<GroupDescription></GroupDescription>Group -
The Juniper EX switch must be configured not to forward unknown unicast traffic to access interfaces.
<VulnDiscussion>Access layer switches use the Content Addressable Memory (CAM) table to direct traffic to specific interfaces based on the VL...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.