Check: JUEX-L2-000070
Juniper EX Series Switches Layer 2 Switch STIG:
JUEX-L2-000070
(in version v2 r2)
Title
The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection. (Cat II impact)
Discussion
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is a solution enabling an organization to manage devices. It is an additional layer of authentication ensuring only specific pre-authorized devices can access the system. This requirement applies to applications that connect either locally, remotely, or through a network to an endpoint device (including, but not limited to, workstations, printers, servers (outside a datacenter), VoIP Phones, and VTC CODECs. Gateways and SOA applications are examples of where this requirement would apply. For Juniper EX, configure 802.1 x authentication on all host-facing access interfaces. To authenticate those devices that do not support an 802.1x supplicant, Static MAC Bypass or MAC RADIUS must be configured. Junos supports three supplicant types: single-secure (authenticate and permit only a single device), multiple (separately authenticate and permit multiple devices), and single (authenticate the first supplicant and permit all others). The authentication order must be appropriate for the target environment. Authentication must be configured on all access interfaces connecting to LAN outlets or devices not located in the telecom room, wiring closets, or equipment rooms.
Check Content
Verify that the RADIUS server(s) are configured. RADIUS servers can be configured globally at [edit access radius-server] or defined for each group. [edit access] radius-server { <RADIUS IPv4 or IPv6 address> secret "PSK"; ## SECRET-DATA } profile dot1x_radius { authentication-order radius; radius { authentication-server <RADIUS IPv4 or IPv6 address>; <<< Must be defined if using global RADIUS server. Optional if RADIUS is defined specifically for the profile. } radius-server { <RADIUS IPv4 or IPv6 address> secret "PSK"; ## SECRET-DATA <<< Must be defined if not using global RADIUS server. Takes precedence if both profile and global RADIUS is configured. } } Verify 802.1x or MAC RADIUS is configured on all host-facing access interfaces when RADIUS is available as shown in the following example. The default authentication order is dot1x, mac-radius, and captive-portal. This order is applied to all interfaces without the authentication-order directive configured (int-01 shown below). For interfaces with connected devices that do not support 802.1x (int-02 below), it may be necessary to change the authentication order because the device authentication attempt may timeout before the switch fails over from dot1x to mac-radius. When restricting to mac-radius authentication only (int-03 below), the authentication order cannot be set. [edit protocols dot1x] authenticator { authentication-profile-name dot1x_radius; interface { <int-01 name> { <<< Connected device with 802.1x supplicant supplicant single-secure; } <int-02 name> { <<< Connected device with 802.1x supplicant and interface support for MAC RADIUS, MAC RADIUS authentication preferred authentication-order [ mac-radius dot1x captive-portal ]; supplicant multiple; mac-radius; } <int-03 name> { <<< Connected device without 802.1x supplicant mac-radius { restrict; } } } } If RADIUS is unavailable or not configured: [edit protocols] dot1x { authenticator { static { <MAC address>/48 { vlan-assignment <vlan name>; interface <interface name>.<logical unit>; } } } } If 802.1x authentication, Static MAC Bypass, or MAC RADIUS is not configured on all access interfaces connecting to LAN outlets, this is a finding.
Fix Text
Configure RADIUS if available on all host-facing access interfaces: set access radius-server <RADIUS IPv4 or IPv6 address (global)> secret "<PSK>" set access profile dot1x_radius authentication-order radius set access profile dot1x_radius radius authentication-server <RADIUS IPv4 or IPv6 address (global)> -or set access profile dot1x_radius radius-server <RADIUS IPv4 or IPv6 address> secret "<PSK>" To configure 802.1x on an access interface using the default authentication order: set protocols dot1x authenticator authentication-profile-name dot1x_radius set protocols dot1x authenticator interface <int-01> supplicant single-secure To configure 802.1x and MAC RADIUS on an access interface and prefer MAC RADIUS in the authentication order: set protocols dot1x authenticator interface <int-02> authentication-order mac-radius set protocols dot1x authenticator interface <int-02> authentication-order dot1x set protocols dot1x authenticator interface <int-02> authentication-order captive-portal set protocols dot1x authenticator interface <int-02> supplicant multiple set protocols dot1x authenticator interface <int-02> mac-radius To configure only MAC RADIUS on an access interface (authentication order cannot be set): set protocols dot1x authenticator interface <int-03> mac-radius restrict To configure Static MAC Bypass: set protocols dot1x authenticator static <MAC address>/48 vlan-assignment <vlan name> set protocols dot1x authenticator static <MAC address>/48 interface <interface name>.<logical unit>
Additional Identifiers
Rule ID: SV-253954r1028752_rule
Vulnerability ID: V-253954
Group Title: SRG-NET-000343-L2S-000016
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001958 |
Authenticate organization-defined devices and/or types of devices before establishing a local, remote, and/or network connection. |
Controls
Number | Title |
---|---|
IA-3 |
Device Identification and Authentication |