JUEX-RT-000100 - The Juniper router configured for BGP must reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Verifying the path a route has traversed will ensure that the local AS is not used as a transit network for unauthorized traffic. To ensure that the local AS does not carry any prefixes that do not belong to any customers, all PE routers must be configured to reject routes with an originating AS other than that belonging to the customer.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Configure the router to reject updates from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.

set policy-options policy-statement bgp_originate_65535 term 1 from as-path orig_65535
set policy-options policy-statement bgp_originate_65535 term 1 then accept
set policy-options policy-statement bgp_originate_65535 term 2 then reject
set policy-options as-path orig_65535 '.* 65535'

set protocols bgp group eBGP neighbor <address> import bgp_originate_65535

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_EX_Switches_Y24M01_STIG.zip

Item Details

References: CAT|III, CCI|CCI-000032, Rule-ID|SV-253982r843979_rule, STIG-ID|JUEX-RT-000100, Vuln-ID|V-253982

Plugin: Juniper

Control ID: 1f367d92e0b9042587dd57d148f2a34a35fc478d90e1245ef59d67cdf1a3b01c