STIGQter STIGQter: STIG Summary: Juniper SRX Services Gateway VPN Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Juniper SRX Services Gateway VPN must use IKEv2 for IPsec VPN security associations.

DISA Rule

SV-214683r385486_rule

Vulnerability Number

V-214683

Group Title

SRG-NET-000132

Rule Version

JUSX-VN-000016

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

For site-to-site VPNs, configure the Juniper SRX to use IKEv2 only.

[edit]
set security ike gateway <VPN-GATEWAY> address <GW-IP-ADDRESS>
set security ike gateway <VPN-GATEWAY> version v2-only

Check Contents

Verify only IKEv2 is used for the IKE security configuration on all configured gateways. Use of IKEv1 mitigates the risk to a CAT III finding.

Show security ike gateway <VPN-GATEWAY>

If IKEv2 is not used for IKE associations, this is a finding.

Vulnerability Number

V-214683

Documentable

False

Rule Version

JUSX-VN-000016

Severity Override Guidance

Verify only IKEv2 is used for the IKE security configuration on all configured gateways. Use of IKEv1 mitigates the risk to a CAT III finding.

Show security ike gateway <VPN-GATEWAY>

If IKEv2 is not used for IKE associations, this is a finding.

Check Content Reference

M

Target Key

4009

Comments