Routing Protocol Security - Limit key exposure by using separate authentication keys for different organizations

Information

To be effective, route authentication needs to be configured across the entire routing domain with every peer router. Even though the authentication keys are stored in a cryptographically obscured form in the Junos configuration, steps should be taken to restrict which engineers can view them.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Review the authentication keys used on the routing protocols and verify the different keys are used for each protocol.

See Also

http://www.juniper.net/us/en/training/jnbooks/day-one/fundamentals-series/hardening-junos-devices-checklist/

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-3

Plugin: Juniper

Control ID: 8d74e5223b3e884c63e7c31faf33371761f268efa0bf6b4798802569ced784ca