STIGQter STIGQter: STIG Summary: Juniper Router NDM Security Technical Implementation Guide Version: 1 Release: 5 Benchmark Date: 24 Jul 2020:

The Juniper router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.

DISA Rule

SV-101269r1_rule

Vulnerability Number

V-91169

Group Title

SRG-APP-000411-NDM-000330

Rule Version

JUNI-ND-001190

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure SSH to use FIPS-validated HMAC for remote maintenance sessions as shown in the following example:

[edit system services]
set ssh protocol-version v2
set ssh macs hmac-sha2-256

Check Contents

Review the router configuration to verify that it is compliant with this requirement as shown in the example below.

system {



}
services {
ssh {
protocol-version v2;
macs hmac-sha2-256;
}
}

If the router is not configured to use FIPS-validated HMAC to protect the integrity of remote maintenance sessions, this is a finding.

Vulnerability Number

V-91169

Documentable

False

Rule Version

JUNI-ND-001190

Severity Override Guidance

Review the router configuration to verify that it is compliant with this requirement as shown in the example below.

system {



}
services {
ssh {
protocol-version v2;
macs hmac-sha2-256;
}
}

If the router is not configured to use FIPS-validated HMAC to protect the integrity of remote maintenance sessions, this is a finding.

Check Content Reference

M

Target Key

3381

Comments