STIGQter STIGQter: STIG Summary: Juniper Router RTR Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 12 Feb 2021:

The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.

DISA Rule

SV-217093r639663_rule

Vulnerability Number

V-217093

Group Title

SRG-NET-000364-RTR-000116

Rule Version

JUNI-RT-000890

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the receive path filter to only accept MSDP packets from known MSDP peers as shown in the following example:

[edit firewall family inet filter PROTECT_RE]
set term MSDP_PEERS from protocol tcp port msdp
set term MSDP_PEERS from source-address 0.0.0.0/0
set term MSDP_PEERS from source-address 1.1.1.1/32 except
set term MSDP_PEERS from source-address 5.5.5.5/32 except
set term MSDP_PEERS then discard
set term ALLOW_OTHER then accept

Apply the filter to the loopback interface.

[edit interfaces lo0 unit 0 family inet]
set filter input PROTECT_RE

Check Contents

Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers.

Verify that the loopback has been configured to filter packets destined to the routing engine as shown in the example below.

interfaces {



}
lo0 {
unit 0 {
family inet {
filter {
input PROTECT_RE;
}
address 2.2.2.2/32;
}
}
}
}

Verify that the filter is configured to only accept MSDP packets from known MSDP peers as shown in the example below.

firewall {
family inet {
filter PROTECT_RE {
term MSDP_PEERS {
from {
source-address {
0.0.0.0/0;
1.1.1.1/32 except;
5.5.5.5/32 except;
}
protocol tcp;
port msdp;
}
then {
discard;
}
}
term ALLOW_OTHER {
then accept;
}
}
}
}

If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.

Vulnerability Number

V-217093

Documentable

False

Rule Version

JUNI-RT-000890

Severity Override Guidance

Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers.

Verify that the loopback has been configured to filter packets destined to the routing engine as shown in the example below.

interfaces {



}
lo0 {
unit 0 {
family inet {
filter {
input PROTECT_RE;
}
address 2.2.2.2/32;
}
}
}
}

Verify that the filter is configured to only accept MSDP packets from known MSDP peers as shown in the example below.

firewall {
family inet {
filter PROTECT_RE {
term MSDP_PEERS {
from {
source-address {
0.0.0.0/0;
1.1.1.1/32 except;
5.5.5.5/32 except;
}
protocol tcp;
port msdp;
}
then {
discard;
}
}
term ALLOW_OTHER {
then accept;
}
}
}
}

If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.

Check Content Reference

M

Target Key

4032

Comments