SV-214694r383581_rule
V-214694
SRG-NET-000364
JUSX-VN-000027
CAT II
10
The SRX device will route traffic over the IPsec VPN’s secure tunnel interface if there is a route with the next-hop specified as the secure tunnel interface. The following example commands configure an IPv4 and IPv6 static route for their respective secure tunnels.
set routing-options static route <IPv4 network/netmask> next-hop st0.0
set routing-options rib inet6.0 static route <IPv6 network/mask> next-hop st0.1
set security policies from-zone untrust to-zone trust policy group-sec-policy then permit tunnel ipsec-vpn groupvpn
Note: For the SRX device to transmit traffic over the IPsec tunnel, you must configure the secure tunnel interface (st0 in this case), associate it with a security zone, and create a static route entry for the remote network’s address space.
Request documentation of the Juniper SRX configuration drawings to determine which ports are configured for external/outbound traffic. Verify outbound interfaces have been configured with DoS screens.
[edit]
show security zones <security-zone-name>
If the VPN zone(s) is configured to allow unauthorized/untrusted traffic to unauthorized zones, this is a finding.
V-214694
False
JUSX-VN-000027
Request documentation of the Juniper SRX configuration drawings to determine which ports are configured for external/outbound traffic. Verify outbound interfaces have been configured with DoS screens.
[edit]
show security zones <security-zone-name>
If the VPN zone(s) is configured to allow unauthorized/untrusted traffic to unauthorized zones, this is a finding.
M
4009