JUSX-DM-000109 - For nonlocal maintenance sessions, the Juniper SRX Services Gateway must remove or explicitly deny the use of nonsecure protocols.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions.

Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network.

Tools used for nonlocal management and diagnostics with the Juniper SRX include SSH but may also include compatible enterprise maintenance and diagnostics servers. Regardless of the tool used, the Juniper SRX must permit only the use of protocols with the capability to be configured securely with integrity protections. Specifically, use SSH instead of Telnet, SCP instead of FTP, and SNMPv3 rather than other versions SNMP.

Solution

Remove or deny nonsecure protocols to prevent their usage for nonlocal management and diagnostic communications.

Use the delete command to disable services that should not be enabled.

Example deletion commands:

[edit]
delete system services telnet
delete system services ftp
delete snmp v1
delete snmp v2c
delete set system services ssh protocol-version v1

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000382, Rule-ID|SV-223209r513316_rule, STIG-ID|JUSX-DM-000109, STIG-Legacy|SV-80989, STIG-Legacy|V-66499, Vuln-ID|V-223209

Plugin: Juniper

Control ID: 652f9f90f0c3e69a863b38efeae971a1be275817354a08c887fbede6dba1021a