JUNI-RT-000430 - The Juniper out-of-band management (OOBM) gateway router must be configured to block any traffic destined to itself that is not sourced from the OOBM network or the NOC.

Information

If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries. It is imperative that hosts from the managed network are not able to access the OOBM gateway router.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

This requirement is not applicable for the DoDIN Backbone.

Configure the router to only allow traffic to the Routing Engine from the OOBM network.

[edit firewall family inet]
set filter PROTECT_RP term RESTRICT_ADDRESS from source-address 0.0.0.0/0
set filter PROTECT_RP term RESTRICT_ADDRESS from source-address 10.2.14.0/24 except
set filter PROTECT_RP term RESTRICT_ADDRESS then syslog discard
set filter PROTECT_RP term ALLOW_OTHER then accept

[edit interfaces lo0 unit 0 family inet]
set filter input PROTECT_RP

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Juniper_Router_Y22M10_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7a., CAT|II, CCI|CCI-001097, Rule-ID|SV-217048r604135_rule, STIG-ID|JUNI-RT-000430, STIG-Legacy|SV-101091, STIG-Legacy|V-90881, Vuln-ID|V-217048

Plugin: Juniper

Control ID: 7aa2820b51911e83a91d7a40e3e467b3156c4edbabe7863c336a5ee10dc3f519