UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Juniper EX switch must be configured to conduct backups of system level information contained in the information system when changes occur.


Overview

Finding ID Version Rule ID IA Controls Severity
V-253942 JUEX-NM-000650 SV-253942r961863_rule Medium
Description
System-level information includes default and customized settings and security attributes, including firewall filters that relate to the network device configuration, as well as software required for the execution and operation of the device. Information system backup is a critical step in ensuring system integrity and availability. If the system fails and there is no backup of the system-level information, a denial-of-service condition is possible for all who utilize this critical network component. This control requires the network device to support the organizational central backup process for system-level information associated with the network device. This function may be provided by the network device itself; however, the preferred best practice is a centralized backup rather than each network device performing discrete backups.
STIG Date
Juniper EX Series Switches Network Device Management Security Technical Implementation Guide 2024-06-20

Details

Check Text ( C-57394r944358_chk )
Review the network device configuration to determine if the device is configured to conduct backups of system-level information contained in the information system when changes occur.

Verify the preferred centralized backup system is configured to retrieve the configuration file. There is no provision for backing up system binaries because Juniper provides the signed installation packages rather than individual files. Therefore, verify the centralized backup solution has the appropriate installation packages for the deployed platforms.

When the configuration file is pulled from the centralized server, an example retrieval method is authenticated connections over NETCONF or manual retrieval using SSH. Junos supports authenticating external services via RADIUS or TACACS+, or via a local account.

[edit system services netconf]
ssh;
rfc-compliant;

Note: The rfc command is recommended for compatibility in large enterprises, but can be omitted if there are overriding operational considerations.

If the network device will be saving system files to a centralized repository, verify the configuration file is automatically saved at each commit.

[edit system archival]
configuration {
transfer-on-commit;
archive-sites {
"sftp://user@host/configuration_files" password "$9$w52......mfzn/"; ## SECRET-DATA
}
}
Note: The URL uses ://@/ format because Junos appends the slash with the system-generated filename. Junos supports file transfer either on commit, or at configured intervals.

If the network device is not configured to conduct backups of system-level data when changes occur, this is a finding.
Fix Text (F-57345r944359_fix)
Configure the network device to conduct backups of system-level information contained in the information system when changes occur.

For NETCONF connections:
set system services netconf ssh
set system services netconf rfc-compliant

Note: The rfc command is recommended for compatibility in large enterprise but can be omitted if there are overriding operational considerations.

For device automated configuration offload:
set system archival configuration transfer-on-commit
set system archival configuration archive-sites "://@
/" password ""