STIGQter STIGQter: STIG Summary: Juniper Router RTR Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 12 Feb 2021:

The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.

DISA Rule

SV-217029r639663_rule

Vulnerability Number

V-217029

Group Title

SRG-NET-000202-RTR-000001

Rule Version

JUNI-RT-000240

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

This requirement is not applicable for the DoDIN Backbone.

Configure a term at the end of the inbound filter to deny all other traffic by default as shown in the example below.

[edit firewall family inet]
set filter FILTER_INBOUND_TRAFFIC term DENY_ALL_OTHER then syslog discard

Check Contents

This requirement is not applicable for the DoDIN Backbone.

Review the router configuration to verify that the inbound filter applied to all external interfaces is configured to allow specific ports and protocols and deny all other traffic.

Verify that an inbound filter is applied to all external interfaces as shown in the example below.

interfaces {
ge-0/0/0 {
unit 0 {
family inet {
filter {
input FILTER_INBOUND_TRAFFIC;
}
address 11.1.12.2/24;
}
}
}

Review inbound filters to verify that the ending term is configured to deny all other traffic that is not explicitly allowed.

firewall {
family inet {
filter FILTER_INBOUND_TRAFFIC {
term ALLOW_BGP {
from {
destination-address {
11.1.24.0/24;
}
protocol tcp;
destination-port bgp;
}
then accept;
}



term ALLOW_XYZ {
from {
protocol xyz;
}
then accept;
}
term DENY_ALL_OTHER {
then {
syslog;
discard;
}
}
}

If the filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding.

If the filter is not configured inbound on all external interfaces, this is a finding.

Vulnerability Number

V-217029

Documentable

False

Rule Version

JUNI-RT-000240

Severity Override Guidance

This requirement is not applicable for the DoDIN Backbone.

Review the router configuration to verify that the inbound filter applied to all external interfaces is configured to allow specific ports and protocols and deny all other traffic.

Verify that an inbound filter is applied to all external interfaces as shown in the example below.

interfaces {
ge-0/0/0 {
unit 0 {
family inet {
filter {
input FILTER_INBOUND_TRAFFIC;
}
address 11.1.12.2/24;
}
}
}

Review inbound filters to verify that the ending term is configured to deny all other traffic that is not explicitly allowed.

firewall {
family inet {
filter FILTER_INBOUND_TRAFFIC {
term ALLOW_BGP {
from {
destination-address {
11.1.24.0/24;
}
protocol tcp;
destination-port bgp;
}
then accept;
}



term ALLOW_XYZ {
from {
protocol xyz;
}
then accept;
}
term DENY_ALL_OTHER {
then {
syslog;
discard;
}
}
}

If the filter is not configured to allow specific ports and protocols and deny all other traffic, this is a finding.

If the filter is not configured inbound on all external interfaces, this is a finding.

Check Content Reference

M

Target Key

4032

Comments