STIGQter STIGQter: STIG Summary: Juniper Router NDM Security Technical Implementation Guide Version: 1 Release: 5 Benchmark Date: 24 Jul 2020:

The Juniper router must be configured to generate log records for a locally developed list of auditable events.

DISA Rule

SV-101287r1_rule

Vulnerability Number

V-91187

Group Title

SRG-APP-000516-NDM-000334

Rule Version

JUNI-ND-001340

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the router to generate log records for a locally developed list of auditable events as shown in the example below.

[edit system]
set syslog file LOG_FILE authorization info
set syslog file LOG_FILE security info
set syslog file LOG_FILE firewall info
set syslog file LOG_FILE change-log info

Note: A syslog server can be configured in lieu of logging to a file as shown in the example below.

set syslog host x.x.x.x authorization info
set syslog host x.x.x.x security info
set syslog host x.x.x.x firewall info
set syslog host x.x.x.x change-log info

Check Contents

Review the router configuration to verify that it is compliant with this requirement. The example below illustrates how selected events can be logged.

syslog {
file LOG_FILE {
authorization info;
security info;
firewall info;
change-log info;
}
}

Note: A syslog server can be configured in lieu of logging to a file as shown in the example below.

system {
syslog {
host x.x.x.x {
authorization info;
security info;
firewall info;
change-log info;
}
}

If the router is not configured to generate log records for a locally developed list of auditable events, this is a finding.

Vulnerability Number

V-91187

Documentable

False

Rule Version

JUNI-ND-001340

Severity Override Guidance

Review the router configuration to verify that it is compliant with this requirement. The example below illustrates how selected events can be logged.

syslog {
file LOG_FILE {
authorization info;
security info;
firewall info;
change-log info;
}
}

Note: A syslog server can be configured in lieu of logging to a file as shown in the example below.

system {
syslog {
host x.x.x.x {
authorization info;
security info;
firewall info;
change-log info;
}
}

If the router is not configured to generate log records for a locally developed list of auditable events, this is a finding.

Check Content Reference

M

Target Key

3381

Comments