UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The administrator must ensure the that all L2TPv3 sessions are authenticated prior to transporting traffic.


Overview

Finding ID Version Rule ID IA Controls Severity
V-30744 NET-TUNL-034 SV-40557r1_rule Medium
Description
L2TPv3 sessions can be used to transport layer-2 protocols across an IP backbone. These protocols were intended for link-local scope only and are therefore less defended and not as well-known. As stated in DoD IPv6 IA Guidance for MO3 (S4-C7-1), the L2TP tunnels can also carry IP packets that are very difficult to filter because of the additional encapsulation. Hence, it is imperative that L2TP sessions are authenticated prior to transporting traffic.
STIG Date
Perimeter Router Security Technical Implementation Guide Juniper 2017-06-29

Details

Check Text ( C-39322r1_chk )
Currently JUNOS does not support L2TPv3 so this vulnerability is not applicable.
Fix Text (F-34428r1_fix)
Configure L2TPv3 to use authentication for any peering sessions.