STIGQter STIGQter: STIG Summary: Juniper Router NDM Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Jan 2020: The Juniper router must be configured to enforce the limit of three consecutive invalid logon attempts after which time lock out the user account from accessing the device for 15 minutes.

DISA Rule

SV-101205r1_rule

Vulnerability Number

V-91105

Group Title

SRG-APP-000065-NDM-000214

Rule Version

JUNI-ND-000150

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to enforce the limit of three consecutive invalid logon attempts and lock out the user account from accessing the device for 15 minutes as shown in the example below.

[edit system login]
set retry-options tries-before-disconnect 3
set retry-options lockout-period 15

Check Contents

Review the router configuration to verify that it enforces the limit of three consecutive invalid logon attempts after which time it will lockout the user account from accessing the router for 15 minutes as shown in the example below.

login {
retry-options {
tries-before-disconnect 3;
lockout-period 15;
}

If the router is not configured to enforce the limit of three consecutive invalid logon attempts after which time it will lockout the user account from accessing the router for 15 minutes, this is a finding.

Vulnerability Number

V-91105

Documentable

False

Rule Version

JUNI-ND-000150

Severity Override Guidance

Review the router configuration to verify that it enforces the limit of three consecutive invalid logon attempts after which time it will lockout the user account from accessing the router for 15 minutes as shown in the example below.

login {
retry-options {
tries-before-disconnect 3;
lockout-period 15;
}

If the router is not configured to enforce the limit of three consecutive invalid logon attempts after which time it will lockout the user account from accessing the router for 15 minutes, this is a finding.

Check Content Reference

M

Target Key

3381

Comments