Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000364-RTR-000200

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured to drop fragmented IPv6 packets where the first fragment does not include the entire IPv6 header chain.

    &lt;VulnDiscussion&gt;One of the fragmentation weaknesses known in IPv6 is the "undetermined transport" packet, which is the first fragment where t...
    Rule Medium Severity
  • SRG-NET-000364-RTR-000201

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3255.

    &lt;VulnDiscussion&gt;The routing header can be used maliciously to send a packet through a path where less robust security is in place, rather tha...
    Rule Medium Severity
  • SRG-NET-000364-RTR-000202

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop header with invalid option type values.

    &lt;VulnDiscussion&gt;These options are intended to be for the Destination Options header only. The optional and extensible natures of the IPv6 ext...
    Rule Medium Severity
  • SRG-NET-000364-RTR-000203

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured to drop IPv6 packets containing a Destination Option header with invalid option type values.

    &lt;VulnDiscussion&gt;These options are intended to be for the Hop-by-Hop header only. The optional and extensible natures of the IPv6 extension he...
    Rule Medium Severity
  • SRG-NET-000364-RTR-000204

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured to drop IPv6 packets containing an extension header with the Endpoint Identification option.

    &lt;VulnDiscussion&gt;The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not a...
    Rule Medium Severity
  • SRG-NET-000364-RTR-000205

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.

    &lt;VulnDiscussion&gt;The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not a...
    Rule Medium Severity
  • SRG-NET-000364-RTR-000206

    <GroupDescription></GroupDescription>
    Group
  • The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type.

    &lt;VulnDiscussion&gt;The optional and extensible natures of the IPv6 extension headers require higher scrutiny since many implementations do not a...
    Rule Medium Severity
  • SRG-NET-000512-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper BGP router must be configured to use its loopback address as the source address for iBGP peering sessions.

    &lt;VulnDiscussion&gt;Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability o...
    Rule Low Severity
  • SRG-NET-000512-RTR-000002

    <GroupDescription></GroupDescription>
    Group
  • The Juniper MPLS router must be configured to use its loopback address as the source address for LDP peering sessions.

    &lt;VulnDiscussion&gt;Using a loopback address as the source address offers a multitude of uses for security, access, management, and scalability o...
    Rule Low Severity
  • SRG-NET-000512-RTR-000003

    <GroupDescription></GroupDescription>
    Group
  • The Juniper MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.

    &lt;VulnDiscussion&gt;Packet loss can occur when an IGP adjacency is established and the router begins forwarding packets using the new adjacency b...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules