STIGQter STIGQter: STIG Summary: Juniper SRX SG NDM Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Apr 2021:

The Juniper SRX Services Gateway must limit the number of sessions per minute to an organization-defined number for SSH to protect remote access management from unauthorized access.

DISA Rule

SV-223234r513391_rule

Vulnerability Number

V-223234

Group Title

SRG-APP-000435-NDM-000315

Rule Version

JUSX-DM-000163

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the SSH protocol with a rate limit.

[edit]
set system services ssh rate-limit 4

Note: Juniper Networks recommends a best practice of 4 for the rate limit; however, the limit should be as restrictive as operationally practical.

Check Contents

Verify the Juniper SRX sets a connection-limit for the SSH protocol.

Show system services ssh

If the SSH connection-limit is not set to 4 or an organization-defined value, this is a finding.

Vulnerability Number

V-223234

Documentable

False

Rule Version

JUSX-DM-000163

Severity Override Guidance

Verify the Juniper SRX sets a connection-limit for the SSH protocol.

Show system services ssh

If the SSH connection-limit is not set to 4 or an organization-defined value, this is a finding.

Check Content Reference

M

Target Key

4098

Comments