Logo
Main site Submit a request Sign in
  1. Help Central | G5 Cyber Security
  2. Security Hardening
  3. DISA STIG Juniper Router RTR v2r2

DISA STIG Juniper Router RTR v2r2

Follow New articles New articles and comments
  • JUNI-RT-000010 - The Juniper router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - BGP
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS key
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS type
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - LDP
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - OSPF
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP key
  • JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP type
  • JUNI-RT-000030 - The Juniper router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
  • JUNI-RT-000040 - The Juniper router must be configured to use encryption for routing protocol authentication - BGP
  • JUNI-RT-000040 - The Juniper router must be configured to use encryption for routing protocol authentication - IS-IS
  • JUNI-RT-000040 - The Juniper router must be configured to use encryption for routing protocol authentication - OSPF
  • JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - BGP
  • JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - IS-IS
  • JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - OSPF
  • JUNI-RT-000060 - The Juniper router must be configured to have all inactive interfaces disabled.
  • JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - dhcp
  • JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - finger
  • JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - ftp
  • JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - http
  • JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - telnet
  • JUNI-RT-000120 - The Juniper router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection - filter
  • JUNI-RT-000120 - The Juniper router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection - policer
  • JUNI-RT-000130 - The Juniper router must be configured to restrict traffic destined to itself.
  • JUNI-RT-000140 - The Juniper router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
  • JUNI-RT-000150 - The Juniper router must be configured to have Gratuitous ARP disabled on all external interfaces.
  • JUNI-RT-000170 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) unreachable messages disabled on all external interfaces.
  • JUNI-RT-000180 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) mask reply messages disabled on all external interfaces.
  • JUNI-RT-000190 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.
  • JUNI-RT-000200 - The Juniper router must be configured to log all packets that have been dropped - @FILTER_INBOUND_EXTERNAL@
  • 1
  • 2
  • ›
  • »

© Help Central | G5 Cyber Security