Check: JUNI-RT-000230
Juniper Router RTR STIG:
JUNI-RT-000230
(in versions v3 r1 through v1 r1)
Title
The Juniper router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication. (Cat III impact)
Discussion
The use of POTS lines to modems connecting to network devices provides clear text of authentication traffic over commercial circuits that could be captured and used to compromise the network. Additional war dial attacks on the device could degrade the device and the production network. Secured modem devices must be able to authenticate users and must negotiate a key exchange before full encryption takes place. The modem will provide full encryption capability (Triple DES) or stronger. The technician who manages these devices will be authenticated using a key fob and granted access to the appropriate maintenance port; thus, the technician will gain access to the managed device (router, switch, etc.). The token provides a method of strong (two-factor) user authentication. The token works in conjunction with a server to generate one-time user passwords that will change values at second intervals. The user must know a personal identification number (PIN) and possess the token to be allowed access to the device.
Check Content
Review the configuration and verify that the auxiliary port is disabled unless a secured modem providing encryption and authentication is connected to it. If the auxiliary port has never been configured or has been removed from the configuration this is Not Applicable. system { host-name XYZ; … … … ports { auxiliary { disable; type xterm; } } If the auxiliary port is not disabled or is not connected to a secured modem when it is enabled, this is a finding.
Fix Text
Disable the auxiliary port. [edit system ports] set auxiliary disable Note: If used for out-of-band administrative access, the port must be connected to a secured modem providing encryption and authentication.
Additional Identifiers
Rule ID: SV-217028r604135_rule
Vulnerability ID: V-217028
Group Title: SRG-NET-000019-RTR-000001
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001414 |
Enforce approved authorizations for controlling the flow of information between connected systems based on organization-defined information flow control policies. |
Controls
Number | Title |
---|---|
AC-4 |
Information Flow Enforcement |