Item Search

NameAudit NamePluginCategory
Check for BGPDISA STIG Juniper Infrastructure Router V8R29Juniper
Check for netflowDISA STIG Juniper Infrastructure Router V8R29Juniper
Check for no ntp source-addressDISA STIG Juniper Infrastructure Router V8R29Juniper
Check for no radius source-addressDISA STIG Juniper Infrastructure Router V8R29Juniper
Check for policy-options route-filtersDISA STIG Juniper Infrastructure Router V8R29Juniper
Check for RIPDISA STIG Juniper Infrastructure Router V8R29Juniper
Check for SNMP v3DISA STIG Juniper Infrastructure Router V8R29Juniper
Check for TACACS+DISA STIG Juniper Infrastructure Router V8R29Juniper
NET-IPV6-034 - The network element must be configured via egress ACL or by enabling uRPF in an IPv6 enclave - uRPF enabledDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET-IPV6-034 - The network element must be configured via egress ACL or by enabling uRPF in an IPv6 enclave - uRPF firewall filter logDISA STIG Juniper Infrastructure Router V8R29Juniper

AUDIT AND ACCOUNTABILITY

NET-IPV6-034 - The network element must be configured via egress ACL or by enabling uRPF in an IPv6 enclave - uRPF interfaces fail-filterDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET-IPV6-059 - The administrator must ensure that the maximum hop limit is at least 32.DISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT

NET-MCAST-002 - A PIM neighbor filter is bound to all interfaces that have PIM enabled - PIM Filter Destination AddressDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET-MCAST-002 - A PIM neighbor filter is bound to all interfaces that have PIM enabled - PIM Filter Protocol PIMDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET-SRVFRM-003 - Server VLAN interfaces must be protected by restrictive ACLs using a deny-by-default security posture.DISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET-TUNL-012 - Default routes must not be directed to the tunnel entry point.DISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET-TUNL-034 - The administrator must ensure the that all L2TPv3 sessions are authenticated prior to transporting traffic.DISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET0230 - Network devices must be password protected - ssh no-passwordDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET0240 - Network devices must not have any default manufacturer passwords.DISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET0400 - The network element must authenticate all IGP peers - RIP authentication-keyDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0405 - A service or feature that calls home to the vendor must be disabled.DISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT

NET0422 - Network devices must be configured with rotating keys used for authenticating IGP peers that have a duration of 180 days or less.DISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET0433 - Network devices must use two or more authentication servers for the purpose of granting administrative accessDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET0440 - In the event the authentication server is unavailable, the network device must have a single local account of last resort defined.DISA STIG Juniper Infrastructure Router V8R29Juniper

ACCESS CONTROL

NET0460 - Group accounts must not be configured for use on the network device.DISA STIG Juniper Infrastructure Router V8R29Juniper

ACCESS CONTROL

NET0600 - The network element must be configured to ensure passwords are not viewable when displaying configuration information.DISA STIG Juniper Infrastructure Router V8R29Juniper

ACCESS CONTROL

NET0730 - The network element must have the Finger service disabled.DISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT

NET0744 - The network element must have all BSDr commands disabled.DISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT

NET0745 - The network element must have the Maintenance Operation Protocol (MOP) service disabled.DISA STIG Cisco Perimeter L3 Switch v8r32Cisco
NET0745 - The network element must have the Maintenance Operation Protocol (MOP) service disabled.DISA STIG Cisco Perimeter Router and L3 Switch v8r31Cisco
NET0812 - The network element must use two or more NTP servers to synchronize time - NTP Server 2DISA STIG Juniper Infrastructure Router V8R29Juniper

AUDIT AND ACCOUNTABILITY

NET0813 - The network element must authenticate all NTP messages received from NTP servers and peers - NTP authentication-keyDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET0987 - Traffic from the managed network is able to access the OOBM gateway router - loopback filterDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0993 - The network element's management interface is not configured as passive for the IGP instance deployed in the managed network.DISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1005 - An inbound ACL is not configured for the management network sub-interface of the trunk link to block non-management traffic.DISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1021 - The network element must log all messages except debugging and send all log data to a syslog server.DISA STIG Juniper Infrastructure Router V8R29Juniper

AUDIT AND ACCOUNTABILITY

NET1623 - The network device must require authentication for console access - ClassesDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1624 - The network element must time out access to the console port after 10 minutes or less of inactivity - Super-user-local ClassDISA STIG Juniper Infrastructure Router V8R29Juniper

ACCESS CONTROL

NET1629 - The network element's auxiliary port must be disabled unless it is connected to a secured modem.DISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT

NET1636 - The network device must require authentication prior to establishing a management connection for administrative access - ClassesDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - HTTPDISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - other servicesDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1645 - The network element must be configured to timeout after 60 seconds or less for incomplete or broken SSH sessions.DISA STIG Juniper Infrastructure Router V8R29Juniper

ACCESS CONTROL

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - authentication-noneDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - SNMP v1/2DISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1665 - The network device must not use the default or well-known SNMP community strings public and private - SNMPv1/2 publicDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1665 - The network device must not use the default or well-known SNMP community strings public and private - SNMPv3 privateDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1665 - The network device must not use the default or well-known SNMP community strings public and private - SNMPv3 publicDISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1675 - The network device must use different SNMP community names or groups for various levels of read and write access - SNMPv1/2DISA STIG Juniper Infrastructure Router V8R29Juniper

IDENTIFICATION AND AUTHENTICATION

NET1808 - Gateway configuration at the remote VPN end-point is a not a mirror of the local gatewayDISA STIG Juniper Infrastructure Router V8R29Juniper

CONFIGURATION MANAGEMENT