Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-253993 | JUEX-RT-000210 | SV-253993r844012_rule | Medium |
Description |
---|
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries; otherwise, it is possible that management traffic will not be separated from production traffic. Since the managed network and the management network are separate routing domains, separate Interior Gateway Protocol routing instances must be configured on the router, one for the managed network and one for the OOBM network. In addition, the routes from the two domains must not be redistributed to each other. |
STIG | Date |
---|---|
Juniper EX Series Switches Router Security Technical Implementation Guide | 2023-03-23 |
Check Text ( C-57445r844010_chk ) |
---|
This requirement is not applicable for the DODIN Backbone. Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa. Juniper routers use export policies to limit redistribution of routes. Verify a policy exists to filter route redistribution. Juniper policy-statements support terms, which provides greater granularity within a single policy. [edit policy-options] policy-statement deny-mgt-redist { term 1 { from protocol static; then reject; } term 2 { from { protocol ospf; route-filter route-filter } then reject; } } policy-statement deny-managed-routes { term 1 { from { route-filter route-filter } then accept; } term 2 { then reject; } } Verify an export policy is applied to the IGP protocol for each routing instance (default and OOBM). [edit protocols] ospf { area { interface } export deny-mgt-redist; } ospf3 { area { interface } export deny-mgt-redist; } } [edit routing-instances] OOBM { instance-type virtual-router; protocols { ospf { area { interface } export deny-managed-routes; } ospf3 { area { interface } export deny-managed-routes; } } } If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding. |
Fix Text (F-57396r844011_fix) |
---|
This requirement is not applicable for the DODIN Backbone. Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa. set policy-options policy-statement deny-managed-routes term 1 from route-filter set policy-options policy-statement deny-managed-routes term 1 from route-filter set policy-options policy-statement deny-managed-routes term 1 then accept set policy-options policy-statement deny-managed-routes term 2 then reject set policy-options policy-statement deny-mgt-redist term 1 from protocol static set policy-options policy-statement deny-mgt-redist term 1 then reject set policy-options policy-statement deny-mgt-redist term 2 from protocol ospf set policy-options policy-statement deny-mgt-redist term 2 from route-filter set policy-options policy-statement deny-mgt-redist term 2 from route-filter set policy-options policy-statement deny-mgt-redist term 2 then reject set routing-instances OOBM instance-type virtual-router set routing-instances OOBM protocols ospf area interface set routing-instances OOBM protocols ospf export test set routing-instances OOBM protocols ospf3 area interface set routing-instances OOBM protocols ospf3 export test |