Item Search

NameAudit NamePluginCategory
1.1 Ensure Device is running Current Junos SoftwareCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND INFORMATION INTEGRITY

DISA_Canonical_Ubuntu_22.04_LTS_STIG_v2r3.audit from DISA Canonical Ubuntu 22.04 LTS STIG v2r3DISA Canonical Ubuntu 22.04 LTS STIG v2r3Unix
DISA_STIG_Apache_Site-2.2_Unix_v1r11.audit from DISA Apache 2.2 Unix STIG v1r11DISA STIG Apache Site 2.2 Unix v1r11Unix
DISA_STIG_Apple_OS_X_10.13_v2r5.audit from DISA Apple OS X 10.13 v2r5 STIGDISA STIG Apple Mac OSX 10.13 v2r5Unix
DISA_STIG_EDB_PostgreSQL_Advanced_Server_v9.6_v2r3_OS_Linux.audit from DISA EDB Postgres Advanced Server v9.6 v2r3 STIGEDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix
DISA_STIG_Microsoft_Dot_Net_Framework_4.0_v2r4.audit from DISA Microsoft DotNet Framework 4.0 v2r4 STIGDISA STIG for Microsoft Dot Net Framework 4.0 v2r4Windows
DISA_STIG_Microsoft_Office_System_2016_v2r4.audit from DISA Microsoft Office System 2016 v2r4 STIGDISA Microsoft Office System 2016 STIG v2r4Windows
DISA_STIG_Microsoft_Sharepoint_Designer_2013_v1r3.audit from DISA STIG Microsoft Sharepoint Designer 2013 v1r3DISA STIG Microsoft Sharepoint Designer 2013 v1r3Windows
DISA_STIG_VMware_vSphere_6.7_ESXi_Bare_Metal_Host_v1r3.audit from DISA VMware vSphere 6.7 ESXi v1r3 STIGDISA STIG VMware vSphere 6.7 ESXi OS v1r3Unix
DISA_STIG_VMware_vSphere_6.7_PostgreSQL_v1r2.audit from DISA VMware vSphere 6.7 PostgreSQL v1r2 STIGDISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix
DISA_STIG_VMware_vSphere_7.0_ESXi_Bare_Metal_Host_v1r4.audit from DISA VMware vSphere 7.0 ESXi v1r4 STIGDISA STIG VMware vSphere 7.0 ESXi OS v1r4Unix
DISA_STIG_VMware_vSphere_ESXi_6.5_Bare_Metal_Host_v2r4.audit from DISA VMware vSphere 6.5 ESXi v2r4 STIGDISA STIG VMware vSphere ESXi OS 6.5 v2r4Unix
JUEX-RT-000370 - The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000420 - The Juniper perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000750 - The Juniper perimeter router must be configured to have Link Layer Discovery Protocols (LLDPs) disabled on all external interfaces.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-ND-000120 - The Juniper router must be configured to automatically audit account removal actions.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000150 - The Juniper router must be configured to enforce the limit of three consecutive invalid logon attempts after which time lock out the user account from accessing the device for 15 minutes.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000210 - The Juniper router must be configured to protect against an individual falsely denying having performed organization-defined actions to be covered by non-repudiation.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-000330 - The Juniper router must be configured to generate audit records containing the full-text recording of privileged commands.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-000390 - The Juniper router must be configured to protect audit information from unauthorized deletion.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-000490 - The Juniper router must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000590 - The Juniper router must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA STIG Juniper Router NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-000870 - The Juniper router must be configured to automatically audit account enabling actions.DISA STIG Juniper Router NDM v3r2Juniper

ACCESS CONTROL

JUNI-ND-000990 - The Juniper router must be configured to generate an alert for all audit failure events.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-001020 - The Juniper router must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-ND-001140 - The Juniper router must be configured to authenticate NTP sources using authentication that is cryptographically based.DISA STIG Juniper Router NDM v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-ND-001210 - The Juniper router must be configured to protect against known types of Denial of Service (DoS) attacks by employing organization-defined security safeguards - DoS attacks by employing organization-defined security safeguardsDISA STIG Juniper Router NDM v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-ND-001300 - The Juniper router must be configured to off-load log records onto a different system than the system being audited.DISA STIG Juniper Router NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUNI-RT-000010 - The Juniper router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS typeDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP typeDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000170 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) unreachable messages disabled on all external interfaces.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000330 - The Juniper perimeter router must be configured to filter ingress traffic at the external interface on an inbound direction.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000340 - The Juniper perimeter router must be configured to filter egress traffic at the internal interface on an inbound direction.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000387 - The Juniper perimeter router must be configured to drop IPv6 packets containing a Hop-by-Hop or Destination Option extension header with an undefined option type - hop-by-hopDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000450 - The Juniper router providing connectivity to the NOC must be configured to forward all in-band management traffic via an IPsec tunnel - IPsecDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000450 - The Juniper router providing connectivity to the NOC must be configured to forward all in-band management traffic via an IPsec tunnel - MgmtDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000470 - The Juniper BGP router must be configured to use a unique key for each autonomous system (AS) that it peers with.DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUNI-RT-000490 - The Juniper BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000580 - The Juniper MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange - OSPFDISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUNI-RT-000630 - The Juniper PE router must be configured to have each VRF with the appropriate Route Distinguisher (RD).DISA STIG Juniper Router RTR v3r2Juniper

CONTINGENCY PLANNING

JUNI-RT-000650 - The Juniper PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA STIG Juniper Router RTR v3r2Juniper

CONTINGENCY PLANNING

JUNI-RT-000700 - The Juniper PE router must be configured to limit the number of MAC addresses it can learn for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000720 - The Juniper PE router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000750 - The Juniper P router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile - QoS policy in accordance with the QoS DODIN Technical Profile.DISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000790 - The Juniper multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled - policy-options statementDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000830 - The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Juniper router (DR) for any undesirable multicast groups - protocols pimDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUNI-RT-000850 - The Juniper multicast Designated Router (DR) must be configured to filter the Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Report messages to allow hosts to join only multicast groups that have been approved by the organization - protocols igmpDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000880 - The Juniper multicast Designated Router (DR) must be configured to set the shortest-path tree (SPT) threshold to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed - protocols pimDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000900 - The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to authenticate all received MSDP packets.DISA STIG Juniper Router RTR v3r2Juniper

IDENTIFICATION AND AUTHENTICATION