Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000019-RTR-000012

    <GroupDescription></GroupDescription>
    Group
  • The Juniper out-of-band management (OOBM) gateway router must not be configured to redistribute routes between the management network routing domain and the managed network routing domain.

    &lt;VulnDiscussion&gt;If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment ...
    Rule Medium Severity
  • SRG-NET-000019-RTR-000013

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources.

    &lt;VulnDiscussion&gt;Real-time multicast traffic can entail multiple large flows of data. An attacker can flood a network segment with multicast p...
    Rule Low Severity
  • SRG-NET-000019-RTR-000014

    <GroupDescription></GroupDescription>
    Group
  • The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Router (DR) for any undesirable multicast groups.

    &lt;VulnDiscussion&gt;Real-time multicast traffic can entail multiple large flows of data. An attacker can flood a network segment with multicast p...
    Rule Low Severity
  • SRG-NET-000076-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to produce audit records containing information to establish where the events occurred.

    &lt;VulnDiscussion&gt;Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up t...
    Rule Medium Severity
  • SRG-NET-000077-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to produce audit records containing information to establish the source of the events.

    &lt;VulnDiscussion&gt;Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...
    Rule Medium Severity
  • SRG-NET-000078-RTR-000001

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to log all packets that have been dropped.

    &lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is ...
    Rule Low Severity
  • SRG-NET-000131-RTR-000035

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to have all nonessential capabilities disabled.

    &lt;VulnDiscussion&gt;A compromised router introduces risk to the entire network infrastructure, as well as data resources that are accessible via ...
    Rule Low Severity
  • SRG-NET-000131-RTR-000083

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must not be configured to have any feature enabled that calls home to the vendor.

    &lt;VulnDiscussion&gt;Call home services will routinely send data such as configuration and diagnostic information to the vendor for routine or eme...
    Rule Medium Severity
  • SRG-NET-000168-RTR-000077

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to use encryption for routing protocol authentication.

    &lt;VulnDiscussion&gt;A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...
    Rule Medium Severity
  • SRG-NET-000168-RTR-000078

    <GroupDescription></GroupDescription>
    Group
  • The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.

    &lt;VulnDiscussion&gt;A rogue router could send a fictitious routing update to convince a site's perimeter router to send traffic to an incorrect o...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules