UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Juniper SRX Services Gateway VPN must use anti-replay mechanisms for security associations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-214696 JUSX-VN-000031 SV-214696r997556_rule Medium
Description
Anti-replay is an IPsec security mechanism at a packet level which helps to avoid unwanted users from intercepting and modifying an ESP packet. The SRX adds a sequence number to the ESP encapsulation which is verified by the VPN peer so packets are received within a correct sequence. This will cause issues if packets are not received in the order in which they were sent out. By default the SRX has a replay window of 64 or 32, depending on the platform. The SRX drops packets received out of order that are not received within this window. However, this default may be overridden by setting the option no-anti-replay as follows: set security vpn name ike no-anti-replay.
STIG Date
Juniper SRX Services Gateway VPN Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-15897r297675_chk )
Verify anti-replay service is enabled.

[edit]
show security ipsec security-associations index 16384 detail

If anti-replay service is not enabled, this is a finding.
Fix Text (F-15895r297676_fix)
Remove the no-anti-replay Internet Key Exchange (IKE) option from the VPN configuration. By default the SRX has a replay window of 64 or 32, depending on the platform.

Example:
[edit]
delete security vpn name ike no-anti-replay