Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000213

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.

    &lt;VulnDiscussion&gt;Idle TCP sessions can be susceptible to unauthorized access and hijacking attacks. By default, routers do not continually tes...
    Rule Low Severity
  • SRG-NET-000352

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must use cryptography that is compliant with Suite B parameters when transporting classified traffic across an unclassified network.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule High Severity
  • SRG-NET-000510

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN IKE must use NIST FIPS-validated cryptography to implement encryption services for unclassified VPN traffic.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network el...
    Rule Medium Severity
  • SRG-NET-000230

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must configure Internet Key Exchange (IKE) with SHA1 or greater to protect the authenticity of communications sessions.

    &lt;VulnDiscussion&gt;Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false in...
    Rule High Severity
  • SRG-NET-000355

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted certificate authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-NET-000364

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must only allow incoming VPN communications from organization-defined authorized sources routed to organization-defined authorized destinations.

    &lt;VulnDiscussion&gt;Unrestricted traffic may contain malicious traffic which poses a threat to an enclave or to other connected networks. Additio...
    Rule Medium Severity
  • SRG-NET-000369

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must disable split-tunneling for remote clients VPNs.

    &lt;VulnDiscussion&gt;Split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to e...
    Rule Medium Severity
  • SRG-NET-000147

    <GroupDescription></GroupDescription>
    Group
  • The Juniper SRX Services Gateway VPN must use anti-replay mechanisms for security associations.

    &lt;VulnDiscussion&gt;Anti-replay is an IPsec security mechanism at a packet level which helps to avoid unwanted users from intercepting and modify...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules