STIGQter STIGQter: STIG Summary: Juniper SRX SG NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Juniper SRX Services Gateway must be configured to prohibit the use of unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

DISA Rule

SV-223208r513313_rule

Vulnerability Number

V-223208

Group Title

SRG-APP-000142-NDM-000245

Rule Version

JUSX-DM-000108

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure functions, ports, protocols, and services identified on the PPSM CAL are not used for system services configuration.

[edit]
show system services

Compare the services that are enabled, including the port, services, protocols, and functions.

Consult the Juniper knowledge base and configuration guides to determine the commands for disabling each port, protocol, service, or function that is not in compliance with the PPSM CAL and vulnerability assessments.

Check Contents

Entering the following commands from the configuration level of the hierarchy.

[edit]
show system services

If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.

Vulnerability Number

V-223208

Documentable

False

Rule Version

JUSX-DM-000108

Severity Override Guidance

Entering the following commands from the configuration level of the hierarchy.

[edit]
show system services

If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.

Check Content Reference

M

Target Key

4098

Comments