JUEX-RT-000580 - The Juniper router must not be configured to have any zero-touch deployment feature enabled when connected to an operational network.

Information

Network devices configured via a zero-touch deployment or auto-loading feature can have their startup configuration or image pushed to the device for installation via TFTP or Remote Copy (rcp). Loading an image or configuration file from the network is taking a security risk because the file could be intercepted by an attacker who could corrupt the file, resulting in a denial of service.

Solution

Disable all configuration auto-loading or zero-touch deployment features.

delete system auto-configuration
delete system phone-home
Note: The 'phone-home' command is hidden and must be fully typed into the CLI (autocomplete will not work).

Configure the router with a nondefault configuration and commit.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_EX_Switches_Y24M07_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-5, CAT|II, CCI|CCI-002385, Rule-ID|SV-254030r844123_rule, STIG-ID|JUEX-RT-000580, Vuln-ID|V-254030

Plugin: Juniper

Control ID: d43e1a62929e13931d5d8ca7c1fd95631b756ae37a4f9b9d85cf7cc777f14fc4