Juniper EX Series Switches Layer 2 Switch Security Technical Implementation Guide

Overview

VersionDateFinding Count (24)Downloads
22025-03-07CAT I (High): 2CAT II (Medium): 18CAT III (Low): 4
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Public

Finding IDSeverityTitleDescription
V-253950
LOWMEDIUMHIGH
The Juniper layer 2 switch must be configured to disable all dynamic VLAN registration protocols.Dynamic VLAN registration protocols provide centralized management of VLAN domains, which can reduce administration in a switched network. Interfaces ...
V-253951
LOWMEDIUMHIGH
The Juniper EX switch must be configured to manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DoS attacks can be mitigated by ensuring sufficient capacity is available for mission-critical traffic. Managing capacity may include, for example, es...
V-253952
LOWMEDIUMHIGH
The Juniper EX switch must be configured to permit authorized users to select a user session to capture.Without the capability to select a user session to capture/record or view/hear, investigations into suspicious or harmful events would be hampered by ...
V-253953
LOWMEDIUMHIGH
The Juniper EX switch must be configured to permit authorized users to remotely view, in real time, all content related to an established user session from a component separate from the layer 2 switch.Without the capability to remotely view/hear all content related to a user session, investigations into suspicious user activity would be hampered. Re...
V-253954
LOWMEDIUMHIGH
The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection.Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Device authentication is ...
V-253956
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports.If a rogue switch is introduced into the topology and transmits a Bridge Protocol Data Unit (BPDU) with a lower bridge priority than the existing root...
V-253957
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable STP Loop Protection on all non-designated STP switch ports.The Spanning Tree Protocol (STP) Loop Protection feature provides additional protection against STP loops. An STP loop is created when an STP blocking...
V-253959
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.In an enterprise network, devices under administrative control are trusted sources. These devices include the switches, routers, and servers in the ne...
V-253960
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable IP Source Guard on all user-facing or untrusted access VLANs.IP Source Guard provides source IP address filtering on an untrusted layer 2 interface to prevent a malicious host from impersonating a legitimate hos...
V-253961
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable Dynamic Address Resolution Protocol (ARP) Inspection (DAI) on all user VLANs.DAI intercepts Address Resolution Protocol (ARP) requests and verifies that each of these packets has a valid IP-to-MAC address binding before updatin...
V-253964
LOWMEDIUMHIGH
If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.Spanning Tree Protocol (STP) is implemented on bridges and switches to prevent layer 2 loops when a broadcast domain spans multiple bridges and switch...
V-253965
LOWMEDIUMHIGH
The Juniper EX switch must be configured to verify two-way connectivity on all interswitch trunked interfaces.In topologies where fiber optic interconnections are used, physical misconnections can occur that allow a link to appear to be up when there is a mism...
V-253966
LOWMEDIUMHIGH
The Juniper EX switch must be configured to assign all explicitly disabled access interfaces to an unused VLAN.It is possible that a configured, but disabled access interface assigned to a user or management VLAN becomes enabled by accident or by an attacker an...
V-253967
LOWMEDIUMHIGH
The Juniper EX switch must not be configured with VLANs used for L2 control traffic assigned to any host-facing access interface.In a switched Ethernet network, some protocols use L2 Protocol Data Units (PDU) to communicate in-band management or other control information. This c...
V-253968
LOWMEDIUMHIGH
The Juniper EX switch must be configured to prune the default VLAN from all trunked interfaces that do not require it.All unassigned interfaces are placed into the default VLAN and devices connected to enabled, but unassigned interfaces can communicate within that VLA...
V-253969
LOWMEDIUMHIGH
The Juniper EX switch must not use the default VLAN for management traffic.By default, all unassigned interfaces are placed into the default VLAN and if used for management, could unintentionally expose sensitive traffic or p...
V-253970
LOWMEDIUMHIGH
The Juniper EX switch must be configured to set all enabled user-facing or untrusted ports as access interfaces.By default, unconfigured (or expressly disabled) Junos interfaces are unusable. Any enabled interface configured with the family ethernet-switching us...
V-253971
LOWMEDIUMHIGH
The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links.By default, Juniper switches do not assign a native VLAN to any trunked interface. Allowing trunked interfaces to accept untagged data packets may uni...
V-253955
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable Root Protection on STP switch ports connecting to access layer switches.Spanning Tree Protocol (STP) does not provide any means for the network administrator to securely enforce the topology of the switched network. Any sw...
V-253962
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable Storm Control on all host-facing access interfaces.A traffic storm occurs when packets flood a LAN, creating excessive traffic and degrading network performance. Traffic storm control prevents network ...
V-253963
LOWMEDIUMHIGH
The Juniper EX switch must be configured to enable IGMP or MLD Snooping on all VLANs.IGMP and MLD snooping provides a way to constrain multicast traffic at layer 2. By monitoring the IGMP or MLD membership reports sent by hosts within ...
V-253972
LOWMEDIUMHIGH
The Juniper EX switch must not have any access interfaces assigned to a VLAN configured as native for any trunked interface.Trunked interfaces without an assigned native VLAN do not accept untagged data packets. Allowing trunked interfaces to accept untagged data packets ma...
V-253948
LOWMEDIUMHIGH
The Juniper EX switch must be configured to disable non-essential capabilities.A compromised switch introduces risk to the entire network infrastructure as well as data resources that are accessible via the network. The perimeter...
V-253949
LOWMEDIUMHIGH
The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.Controlling LAN access via 802.1x authentication can assist in preventing a malicious user from connecting an unauthorized PC to an access interface t...