JUSX-VN-000008 - The Juniper SRX Services Gateway VPN must be configured to use IPsec with SHA1 or greater to negotiate hashing to protect the integrity of remote access sessions.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without strong cryptographic integrity protections, information can be altered by unauthorized users without detection.

Remote access VPN provides access to DoD non-public information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network.

Solution

The following example commands configure the IPSec proposal.

set security ipsec proposal <IPSEC-PROPOSAL-NAME> authentication-algorithm <hmac-sha-256-128 | hmac-sha-256-96 | hmac-sha1-96>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001453, Rule-ID|SV-214675r382846_rule, STIG-ID|JUSX-VN-000008, STIG-Legacy|SV-81139, STIG-Legacy|V-66649, Vuln-ID|V-214675

Plugin: Juniper

Control ID: 5fe7f77f598a2c9f97107498bc419839eafca3bade051ffadcb44bfc2d632e54