JUEX-RT-000190 - The Juniper perimeter router must not be configured to redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the static routes to the alternate gateway are being redistributed into an Exterior Gateway Protocol or Interior Gateway Protocol to a NIPRNet gateway, this could make traffic on NIPRNet flow to that particular router and not to the Internet Access Point routers. This could not only wreak havoc with traffic flows on NIPRNet, but it could overwhelm the connection from the router to the NIPRNet gateway(s) and also cause traffic destined for outside of NIPRNet to bypass the defenses of the Internet Access Points.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

This requirement is not applicable for the DODIN Backbone.

Configure the router so that static routes are not redistributed to an alternate gateway into either an Exterior Gateway Protocol or Interior Gateway Protocol to the NIPRNet or to other autonomous systems.
set policy-options policy-statement <policy name> term 1 from protocol static
set policy-options policy-statement <policy name> term 1 then reject

set protocols bgp group <group name> export <policy name>
set protocols bgp group <group name> neighbor <address> export <policy name>
set protocols bgp export <policy name>

set protocols ospf export <policy name>
set protocols ospf3 export <policy name>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_EX_Switches_Y24M01_STIG.zip

Item Details

References: CAT|III, CCI|CCI-001414, Rule-ID|SV-253991r844006_rule, STIG-ID|JUEX-RT-000190, Vuln-ID|V-253991

Plugin: Juniper

Control ID: e797745d604ceaa71d88ce1b7f8f76f6a7ba0d88990365a9178c8d2d656ed040