6.10.1.4 Ensure SSH Rate Limit is Configured

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

SSH connections should be limited.

Rationale:
SSH is a common management protocol, so is often targeted by attackers trying to gain access to routers or execute Denial of Service (DoS) attacks.
To limit the effectiveness of DoS and Brute Force attacks targeting the JUNOS Device using the SSH service, rate limiting should be used to restrict the maximum number of new connections per second.
Any sessions attempted once this limit is reached will be rejected. A maximum limit 4 new sessions per second is recommended for most environments.

Solution

To restrict concurrent SSH connections, issue the following command from the [edit system] hierarchy;
[edit system]
user@host#set services ssh rate-limit <limit>

Default Value:
Up to 150 new sessions per second are accepted by default on most current platforms.

See Also

https://workbench.cisecurity.org/files/2278

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5, CSCv7|11.5

Plugin: Juniper

Control ID: 0081faf2a125609080c334d10e35d74dc4ad65a292ce1752b29c41eedeb7926c