The Juniper SRX Services Gateway must terminate a device management session after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-223231 | JUSX-DM-000156 | SV-223231r961068_rule | CCI-001133 | medium |
| Description | ||||
| Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session. Quickly terminating an idle session also frees up resources. This requirement does not mean that the device terminates all sessions or network access; it only ends the inactive session. User accounts, including the account of last resort must be assigned to a login class. Configure all login classes with an idle timeout value. Pre-defined classes do not support configurations, therefore should not be used for DoD implementations. The root account cannot be assigned to a login-class which is why it is critical that this account be secured in accordance with DoD policy. | ||||
| STIG | Date | |||
| Juniper SRX Services Gateway NDM Security Technical Implementation Guide | 2024-12-20 | |||
Details
Check Text (C-223231r961068_chk)
Verify idle-timeout is set for 10 minutes.
[edit]
show system login
If a timeout value of 10 or less is not set for each class, this is a finding.
Fix Text (F-24892r513381_fix)
Configure all login classes with an idle timeout value.
[edit]
set system login-class <class name> idle-timeout 10
All users must be set to a login-class; however, to ensure that the CLI is set to a default timeout value, enter the following in operational mode:
set cli idle-timeout 10