JUNI-RT-000510 - The Juniper BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS) - bgp export

Information

Advertisement of routes by an autonomous system for networks that do not belong to any of its customers pulls traffic away from the authorized network. This causes a denial of service (DoS) on the network that allocated the block of addresses and may cause a DoS on the network that is inadvertently advertising it as the originator. It is also possible that a misconfigured or compromised router within the GIG IP core could redistribute IGP routes into BGP, thereby leaking internal routes.

Solution

Configure the router to filter outbound route advertisements for prefixes that are not allocated to or belong to any customer or the local autonomous system.

Configure a policy-statement to filter BGP route advertisements that will only include the local and customer prefixes.

[edit policy-options]
set policy-statement BGP_ADVERTISE_POLICY term INCLUDE_LOCAL from prefix-list OUR_PREFIXES
set policy-statement BGP_ADVERTISE_POLICY term INCLUDE_LOCAL then accept
set policy-statement BGP_ADVERTISE_POLICY term INCLUDE_CUST1 from prefix-list CUST1_PREFIXES
set policy-statement BGP_ADVERTISE_POLICY term INCLUDE_CUST1 then accept
set policy-statement BGP_ADVERTISE_POLICY term INCLUDE_CUST2 from prefix-list CUST2_PREFIXES
set policy-statement BGP_ADVERTISE_POLICY term INCLUDE_CUST2 then accept
set policy-statement BGP_ADVERTISE_POLICY term REJECT_OTHER then reject

Note: The prefix lists should have already been configured per the previous requirements.

Configure an export statement referencing the advertise policy on all external BGP peer groups as shown in the example below.

[edit protocols bgp group GROUP_AS4]
set export BGP_ADVERTISE_POLICY
[edit protocols bgp group CUST1]
set export BGP_ADVERTISE_POLICY
[edit protocols bgp group CUST2]
set export BGP_ADVERTISE_POLICY

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_Router_Y24M07_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-4, CAT|II, CCI|CCI-001368, Rule-ID|SV-217056r604135_rule, STIG-ID|JUNI-RT-000510, STIG-Legacy|SV-101107, STIG-Legacy|V-90897, Vuln-ID|V-217056

Plugin: Juniper

Control ID: 4a284944343f659426d9d7b1866bf99c41164b86216a217b4779748654d98664