NET0422 - Network devices must be configured with rotating keys used for authenticating IGP peers that have a duration of 180 days or less.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the keys used for routing protocol authentication are guessed, the malicious user could create havoc within the network by advertising incorrect routes and redirecting traffic. Changing the keys frequently reduces the risk of them eventually being guessed. When configuring authentication for routing protocols that provide key chains, configure two rotating keys with overlapping expiration dates, both with 180-day or less expirations.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure the device so rotating keys expire at 180 days or less.

See Also

https://iasecontent.disa.mil/stigs/zip/U_Network_Infrastructure_Router_L3_Switch_V8R29_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-5(1)(d), CAT|III, Rule-ID|SV-15301r4_rule, STIG-ID|NET0422, Vuln-ID|V-14667

Plugin: Juniper

Control ID: a2e59aa8689c36369ab4c491acbda505ae91089ded0d313605ada2ed46cedad6