If SNMP is enabled, the Juniper SRX Services Gateway must use and securely configure SNMPv3.
From Juniper SRX SG NDM Security Technical Implementation Guide
Part of SRG-APP-000142-NDM-000245
Associated with:
CCI-000382
SV-80941r1_rule
If SNMP is enabled, the Juniper SRX Services Gateway must use and securely configure SNMPv3.
Vulnerability discussion
To prevent non-secure protocol communications with the organization's local SNMPv3 services, the SNMP client on the Juniper SRX must be configured for proper identification and strong cryptographically-based protocol for authentication.SNMPv3 defines a user-based security model (USM), and a view-based access control model (VACM). SNMPv3 USM provides data integrity, data origin authentication, message replay protection, and protection against disclosure of the message payload. SNMPv3 VACM provides access control to determine whether a specific type of access (read or write) to the management information is allowed.The Junos operating system allows the use of SNMPv3 to monitor or query the device for management purposes. Junos does not allow SNMPv3, of any type, to be used to make configuration changes to the device. SNMPv3 is disabled by default and must be enabled for use. SNMPv3 is the DoD-preferred method for monitoring the device securely. If SNMPv3 is not being used, it must be disabled. The following commands will configure SNMPv3. The Junos operating system allows the use of FIPS approved protocols for both authentication (SHA1) and for privacy (AES128). These protocols should be used to ensure secure management connections.
Check content
Verify SNMPv3 is enabled and configured.
[edit]
show snmp
If an SNMP stanza does not exist, this is not a finding.
If SNMPv3 is not configured to meet DoD requirements, this is a finding.
If versions earlier than SNMPv3 are enabled, this is a finding.
Fix text
Enable and configure SNMPv3 and configure a trap and community string.
[edit]
set snmp location
set snmp v3 usm local-engine user privacy-AES128
set snmp v3 vacm security-to-group security-model usm security-name group
set snmp v3 vacm access group default-context-prefix security-model usm
security-level privacy read-view all
set snmp v3 vacm access group default-context-prefix security-model usm
security-level privacy notify-view all
set snmp v3 target-address tag-list
set snmp v3 target-address target-parameters
set snmp v3 target-parameters parameters message-processing-model v3
set snmp v3 target-parameters parameters security-model usm
set snmp v3 target-parameters parameters security-level privacy
set snmp v3 target-parameters parameters security-name
set snmp v3 target-parameters notify-filter device-traps
set snmp v3 notify type trap
set snmp v3 notify tag
set snmp v3 notify-filter device-traps oid jnxChassisTraps include
set snmp v3 notify-filter device-traps oid jnxChassisOKTraps include
set snmp v3 notify-filter device-traps oid system include
set snmp v3 notify-filter device-traps oid .1 include
set snmp v3 notify-filter device-traps oid snmpMIBObjects include
set snmp engine-id use-mac-address
set snmp view all oid .1 include
set snmp view all oid system include
set snmp view all oid jnxBoxAnatomy include
set snmp view all oid snmpMIBObjects include
Pro Tips
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer