UCF STIG Viewer Logo

The Juniper SRX Services Gateway VPN must use Encapsulating Security Payload (ESP) in tunnel mode.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66657 JUSX-VN-000014 SV-81147r1_rule Medium
Description
ESP provides confidentiality, data origin authentication, integrity, and anti-replay services within the IPsec suite of protocols. ESP in tunnel mode ensures a secure path for communications for site-to-site VPNs and gateway to endpoints, including header information. ESP can be deployed in either transport or tunnel mode. Transport mode is used to create a secured session between two hosts. It can also be used when two hosts simply want to authenticate each IP packet with IPsec authentication header (AH). With ESP transport mode, only the payload (transport layer) is encrypted, whereas with tunnel mode, the entire IP packet is encrypted and encapsulated with a new IP header. Tunnel mode is used to encrypt traffic between secure IPsec gateways or between an IPsec gateway and an end-station running IPsec software. Hence, it is the only method to provide a secured path to transport traffic between remote sites or end-stations and the central site.
STIG Date
Juniper SRX SG VPN Security Technical Implementation Guide 2017-10-03

Details

Check Text ( C-67283r1_chk )
Review all IPsec profiles and zones to verify ESP tunnel mode has been specified.

[edit]
show security ipsec proposal
show security zones security-zone untrust

If all IPsec proposals are not configured for the ESP protocol, this is a finding.

If an Internet Key Exchange (IKE) is not bound to an external host-inbound service to direct all inbound VPN traffic to the VPN interface configured for IKE, this is a finding.
Fix Text (F-72733r1_fix)
Configure Phase 2 for ESP and allow IKE as a host-inbound service within the security zone associated with the IKE gateway’s external interface configuration. Any traffic that you wish to encrypt is routed to this tunnel interface.

Example:

[edit
set security ipsec proposal IPSEC-PROPOSAL protocol esp

Assumes the external interface is associated with the “untrust” zone.

[edit]
set security ike gateway external-interface
set security zones security-zone untrust host-inbound-traffic system-services ike