STIGQter STIGQter: STIG Summary: Juniper SRX SG NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

For nonlocal maintenance sessions using SSH, the Juniper SRX Services Gateway must securely configure SSHv2 Message Authentication Code (MAC) algorithms to protect the integrity of maintenance and diagnostic communications.

DISA Rule

SV-223225r513364_rule

Vulnerability Number

V-223225

Group Title

SRG-APP-000411-NDM-000330

Rule Version

JUSX-DM-000147

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure SSH integrity options to comply with DoD requirements.

[edit]
set system services ssh protocol-version v2
set system services ssh macs hmac-sha2-512
set system services ssh macs hmac-sha2-256
set system services ssh macs hmac-sha1
set system services ssh macs hmac-sha1-96

Check Contents

Verify SSHv2 and MAC algorithms for integrity checking.

[edit]
show system services ssh

If SSHv2 and integrity options are not configured in compliance with DoD requirements, this is a finding.

Vulnerability Number

V-223225

Documentable

False

Rule Version

JUSX-DM-000147

Severity Override Guidance

Verify SSHv2 and MAC algorithms for integrity checking.

[edit]
show system services ssh

If SSHv2 and integrity options are not configured in compliance with DoD requirements, this is a finding.

Check Content Reference

M

Target Key

4098

Comments