- JUNI-RT-000010 - The Juniper router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - BGP
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS key
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS type
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - LDP
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - OSPF
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP key
- JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP type
- JUNI-RT-000030 - The Juniper router must be configured to use keys with a duration not exceeding 180 days for authenticating routing protocol messages.
- JUNI-RT-000040 - The Juniper router must be configured to use encryption for routing protocol authentication - BGP
- JUNI-RT-000040 - The Juniper router must be configured to use encryption for routing protocol authentication - IS-IS
- JUNI-RT-000040 - The Juniper router must be configured to use encryption for routing protocol authentication - OSPF
- JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - BGP
- JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - IS-IS
- JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - OSPF
- JUNI-RT-000060 - The Juniper router must be configured to have all inactive interfaces disabled.
- JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - dhcp
- JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - finger
- JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - ftp
- JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - http
- JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - telnet
- JUNI-RT-000120 - The Juniper router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection - filter
- JUNI-RT-000120 - The Juniper router must be configured to protect against or limit the effects of denial-of-service (DoS) attacks by employing control plane protection - policer
- JUNI-RT-000130 - The Juniper router must be configured to restrict traffic destined to itself.
- JUNI-RT-000140 - The Juniper router must be configured to drop all fragmented Internet Control Message Protocol (ICMP) packets destined to itself.
- JUNI-RT-000150 - The Juniper router must be configured to have Gratuitous ARP disabled on all external interfaces.
- JUNI-RT-000170 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) unreachable messages disabled on all external interfaces.
- JUNI-RT-000180 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) mask reply messages disabled on all external interfaces.
- JUNI-RT-000190 - The Juniper router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.
- JUNI-RT-000200 - The Juniper router must be configured to log all packets that have been dropped - @FILTER_INBOUND_EXTERNAL@