JUSX-DM-000114 - The Juniper SRX Services Gateway must ensure TCP forwarding is disabled for SSH to prevent unauthorized access.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Use this configuration option to prevent a user from creating an SSH tunnel over a CLI session to the Juniper SRX via SSH. This type of tunnel could be used to forward TCP traffic, bypassing any firewall filters or ACLs, allowing unauthorized access.

Solution

From the configuration mode, enter the following commands to disable TCP forwarding for the SSH protocol.

[edit]
set system services ssh no-tcp-forwarding

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000382, Rule-ID|SV-223214r513331_rule, STIG-ID|JUSX-DM-000114, STIG-Legacy|SV-80999, STIG-Legacy|V-66509, Vuln-ID|V-223214

Plugin: Juniper

Control ID: 41e14d12506d122c2a36daf97376abd16d7a9279995cda47016ea2a7de9d56d4