JUSX-DM-000157 - The Juniper SRX Services Gateway must terminate a device management session if the keep-alive count is exceeded.

Information

Configuring the keep-alive for management protocols mitigates the risk of an open connection being hijacked by an attacker.

The keep-alive messages and the interval between each message are used to force the system to disconnect a user that has lost network connectivity to the device. This differs from inactivity timeouts because the device does not wait the 10 minutes to log the user out but, instead, immediately logs the user out if the number of keep-alive messages are exceeded. The interval between messages should also be configured. These values should be set to an organization-defined value based on mission requirements and network performance.

Solution

Configure this setting by entering the following commands in configuration mode.

[edit]
set system services ssh client-alive-count-max <organization-defined value>
set system services ssh client-alive-interval <organization-defined value>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-10, CAT|II, CCI|CCI-001133, Rule-ID|SV-223232r539622_rule, STIG-ID|JUSX-DM-000157, STIG-Legacy|SV-81029, STIG-Legacy|V-66539, Vuln-ID|V-223232

Plugin: Juniper

Control ID: 34479454638fb081d8ed0cea83117aaabbf1d846d4a0fe7fb35e31a2788827a2