III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway VPN must not accept certificates that have been revoked when using PKI for authentication.
<VulnDiscussion>Situations may arise in which the certificate issued by a Certificate Authority (CA) may need to be revoked before the lifeti...Rule High Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway VPN must specify Perfect Forward Secrecy (PFS).
<VulnDiscussion>PFS generates each new encryption key independently from the previous key. Without PFS, compromise of one key will compromise...Rule Medium Severity -
SRG-NET-000512
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway VPN must use Encapsulating Security Payload (ESP) in tunnel mode.
<VulnDiscussion>ESP provides confidentiality, data origin authentication, integrity, and anti-replay services within the IPsec suite of proto...Rule Medium Severity -
SRG-NET-000131
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.
<VulnDiscussion>Network devices are capable of providing a wide variety of functions (capabilities or processes) and services. Some of these ...Rule Medium Severity -
SRG-NET-000132
<GroupDescription></GroupDescription>Group -
The Juniper SRX Services Gateway VPN must use IKEv2 for IPsec VPN security associations.
<VulnDiscussion>Use of IKEv2 leverages DoS protections because of improved bandwidth management and leverages more secure encryption algorith...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.