UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Juniper SRX Services Gateway must implement service redundancy to protect against or limit the effects of common types of Denial of Service (DoS) attacks on the device itself.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223235 JUSX-DM-000164 SV-223235r961620_rule Low
Description
Service redundancy, may reduce the susceptibility to some DoS attacks. Organizations must consider the need for service redundancy in accordance with DoD policy. If service redundancy is required then this technical control is applicable. The Juniper SRX can configure your system to monitor the health of the interfaces belonging to a redundancy group.
STIG Date
Juniper SRX SG NDM Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-24908r513392_chk )
If service redundancy is not required by the organization's policy, this is not a finding.

Verify the configuration is working properly:

[edit]
show chassis cluster interfaces command.

If service redundancy is not configured, this is a finding.
Fix Text (F-24896r513393_fix)
Interfaces can be monitored by a redundancy group for automatic failover to another node. Assign a weight to the interface to be monitored.

This configuration is an extremely complex configuration. Consult the vendor documentation.

Set the chassis cluster node ID and cluster ID.
Configure the chassis cluster management interface.
Configure the chassis cluster fabric.
Configure the chassis cluster redundancy group
Specify the interface to be monitored by a redundancy group.

Specify the interface to be monitored by a redundancy group. Example:
[edit]
set chassis cluster redundancy-group 1 interface-monitor ge-6/0/2 weight 255