Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-223234 | JUSX-DM-000163 | SV-223234r961620_rule | Medium |
Description |
---|
The rate-limit command limits the number of SSH session attempts allowed per minute which helps limit an attacker's ability to perform DoS attacks. The rate limit should be as restrictive as operationally practical. Juniper Networks recommends a best practice of 4 for the rate limit, however the limit should be as restrictive as operationally practical. User connections that exceed the rate-limit will be closed immediately after the connection is initiated. They will not be in a waiting state. |
STIG | Date |
---|---|
Juniper SRX SG NDM Security Technical Implementation Guide | 2024-06-10 |
Check Text ( C-24907r513389_chk ) |
---|
Verify the Juniper SRX sets a connection-limit for the SSH protocol. Show system services ssh If the SSH connection-limit is not set to 4 or an organization-defined value, this is a finding. |
Fix Text (F-24895r513390_fix) |
---|
Configure the SSH protocol with a rate limit. [edit] set system services ssh rate-limit 4 Note: Juniper Networks recommends a best practice of 4 for the rate limit; however, the limit should be as restrictive as operationally practical. |