JUSX-DM-000153 - The Juniper SRX Services Gateway must immediately terminate SSH network connections when the user logs off, the session abnormally terminates, or an upstream link from the managed device goes down.

Information

This setting frees device resources and mitigates the risk of an unauthorized user gaining access to an open idle session.

When sessions are terminated by a normal administrator log off, the Juniper SRX makes the current contents unreadable and no user activity can take place in the session. However, abnormal terminations or loss of communications do not signal a session termination, thus a keep-alive count and interval must be configured so the device will know when communication with the client is no longer available. The keep-alive value and the interval between keep-alive messages must be set to an organization-defined value based on mission requirements and network performance.

Solution

Configure the SSH keep-alive value.

[edit]
set system services ssh client-alive-count-max <organization-defined value>
set system services ssh client-alive-interval <organization-defined value>

Note: The keep-alive value and the interval between keep-alive messages must be set based on mission requirements and network performance for each local network.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_SRX_SG_Y22M10_STIG.zip

Item Details

Category: MAINTENANCE

References: 800-53|MA-4e., CAT|II, CCI|CCI-000879, Rule-ID|SV-223229r513376_rule, STIG-ID|JUSX-DM-000153, STIG-Legacy|SV-81025, STIG-Legacy|V-66535, Vuln-ID|V-223229

Plugin: Juniper

Control ID: 128759f1a467f77978e7536f4fbd4db0ffd7643cafde3d16967a8f779f9f273e