UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Juniper router must be configured to have Internet Control Message Protocol (ICMP) mask replies disabled on all external interfaces.


Overview

Finding ID Version Rule ID IA Controls Severity
V-254035 JUEX-RT-000630 SV-254035r844138_rule Medium
Description
The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Routers automatically send ICMP messages under a wide variety of conditions. Mask Reply ICMP messages are commonly used by attackers for network mapping and diagnosis.
STIG Date
Juniper EX Series Switches Router Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-57487r844136_chk )
Review the device configuration to determine if controls have been defined to ensure the router does not send ICMP Mask Reply messages out to any external interfaces.

[edit policy-options]
prefix-list router-address-ipv4 {
/32;
/;
}
[edit firewall family inet]
filter {
term 1 {
from {
source-prefix-list {
router-address-ipv4;
}
protocol icmp;
icmp-type mask-reply;
}
then {
log;
syslog;
discard;
}
}

term default {
then {
log;
syslog;
discard;
}
}
}

[edit interfaces]
{
unit {
family inet {
filter {
output ;
}
address /;
}
}
}

Note: Some Juniper devices support both monolithic filters and filter lists. Filter lists separate each term, or set of terms, into a separate filter that is applied sequentially to an interface. If using filter lists, the keywords "input" or "output" change to "input-list" or "output-list". Verify the final list item is a deny-all filter. The deny-all filter is created once per family and can be reused across multiple lists. For example:

input-list [ permit_mgt permit_routing_protocols default-deny ];

If ICMP Mask Reply messages are enabled on any external interfaces, this is a finding.
Fix Text (F-57438r844137_fix)
Disable ICMP mask replies on all external interfaces.

set policy-options prefix-list router-addresses-ipv4 /32
set policy-options prefix-list router-addresses-ipv4 /

set firewall family inet filter term 1 from source-prefix-list router-address-ipv4
set firewall family inet filter term 1 from protocol icmp
set firewall family inet filter term 1 from icmp-type mask-reply
set firewall family inet filter term 1 then log
set firewall family inet filter term 1 then syslog
set firewall family inet filter term 1 then discard

set firewall family inet filter term default then log
set firewall family inet filter term default then syslog
set firewall family inet filter term default then discard

set interfaces unit family inet filter output
set interfaces unit family inet address .