CIS Juniper OS Benchmark v2.0.0 L1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS Juniper OS Benchmark v2.0.0 L1

Updated: 1/13/2022

Authority: CIS

Plugin: Juniper

Revision: 1.4

Estimated Item Count: 119

File Details

Filename: CIS_Juniper_OS_v2.0.0_L1.audit

Size: 315 kB

MD5: 32cbeac317aa8471dc5b51eec84a06e7
SHA256: 252b38f4f127ec68b02d204c0643299605c8be6111526f4ffe87356c0a95791a

Audit Items

DescriptionCategories
1.1 Ensure Device is running JTAC Recommended Software Release

CONFIGURATION MANAGEMENT

1.2 Ensure End of Life JUNOS Devices are not used

CONFIGURATION MANAGEMENT

1.3 Ensure device is physically secured
1.4 Ensure configuration is backed up on a regular schedule
1.5 Ensure backup data is stored and transferred securely
1.6 Ensure maximum RAM is installed
1.7 Ensure logging data is monitored
1.8 Ensure Retired JUNOS Devices are Disposed of Securely
3.1.1 Ensure Caller ID is set

CONFIGURATION MANAGEMENT

3.1.2 Ensure access profile is set to use CHAP

IDENTIFICATION AND AUTHENTICATION

3.3 Ensure unused interfaces are set to disable

CONFIGURATION MANAGEMENT

3.4 Ensure interface description is set

CONFIGURATION MANAGEMENT

3.6 Ensure ICMP Redirects are set to disabled (on all untrusted IPv4 networks)

SYSTEM AND COMMUNICATIONS PROTECTION

3.7 Ensure ICMP Redirects are set to disabled (on all untrusted IPv6 networks)

SYSTEM AND COMMUNICATIONS PROTECTION

3.9 Ensure only one loopback address is set

CONFIGURATION MANAGEMENT

4.1.1 Ensure peer authentication is set to MD5

CONFIGURATION MANAGEMENT

4.1.3 Ensure EBGP peers are set to use GTSM

CONFIGURATION MANAGEMENT

4.1.5 Ensure Ingress Filtering is set for EBGP peers

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.1 Ensure IS-IS neighbor authentication is set to MD5

IDENTIFICATION AND AUTHENTICATION

4.2.3 Ensure authentication check is not suppressed

IDENTIFICATION AND AUTHENTICATION

4.2.4 Ensure loose authentication check is not configured

IDENTIFICATION AND AUTHENTICATION

4.2.5 Ensure IS-IS Hello authentication check is not suppressed

IDENTIFICATION AND AUTHENTICATION

4.2.6 Ensure PSNP authentication check is not set to suppressed

IDENTIFICATION AND AUTHENTICATION

4.2.7 Ensure CSNP authentication check is not set to suppressed

IDENTIFICATION AND AUTHENTICATION

4.3.1 Ensure OSPF authentication is set to MD5

SYSTEM AND COMMUNICATIONS PROTECTION

4.4.1 Ensure OSPFv3 authentication is set to IPSEC SA - ipsec-sa
4.4.1 Ensure OSPFv3 authentication is set to IPSEC SA - md5

IDENTIFICATION AND AUTHENTICATION

4.5.1 Ensure RIP authentication is set to MD5

IDENTIFICATION AND AUTHENTICATION

4.5.2 Ensure RIP is set to check for zero values in reserved fields

IDENTIFICATION AND AUTHENTICATION

4.7.1 Ensure authentication is set to MD5

ACCESS CONTROL

4.8.1 Ensure authentication is set to MD5

ACCESS CONTROL

4.10.1 Ensure ICMP Router Discovery is disabled

SYSTEM AND COMMUNICATIONS PROTECTION

4.11.1 Ensure authentication is set to MD5

IDENTIFICATION AND AUTHENTICATION

5.1 Ensure Common SNMP Community Strings are NOT used

IDENTIFICATION AND AUTHENTICATION

5.2 Ensure SNMPv1/2 are set to Read Only

ACCESS CONTROL

5.3 Ensure a client list is set for SNMPv1/v2 communities

CONFIGURATION MANAGEMENT

5.4 Ensure 'Default Restrict' is set in all client lists

CONFIGURATION MANAGEMENT

5.8 Ensure interface restrictions are set for SNMP

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.1 Ensure Accounting Destination is configured

AUDIT AND ACCOUNTABILITY

6.1.2 Ensure Accounting of Logins

AUDIT AND ACCOUNTABILITY

6.1.3 Ensure Accounting of Configuration Changes

AUDIT AND ACCOUNTABILITY

6.2.3 Ensure NO Plain Text Archive Sites are configured

CONFIGURATION MANAGEMENT

6.3.1 Ensure external AAA is used

ACCESS CONTROL

6.3.2 Ensure Local Accounts can ONLY be used during loss of external AAA

IDENTIFICATION AND AUTHENTICATION

6.4.1 Ensure Authentication is configured for Diagnostic Ports

IDENTIFICATION AND AUTHENTICATION

6.4.2 Ensure Diagnostic Port Authentication uses a complex password

IDENTIFICATION AND AUTHENTICATION

6.5.3 Ensure ICMP Source-Quench is Set to Disabled

SYSTEM AND COMMUNICATIONS PROTECTION

6.5.4 Ensure TCP SYN/FIN is Set to Drop

SYSTEM AND COMMUNICATIONS PROTECTION

6.5.5 Ensure TCP RST is Set to Disabled

SYSTEM AND COMMUNICATIONS PROTECTION

6.6.1.1 Ensure Max 3 Failed Login Attempts

ACCESS CONTROL