DISA STIGS Viewer

The Juniper SRX Services Gateway must securely configure SSHv2 FIPS 140-2/140-3 validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.

Overview

Finding ID Version Rule ID IA Controls Severity
V-223225 JUSX-DM-000147 SV-223225r1056185_rule   High
Description
To protect the integrity of nonlocal maintenance sessions, SSHv2 with HMAC algorithms for integrity checking must be configured. Nonlocal maintenance and diagnostic activities are activities conducted by individuals communicating through an external network (e.g., the internet) or internal network. The SSHv2 protocol suite includes Layer 7 protocols such as SCP and SFTP, which can be used for secure file transfers.
STIG Date
Juniper SRX Services Gateway NDM Security Technical Implementation Guide 2024-12-20

Details

Check Text (C-24898r1056105_chk)
Verify SSHv2 and HMAC algorithms for integrity checking.

[edit]
show system services ssh

If SSHv2 and integrity options are not configured in compliance with DOD requirements for nonlocal maintenance session, this is a finding.
Fix Text (F-24886r1056106_fix)
Configure SSH integrity options.

[edit]
set system services ssh protocol-version v2
set system services ssh macs hmac-sha2-512
set system services ssh macs hmac-sha2-256