UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Juniper out-of-band management (OOBM) gateway router must not be configured to redistribute routes between the management network routing domain and the managed network routing domain.


Overview

Finding ID Version Rule ID IA Controls Severity
V-253993 JUEX-RT-000210 SV-253993r844012_rule Medium
Description
If the gateway router is not a dedicated device for the OOBM network, several safeguards must be implemented for containment of management and production traffic boundaries; otherwise, it is possible that management traffic will not be separated from production traffic. Since the managed network and the management network are separate routing domains, separate Interior Gateway Protocol routing instances must be configured on the router, one for the managed network and one for the OOBM network. In addition, the routes from the two domains must not be redistributed to each other.
STIG Date
Juniper EX Series Switches Router Security Technical Implementation Guide 2023-03-23

Details

Check Text ( C-57445r844010_chk )
This requirement is not applicable for the DODIN Backbone.

Verify the Interior Gateway Protocol instance used for the managed network does not redistribute routes into the Interior Gateway Protocol instance used for the management network, and vice versa.

Juniper routers use export policies to limit redistribution of routes. Verify a policy exists to filter route redistribution. Juniper policy-statements support terms, which provides greater granularity within a single policy.

[edit policy-options]
policy-statement deny-mgt-redist {
term 1 {
from protocol static;
then reject;
}
term 2 {
from {
protocol ospf;
route-filter / orlonger;
route-filter / orlonger;
}
then reject;
}

}
policy-statement deny-managed-routes {
term 1 {
from {
route-filter / orlonger;
route-filter / orlonger;
}
then accept;
}
term 2 {
then reject;
}
}

Verify an export policy is applied to the IGP protocol for each routing instance (default and OOBM).
[edit protocols]
ospf {
area {
interface .;
}
export deny-mgt-redist;
}
ospf3 {
area {
interface .;
}
export deny-mgt-redist;
}
}
[edit routing-instances]
OOBM {
instance-type virtual-router;
protocols {
ospf {
area {
interface .;
}
export deny-managed-routes;
}
ospf3 {
area {
interface .;
}
export deny-managed-routes;
}
}
}

If the Interior Gateway Protocol instance used for the managed network redistributes routes into the Interior Gateway Protocol instance used for the management network, or vice versa, this is a finding.
Fix Text (F-57396r844011_fix)
This requirement is not applicable for the DODIN Backbone.

Configure the Interior Gateway Protocol instance used for the managed network to prohibit redistribution of routes into the Interior Gateway Protocol instance used for the management network, and vice versa.

set policy-options policy-statement deny-managed-routes term 1 from route-filter / orlonger
set policy-options policy-statement deny-managed-routes term 1 from route-filter / orlonger
set policy-options policy-statement deny-managed-routes term 1 then accept
set policy-options policy-statement deny-managed-routes term 2 then reject
set policy-options policy-statement deny-mgt-redist term 1 from protocol static
set policy-options policy-statement deny-mgt-redist term 1 then reject
set policy-options policy-statement deny-mgt-redist term 2 from protocol ospf
set policy-options policy-statement deny-mgt-redist term 2 from route-filter / orlonger
set policy-options policy-statement deny-mgt-redist term 2 from route-filter / orlonger
set policy-options policy-statement deny-mgt-redist term 2 then reject


set routing-instances OOBM instance-type virtual-router
set routing-instances OOBM protocols ospf area interface .
set routing-instances OOBM protocols ospf export test
set routing-instances OOBM protocols ospf3 area interface .
set routing-instances OOBM protocols ospf3 export test