Juniper SRX Services Gateway VPN Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates No substantive changes
Comparison against the immediately-prior release (V2R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
No substantive changes detected against the previous release. 29 rules matched cleanly.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- JUSX-VN-000001
- Vuln IDs
-
- V-214668
- V-66629
- Rule IDs
-
- SV-214668r997551_rule
- SV-81119
Checks: C-15869r297591_chk
Verify the VPN Internet Key Exchange (IKE) gateway limits concurrent sessions. [edit] show security ike View the value for the connections-limit. If the VPN IKE gateway does not limit the number of concurrent sessions for user accounts to one (1) and administrative accounts to three (3), or is set to an organization-defined number, this is a finding.
Fix: F-15867r297592_fix
Configure the VPN IKE gateway to limit concurrent sessions. The following is an example. [edit] set security ike gateway <VPN-GATEWAY> dynamic connections-limit 1 [edit] set security ike gateway <VPN-GATEWAY> dynamic connections-limit 3
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- JUSX-VN-000002
- Vuln IDs
-
- V-214669
- V-66631
- Rule IDs
-
- SV-214669r856572_rule
- SV-81121
Checks: C-15870r856571_chk
Review all IPsec security associations configured globally or within IPsec profiles on the VPN gateway and examine the configured idle time. The default is 3600. [edit] show security ipsec proposal View the value of the lifetime-seconds option. If the IPsec proposal lifetime-seconds are not renegotiated after 8 hours or less of idle time, this is a finding. If the IPsec proposal lifetime-seconds is not configured, this is a finding.
Fix: F-15868r297595_fix
Set the lifetime (in seconds) of the IPsec proposal to 8 hours or less. Example: [edit] set security ipsec proposal <P2-PROPOSAL-NAME> lifetime-seconds 28800
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- JUSX-VN-000003
- Vuln IDs
-
- V-214670
- V-66643
- Rule IDs
-
- SV-214670r856574_rule
- SV-81133
Checks: C-15871r856573_chk
Review all IPsec security associations configured globally or within IPsec profiles on the VPN gateway and examine the configured idle time. The idle time value must be one hour or less. If idle time is not configured, determine the default used by the gateway. The default value is 28800 seconds which is compliant. [edit] show security ike proposal View the value of the lifetime-seconds option. If the IKE security associations are not renegotiated after 24 hours or less of idle time, this is a finding.
Fix: F-15869r297598_fix
Specify the lifetime (in seconds) of an IKE security association (SA). When the SA expires, it is replaced by a new SA, the security parameter index (SPI), or terminated if the peer cannot be contacted for renegotiation. Example: [edit] set security ike proposal <P1-PROPOSAL-NAME> lifetime-seconds 86400
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000067
- Version
- JUSX-VN-000004
- Vuln IDs
-
- V-214671
- V-66645
- Rule IDs
-
- SV-214671r382780_rule
- SV-81135
Checks: C-15872r297600_chk
Obtain documentation from the site representative that the Juniper SRX is configured in compliance with the Juniper SRX Services Gateway IDPS STIG. If the device has not been configured to comply with DoD IDPS requirements, this is a finding.
Fix: F-15870r297601_fix
Perform a security review using the Juniper SRX Services Gateway IDPS STIG.
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- JUSX-VN-000005
- Vuln IDs
-
- V-214672
- V-66021
- Rule IDs
-
- SV-214672r997552_rule
- SV-80511
Checks: C-15873r297603_chk
Verify all Internet Key Exchange (IKE) proposals are set to use the AES encryption algorithm. [edit] show security ipsec View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm for any IPsec proposal is not set to use an AES algorithm, this is a finding.
Fix: F-15871r297604_fix
The following example commands configure the IPsec (phase 2) proposals. The option may also be configured to use the aes-128-cbc, aes-192-cbc, or aes-256-cbc algorithms. [edit] set security ipsec proposal <IPSEC-PROPOSAL-NAME> encryption-algorithm aes-256-cbc
- RMF Control
- AC-17
- Severity
- H
- CCI
- CCI-000068
- Version
- JUSX-VN-000006
- Vuln IDs
-
- V-214673
- V-66617
- Rule IDs
-
- SV-214673r997553_rule
- SV-81107
Checks: C-15874r297606_chk
Verify all IKE proposals are set to use the AES encryption algorithm. [edit] show security ike View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm for any IKE proposal is not set to use an AES algorithm, this is a finding.
Fix: F-15872r297607_fix
The following example commands configure the IKE (phase 1) proposals. The option may also be configured to use the aes-128-cbc, aes-192-cbc, or aes-256-cbc algorithms. [edit] set security ike proposal <IKE-PROPOSAL-NAME> encryption-algorithm aes-256-cbc
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-000068
- Version
- JUSX-VN-000007
- Vuln IDs
-
- V-214674
- V-66647
- Rule IDs
-
- SV-214674r997554_rule
- SV-81137
Checks: C-15875r297609_chk
Verify all IKE proposals are set to use a FIPS-validated dh-group. [edit] show security ike <P1-PROPOSAL-NAME> View the IKE options dh-group option. If the IKE option is not set to a FIPS-140-2 validated dh-group, this is a finding.
Fix: F-15873r297610_fix
The following command is an example of how to configure the IKE (phase 1) proposals. The following groups are allowed for use in DoD: DH Groups 14 (2048-bit MODP) - 19 (256-bit Random ECP), 20 (384-bit Random ECP), 5 (1536-bit MODP), 24 (2048-bit MODP with 256-bit POS). Example: [edit] set security ike proposal <P1-PROPOSAL-NAME> dh-group group14
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- JUSX-VN-000008
- Vuln IDs
-
- V-214675
- V-66649
- Rule IDs
-
- SV-214675r382846_rule
- SV-81139
Checks: C-15876r297612_chk
Verify all IPSec proposals are set to use the sha-256 hashing algorithm. [edit] show security ipsec proposal <IPSEC-PROPOSAL-NAME> View the value of the encryption algorithm for each defined proposal. If the value of the encryption algorithm option for all defined proposals is not set to use SHA1 or greater, this is a finding.
Fix: F-15874r297613_fix
The following example commands configure the IPSec proposal. set security ipsec proposal <IPSEC-PROPOSAL-NAME> authentication-algorithm <hmac-sha-256-128 | hmac-sha-256-96 | hmac-sha1-96>
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- JUSX-VN-000009
- Vuln IDs
-
- V-214676
- V-66651
- Rule IDs
-
- SV-214676r382735_rule
- SV-81141
Checks: C-15877r297615_chk
Verify an IPsec policy is configured and used to control the VPN information flow. [edit] show security ipsec Inspect the security policy. If VPN traffic is not configured and controlled using an IPsec policy, this is a finding.
Fix: F-15875r297616_fix
The following example command is an example of an IPsec policy. [edit] set security ipsec policy <IPSEC-POLICY> perfect-forward-secrecy keys group14 set security ipsec policy <IPSEC-POLICY> proposals <IPSEC-PROPOSAL> The following command is an example of how to define an IPsec VPN using the IPsec policy and a secure tunnel interface. Alternatively, administrators can configure on-traffic tunnel establishment. [edit] set security ipsec vpn <VPN> bind-interface st0.0 set security ipsec vpn <VPN> ike gateway <IKE-PEER> set security ipsec vpn <VPN> ike ipsec-policy <IPSEC-POLICY> set security ipsec vpn <VPN> establish-tunnels immediately For site-to-site VPN implementation, the SRX device is configured to route traffic over the IPsec VPN’s secure tunnel interface by establishing a route with the next-hop specified as the secure tunnel interface. The following commands configure an IPv4 and IPv6 static route for their respective secure tunnels. set routing-options static route <IPv4 network/netmask> next-hop st0.0 set routing-options rib inet6.0 static route <IPv6 network/netmask> next-hop st0.1
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- JUSX-VN-000010
- Vuln IDs
-
- V-214677
- V-66619
- Rule IDs
-
- SV-214677r385561_rule
- SV-81109
Checks: C-15878r297618_chk
Verify the IKE protocol is specified for all IPsec VPNs. [edit] show security ipsec vpn If the IKE protocol is not specified as an option on all VPN gateways, this is a finding.
Fix: F-15876r297619_fix
The following example commands configure an IPsec VPN to use the IKE gateway information. [edit] set security ipsec vpn <VPN-GWY-NAME> ike gateway <IKE-PEER-NAME>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JUSX-VN-000011
- Vuln IDs
-
- V-214678
- V-66653
- Rule IDs
-
- SV-214678r864169_rule
- SV-81143
Checks: C-15879r864167_chk
Inspect the Juniper SRX configuration or the site's architecture drawings to verify all inbound VPN traffic is routed to the site's intrusion detection system. If all inbound VPN traffic is not inspected by the site's IDPS prior to being routed to its destination, this is a finding.
Fix: F-15877r864168_fix
Configure the Juniper SRX to route traffic to the port attached to intrusion detection system or configure to route all inbound traffic to the sites intrusion detection system using the IP address of the IPS/IDS.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- JUSX-VN-000012
- Vuln IDs
-
- V-214679
- V-66621
- Rule IDs
-
- SV-214679r385561_rule
- SV-81111
Checks: C-15880r297624_chk
Examine the CA trust point defined on the VPN gateway to determine if it references a CRL and that revocation check has been enabled. An alternate mechanism for checking the validity of a certificate is the use of the Online Certificate Status Protocol (OCSP). Unlike CRLs, which provide only periodic certificate status checks, OCSP can provide timely information regarding the status of a certificate. If revoked certificates are accepted for PKI authentication, this is a finding.
Fix: F-15878r297625_fix
Configure the CA trust point to enable certificate revocation check by referencing a CRL or via OCSP.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JUSX-VN-000013
- Vuln IDs
-
- V-214680
- V-66655
- Rule IDs
-
- SV-214680r385561_rule
- SV-81145
Checks: C-15881r297627_chk
Examine all IPsec profiles to verify PFS is enabled. [edit] show security ipsec policy If PFS is not configured, this is a finding.
Fix: F-15879r297628_fix
Configure the VPN gateway to ensure PFS is enabled. The following commands configure an IPsec policy, enabling PFS using Diffie-Hellman group 14 and associates the IPsec proposal configured in the previous example. [edit] set security ipsec policy <IPSEC-POLICY> perfect-forward-secrecy keys group14 set security ipsec policy <IPSEC-POLICY> proposals <IPSEC-PROPOSAL>
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- JUSX-VN-000014
- Vuln IDs
-
- V-214681
- V-66657
- Rule IDs
-
- SV-214681r385561_rule
- SV-81147
Checks: C-15882r297630_chk
Review all IPsec profiles and zones to verify ESP tunnel mode has been specified. [edit] show security ipsec proposal show security zones security-zone untrust If all IPsec proposals are not configured for the ESP protocol, this is a finding. If an Internet Key Exchange (IKE) is not bound to an external host-inbound service to direct all inbound VPN traffic to the VPN interface configured for IKE, this is a finding.
Fix: F-15880r297631_fix
Configure Phase 2 for ESP and allow IKE as a host-inbound service within the security zone associated with the IKE gateway’s external interface configuration. Any traffic that you wish to encrypt is routed to this tunnel interface. Example: [edit set security ipsec proposal IPSEC-PROPOSAL protocol esp Assumes the external interface is associated with the “untrust” zone. [edit] set security ike gateway <IKE-PEER> external-interface <EXTERNAL-INTERFACE-NAME> set security zones security-zone untrust host-inbound-traffic system-services ike
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- JUSX-VN-000015
- Vuln IDs
-
- V-214682
- V-66659
- Rule IDs
-
- SV-214682r382903_rule
- SV-81149
Checks: C-15883r297633_chk
Review the documentation and architecture for the device. <root> show system license If unneeded services and functions are installed on the device, but are not part of the documented role of the device, this is a finding.
Fix: F-15881r297634_fix
Remove unnecessary services and functions. From operational mode, display the licenses available to be deleted and enter the following commands. request system license delete license-identifier-list ? request system license delete <license-identifier> Note: Only remove unauthorized services. This control is not intended to restrict the use of Juniper SRX devices with multiple authorized roles.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- JUSX-VN-000016
- Vuln IDs
-
- V-214683
- V-66661
- Rule IDs
-
- SV-214683r997555_rule
- SV-81151
Checks: C-15884r297636_chk
Verify only IKEv2 is used for the IKE security configuration on all configured gateways. Use of IKEv1 mitigates the risk to a CAT III finding. Show security ike gateway <VPN-GATEWAY> If IKEv2 is not used for IKE associations, this is a finding.
Fix: F-15882r297637_fix
For site-to-site VPNs, configure the Juniper SRX to use IKEv2 only. [edit] set security ike gateway <VPN-GATEWAY> address <GW-IP-ADDRESS> set security ike gateway <VPN-GATEWAY> version v2-only
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- JUSX-VN-000017
- Vuln IDs
-
- V-214684
- V-66663
- Rule IDs
-
- SV-214684r385486_rule
- SV-81153
Checks: C-15885r297639_chk
Entering the following commands from the configuration level of the hierarchy. [edit] show security services If functions, ports, protocols, and services identified on the PPSM CAL are not disabled, this is a finding.
Fix: F-15883r297640_fix
Ensure functions, ports, protocols, and services identified on the PPSM CAL are not used for system services configuration. [edit] show security services Compare the services that are enabled, including the port, services, protocols, and functions. Consult the Juniper knowledge base and configuration guides to determine the commands for disabling each port, protocols, services, or functions that is not in compliance with the PPSM CAL and vulnerability assessments.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- JUSX-VN-000018
- Vuln IDs
-
- V-214685
- V-66665
- Rule IDs
-
- SV-214685r385489_rule
- SV-81155
Checks: C-15886r297642_chk
Ask the site to identify the VPN access profile. Verify the access profile uses LDAP, not password configuration, for user remote access to the network. Ask the site representative if group accounts are allowed or configured. [edit] show security access profile <VPN-LDAP-PROFILE-NAME> If an access profile that uses LDAP is not configured as the first option in the authentication order, this is a finding. If group accounts are allowed for VPN logon, this is a finding.
Fix: F-15884r297643_fix
Configure the LDAP access profile. The LDAP server must use DoD PKI for authentication of users. [edit] set access profile <VPN-LDAP-PROFILE-NAME> authentication-order ldap set access profile <VPN-LDAP-PROFILE-NAME> address-assignment pool dyn-vpn-pool set access profile <VPN-LDAP-PROFILE-NAME> ldap-options base-distinguished-name CN=Users, DC=firewall, DC=com (Location from where LDAP will start searching for users) set access profile <VPN-LDAP-PROFILE-NAME> ldap-options search search-filter sAMAccountName= set access profile <VPN-LDAP-PROFILE-NAME> ldap-options search admin-search distinguished-name CN=Administrator, CN=Users, DC=firewall, DC=com (User who is authorized to search the ldap tree) set access profile <VPN-LDAP-PROFILE-NAME> ldap-options search admin-search password <Administrator Password> set access profile <VPN-LDAP-PROFILE-NAME> ldap-server <AD Server IP address> port 389/636 set access firewall-authentication pass-through default-profile <VPN-LDAP-PROFILE-NAME> set access firewall-authentication web-authentication default-profile <VPN-LDAP-PROFILE-NAME> Note: To find the user or administrator base DN, use any LDAP browser. On an Internet search engine, search for ldp.exe, which is a very basic LDAP browser. When using LDAP groups to authenticate a user, or a user belonging to a group in the active directory, include the following statement: set access profile <VPN-LDAP-PROFILE-NAME> session-options client-group <group-name> Note: Without the above statement, users are not searched based on the group name or group string. The IP address pool configuration is as follows (the user will be assigned the IP from this pool): set access address-assignment pool dyn-vpn-pool family inet network <IP Network for Dynamic-VPN User> (e.g.. 192.168.100.0/24) set access address-assignment pool dyn-vpn-pool family inet range dyn-vpn-pool-range low <Starting IP address for Dynamic-VPN User> (e.g.. 192.168.100.1) set access address-assignment pool dyn-vpn-pool family inet range dyn-vpn-pool-range high <ending IP address for Dynamic-VPN User> (e.g.. 192.168.100.100) Note: The IP network used for dynamic VPN users should be different from the IP network of the external interface used in the IKE configuration. The access profile is linked to the xauth of the gateway for dynamic VPN. set security ike gateway <VPN-GATEWAY> xauth access-profile <VPN-LDAP-PROFILE-NAME> Under security >> dynamic-vpn, add all the users that are going to use the dynamic VPN. The command is as follows: set security dynamic-vpn clients all user Note: For users who are going to use dynamic VPN, this will be the AD user logon name for each user.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000766
- Version
- JUSX-VN-000019
- Vuln IDs
-
- V-214686
- V-66623
- Rule IDs
-
- SV-214686r954210_rule
- SV-81113
Checks: C-15887r297645_chk
Ask the site to identify the VPN access profile. Verify the access profile uses LDAP, not password configuration, for user remote access to the network. Ask the site if the LDAP server used authenticates users through PKI authentication. [edit] show security access profile <dynamic-profile-name> If an access profile that uses LDAP is not configured as the first option in the authentication order, this is a finding. If password access is configured for VPN user access, this is a finding. If the LDAP server used does not use PKI authentication, this is a finding.
Fix: F-15885r297646_fix
Configure multifactor authentication by configuring an access profile for an authentication server or services to authenticate VPN users upon logon using DoD PKI. Example: [edit] set access profile dyn-vpn-ldap-xauth authentication-order ldap set access profile dyn-vpn-ldap-xauth address-assignment pool dyn-vpn-pool set access profile dyn-vpn-ldap-xauth ldap-options base-distinguished-name CN=Users, DC=firewall, DC=com (Location from where LDAP will start searching for users) set access profile dyn-vpn-ldap-xauth ldap-options search search-filter sAMAccountName= set access profile dyn-vpn-ldap-xauth ldap-options search admin-search distinguished-name CN=Administrator, CN=Users, DC=firewall, DC=com (User who is authorized to search the ldap tree) set access profile dyn-vpn-ldap-xauth ldap-options search admin-search password <Administrator Password> set access profile dyn-vpn-ldap-xauth ldap-server <AD Server IP address> port 389/636 set access firewall-authentication pass-through default-profile dyn-vpn-ldap-xauth set access firewall-authentication web-authentication default-profile dyn-vpn-ldap-xauth The access profile is linked to the xauth of the gateway for dynamic VPN. set security ike gateway dyn-vpn-local-gw xauth access-profile dyn-vpn-ldap-xauth Note: Under security >> dynamic-vpn, add all the users that are going to use the dynamic VPN. The command is as follows: set security dynamic-vpn clients all user Note: For users who are going to use dynamic VPN, this will be the AD user logon name for each user.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- JUSX-VN-000020
- Vuln IDs
-
- V-214687
- V-66667
- Rule IDs
-
- SV-214687r385516_rule
- SV-81157
Checks: C-15888r297648_chk
Verify IPsec is defined and configured using FIPS-complaint protocols. [edit] show security ipsec vpn If the IPSEC policy and VP are not configured to use FIPS 140-2 compliant mechanisms for authentication to a cryptographic module, this is a finding.
Fix: F-15886r297649_fix
After configuring the Internet Key Exchange (IKE) gateway and IPsec policy, the following commands configure an IPsec policy, enabling Perfect Forward Secrecy (PFS) using Diffie-Hellman group 14 and associating the IPsec proposal configured in the previous example. set security ipsec policy IPSEC-POLICY perfect-forward-secrecy keys group14 set security ipsec policy IPSEC-POLICY proposals IPSEC-PROPOSAL The following commands define an IPsec VPN using a secure tunnel interface, specifying the IKE gateway information, IPsec policy, and tunnel establishment policy. Alternatively, administrators can configure on-traffic tunnel establishment. [edit] set security ipsec vpn VPN bind-interface st0.0 set security ipsec vpn VPN ike gateway IKE-PEER set security ipsec vpn VPN ike ipsec-policy IPSEC-POLICY set security ipsec vpn VPN establish-tunnels immediately
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- JUSX-VN-000021
- Vuln IDs
-
- V-214688
- V-66669
- Rule IDs
-
- SV-214688r385519_rule
- SV-81159
Checks: C-15889r297651_chk
Verify that groups are not used for authentication. [edit] show security access profile <dynamic-profile-name> If LDAP is not configured as the first authentication-order, this is a finding.
Fix: F-15887r297652_fix
Configure the LDAP access profile. The LDAP server must use DoD PKI for authentication of users. [edit] set access profile <VPN-LDAP-PROFILE-NAME> authentication-order ldap set access profile <VPN-LDAP-PROFILE-NAME> address-assignment pool dyn-vpn-pool set access profile <VPN-LDAP-PROFILE-NAME> ldap-options base-distinguished-name CN=Users, DC=firewall, DC=com (Location from where LDAP will start searching for users) set access profile <VPN-LDAP-PROFILE-NAME> ldap-options search search-filter sAMAccountName= set access profile <VPN-LDAP-PROFILE-NAME> ldap-options search admin-search distinguished-name CN=Administrator, CN=Users, DC=firewall, DC=com (User who is authorized to search the ldap tree) set access profile <VPN-LDAP-PROFILE-NAME> ldap-options search admin-search password <Administrator Password> set access profile <VPN-LDAP-PROFILE-NAME> ldap-server <AD Server IP address> port 389/636 set access firewall-authentication pass-through default-profile <VPN-LDAP-PROFILE-NAME> set access firewall-authentication web-authentication default-profile <VPN-LDAP-PROFILE-NAME> Note: To find the user or administrator base DN, use any LDAP browser. On an Internet search engine, search for ldp.exe, which is a very basic LDAP browser. When using LDAP groups to authenticate a user, or a user belonging to a group in the active directory, include the following statement: set access profile <VPN-LDAP-PROFILE-NAME> session-options client-group <group-name> Note: Without the above statement, users are not searched based on the group name or group string. The IP address pool configuration is as follows (the user will be assigned the IP from this pool): set access address-assignment pool dyn-vpn-pool family inet network <IP Network for Dynamic-VPN User> (e.g.. 192.168.100.0/24) set access address-assignment pool dyn-vpn-pool family inet range dyn-vpn-pool-range low <Starting IP address for Dynamic-VPN User> (e.g.. 192.168.100.1) set access address-assignment pool dyn-vpn-pool family inet range dyn-vpn-pool-range high <ending IP address for Dynamic-VPN User> (e.g.. 192.168.100.100) Note: The IP network used for dynamic VPN users should be different from the IP network of the external interface used in the IKE configuration. The access profile is linked to the xauth of the gateway for dynamic VPN. set security ike gateway <VPN-GATEWAY> xauth access-profile <VPN-LDAP-PROFILE-NAME> Under security >> dynamic-vpn, add all the users that are going to use the dynamic VPN. The command is as follows: set security dynamic-vpn clients all user Note: Users who are going to use dynamic VPN. This will be the AD user logon name for each user.
- RMF Control
- SC-10
- Severity
- L
- CCI
- CCI-001133
- Version
- JUSX-VN-000022
- Vuln IDs
-
- V-214689
- V-66681
- Rule IDs
-
- SV-214689r971530_rule
- SV-81171
Checks: C-15890r695323_chk
Ask the site representative which proposal implements Suite B. [edit] show security ike gateway <ike-peer-name> View the configured options. If the dead-peer-detection is not configured, this is a finding.
Fix: F-15888r297655_fix
For site-to-site VPN, configure an Internet Key Exchange (IKE) gateway that includes dead-peer-detection parameters such as in the following example. set security ike gateway IKE-PEER ike-policy IKE-POLICY set security ike gateway IKE-PEER address <Peer IP Address> set security ike gateway IKE-PEER dead-peer-detection always-send set security ike gateway IKE-PEER dead-peer-detection interval 10 set security ike gateway IKE-PEER dead-peer-detection threshold 2 set security ike gateway IKE-PEER local-identity inet <IPv4 Address in Certificate> set security ike gateway IKE-PEER remote-identity inet <IPv4 Address in Remote Certificate> set security ike gateway IKE-PEER external-interface <interface name> set security ike gateway IKE-PEER version v2-only For dynamic (remote access) VPN, the TCP keep-alive for remote access is implemented in the Juniper SRX Firewall STIG.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- JUSX-VN-000023
- Vuln IDs
-
- V-214690
- V-66625
- Rule IDs
-
- SV-214690r878132_rule
- SV-81115
Checks: C-15891r297657_chk
Ask the site representative which proposal implements Suite B. [edit] show security ike <suiteb-proposal-name> View the configured options. If the value of the authentication-method and other options are not set for Suite B compliance, this is a finding.
Fix: F-15889r297658_fix
The following example commands configure the IKE (phase 1) Suite B proposal. Note that SRX must have Junos 12.1X46 or later to support SuiteB. [edit] set security ike proposal suiteb-proposal set ike proposal suiteb-proposal authentication-method ecdsa-signatures-384 set ike proposal suiteb-proposal dh-group group20 set ike proposal suiteb-proposal authentication-algorithm sha-384 set ike proposal suiteb-proposal encryption-algorithm aes-256-cbc
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- JUSX-VN-000024
- Vuln IDs
-
- V-214691
- V-66671
- Rule IDs
-
- SV-214691r856576_rule
- SV-81161
Checks: C-15892r297660_chk
Verify all Internet Key Exchange (IKE) proposals are set to use the AES encryption algorithm. [edit] show security ike View the value of the encryption algorithm for each defined proposal. If the value of the authentication method and other options are not set to use FIPS-compliant values, this is a finding.
Fix: F-15890r297661_fix
The following example commands configure the IKE (phase 1) proposal. [edit] set security ike proposal <P1-PROPOSAL> authentication-method rsa-signatures set security ike proposal p1-proposal dh-group group14 set security ike proposal p1-proposal authentication-algorithm sha-256 set security ike proposal p1-proposal encryption-algorithm aes-256-cbc set security ike proposal p1-proposal lifetime-seconds 86400
- RMF Control
- SC-23
- Severity
- H
- CCI
- CCI-001184
- Version
- JUSX-VN-000025
- Vuln IDs
-
- V-214692
- V-66641
- Rule IDs
-
- SV-214692r383107_rule
- SV-81131
Checks: C-15893r297663_chk
View all IKE proposals using in the VPN configuration. [edit] show security ike proposal If the authentication algorithm in all IKE proposals is not set to SHA1 or higher, this is a finding.
Fix: F-15891r297664_fix
Include the SHA1 or higher authentication algorithm in the IKE proposal. The following is an example command. [edit] set security ike proposal <P1-PROPOSAL-NAME> authentication-algorithm sha-256
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- JUSX-VN-000026
- Vuln IDs
-
- V-214693
- V-66673
- Rule IDs
-
- SV-214693r856577_rule
- SV-81163
Checks: C-15894r297666_chk
Verify the all IKE proposals are set to use the AES encryption algorithm. [edit] show security ike View the value of the authentication-method for each defined proposal. If the value of the authentication-method for each defined proposal is not set to use AES, this is a finding.
Fix: F-15892r297667_fix
The following example commands configure the IKE (phase 1) proposals. Use certificates instead of pre-shared keys to establish the IKE phase 1 tunnel. This proposal requires AES 256-bit encryption set security ike proposal p1-proposal authentication-method rsa-signatures
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002403
- Version
- JUSX-VN-000027
- Vuln IDs
-
- V-214694
- V-66675
- Rule IDs
-
- SV-214694r856578_rule
- SV-81165
Checks: C-15895r297669_chk
Request documentation of the Juniper SRX configuration drawings to determine which ports are configured for external/outbound traffic. Verify outbound interfaces have been configured with DoS screens. [edit] show security zones <security-zone-name> If the VPN zone(s) is configured to allow unauthorized/untrusted traffic to unauthorized zones, this is a finding.
Fix: F-15893r297670_fix
The SRX device will route traffic over the IPsec VPN’s secure tunnel interface if there is a route with the next-hop specified as the secure tunnel interface. The following example commands configure an IPv4 and IPv6 static route for their respective secure tunnels. set routing-options static route <IPv4 network/netmask> next-hop st0.0 set routing-options rib inet6.0 static route <IPv6 network/mask> next-hop st0.1 set security policies from-zone untrust to-zone trust policy group-sec-policy then permit tunnel ipsec-vpn groupvpn Note: For the SRX device to transmit traffic over the IPsec tunnel, you must configure the secure tunnel interface (st0 in this case), associate it with a security zone, and create a static route entry for the remote network’s address space.
- RMF Control
- SC-7
- Severity
- M
- CCI
- CCI-002397
- Version
- JUSX-VN-000028
- Vuln IDs
-
- V-214695
- V-66677
- Rule IDs
-
- SV-214695r856579_rule
- SV-81167
Checks: C-15896r297672_chk
Verify split-tunneling is disabled. [edit] show security dynamic-vpn access-profile <dynamic-vpn-access-profile> If split-tunneling is not disabled, this is a finding.
Fix: F-15894r297673_fix
Configure the VPN tunnel to control what is sent out in clear text. The “remote-protected-resources” command defines what is routed through the tunnel. The “remote-exceptions” command defines what traffic is sent out in clear text. The following is an example. [edit] set security dynamic-vpn access-profile <dynamic-vpn-access-profile> set security dynamic-vpn clients all ipsec-vpn <ipsec-vpn-name> set security dynamic-vpn clients all remote-protected-resources <IP-address/mask> set security dynamic-vpn clients all remote-exceptions 0.0.0.0/0
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- JUSX-VN-000031
- Vuln IDs
-
- V-214696
- V-66679
- Rule IDs
-
- SV-214696r997556_rule
- SV-81169
Checks: C-15897r297675_chk
Verify anti-replay service is enabled. [edit] show security ipsec security-associations index 16384 detail If anti-replay service is not enabled, this is a finding.
Fix: F-15895r297676_fix
Remove the no-anti-replay Internet Key Exchange (IKE) option from the VPN configuration. By default the SRX has a replay window of 64 or 32, depending on the platform. Example: [edit] delete security vpn name ike no-anti-replay