UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Juniper EX Series Switches Network Device Management Security Technical Implementation Guide


Overview

Date Finding Count (57)
2024-06-20 CAT I (High): 13 CAT II (Med): 43 CAT III (Low): 1
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC I - Mission Critical Public)

Finding ID Severity Title
V-253900 High The Juniper EX switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.
V-253944 High The Juniper EX switch must be configured to send log data to a central log server for the purpose of forwarding alerts to the administrators and the ISSO.
V-253945 High The Juniper EX switch must be configured with an operating system release that is currently supported by the vendor.
V-253947 High The Juniper EX switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
V-253941 High The Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.
V-253928 High The Juniper EX switches must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.
V-253883 High The Juniper EX switch must be configured to assign appropriate user roles or access levels to authenticated users.
V-253913 High The Juniper EX switch must be configured to end all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill mission requirements.
V-253925 High The Juniper EX switch must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).
V-253911 High The Juniper EX switch must be configured to use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
V-253910 High The Juniper EX switch must be configured to only store cryptographic representations of passwords.
V-253914 High The Juniper device must be configured to only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).
V-253929 High The Juniper EX switch must be configured to implement cryptographic mechanisms using a FIPS 140-2 approved algorithm to protect the confidentiality of remote maintenance sessions.
V-253898 Medium The Juniper EX switch must be configured to protect audit tools from unauthorized access.
V-253899 Medium The Juniper EX switch must be configured to limit privileges to change the software resident within software libraries.
V-253896 Medium The Juniper EX switch must be configured to protect audit information from unauthorized modification.
V-253897 Medium The Juniper EX switch must be configured to protect audit information from unauthorized deletion.
V-253894 Medium The Juniper EX switch must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.
V-253892 Medium The Juniper EX switch must be configured to produce audit log records containing information to establish the source of events.
V-253893 Medium The Juniper EX switch must be configured to produce audit records that contain information to establish the outcome of the event.
V-253890 Medium The Juniper EX switch must be configured to produce audit records containing information to establish when (date and time) the events occurred.
V-253891 Medium The Juniper EX switch must be configured to produce audit records containing information to establish where the events occurred.
V-253927 Medium The Juniper EX switch must be configured to prohibit the use of cached authenticators after an organization-defined time period.
V-253946 Medium The Juniper EX switch must change credentials for account of last resort when administrators who know the credential leave the organization.
V-253940 Medium The Juniper EX switch must be configured to enforce access restrictions associated with changes to the system components.
V-253942 Medium The Juniper EX switch must be configured to conduct backups of system level information contained in the information system when changes occur.
V-253943 Medium The Juniper EX switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.
V-253901 Medium The Juniper EX switch must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.
V-253903 Medium The Juniper EX switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.
V-253922 Medium The Juniper EX switch must be configured to prohibit installation of software without explicit privileged status.
V-253905 Medium The Juniper EX switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.
V-253906 Medium The Juniper EX switch must be configured to enforce password complexity by requiring that at least one lowercase character be used.
V-253907 Medium The Juniper EX switch must be configured to enforce password complexity by requiring that at least one numeric character be used.
V-253908 Medium The Juniper EX switch must be configured to enforce password complexity by requiring that at least one punctuation (special) character be used.
V-253904 Medium The Juniper EX switch must be configured to enforce a minimum 15-character password length.
V-253923 Medium The Juniper EX switch must be configured to enforce access restrictions associated with changes to device configuration.
V-253885 Medium The Juniper EX switch must be configured to enforce the limit of three consecutive invalid logon attempts for any given user, after which time it must block any login attempt for that user for 15 minutes.
V-253884 Medium The Juniper EX switch must be configured to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.
V-253886 Medium The Juniper EX switch must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.
V-253889 Medium The Juniper device must be configured to produce audit log records containing sufficient information to establish what type of event occurred.
V-253920 Medium The Juniper EX switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.
V-253921 Medium The Juniper EX switch must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
V-253909 Medium The Juniper EX switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.
V-253939 Medium The Juniper EX switch must be configured to generate log records for a locally developed list of auditable events.
V-253938 Medium The Juniper EX switch must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
V-253918 Medium The Juniper EX switch must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
V-253878 Medium The Juniper EX switch must be configured to limit the number of concurrent management sessions to 10 or less.
V-253879 Medium The Juniper EX switch must be configured to automatically audit account creation.
V-253930 Medium The Juniper EX switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.
V-253933 Medium The Juniper EX switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.
V-253935 Medium The Juniper EX switch must be configured to generate audit records showing starting and ending time for administrator access to the system.
V-253934 Medium The Juniper EX switch must be configured to generate audit records for privileged activities or other system-level access.
V-253937 Medium The Juniper EX switch must be configured to offload audit records onto a different system or media than the system being audited.
V-253936 Medium The Juniper EX switch must be configured to generate audit records when concurrent logons from different workstations occur.
V-253916 Medium The Juniper EX switch must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.
V-253919 Medium The Juniper EX switch must be configured to generate an immediate real-time alert of all audit failure events requiring real-time alerts.
V-253926 Low The Juniper EX switch must use an an NTP service that is hosted by a trusted source or a DOD-compliant enterprise or local NTP server.