STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper Router RTR Security Technical Implementation Guide

V-233292

CAT II (Medium)

The Juniper perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.

Rule ID

SV-233292r604135_rule

STIG

Juniper Router RTR Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Many of the known attacks in stateless autoconfiguration are defined in RFC 3756 were present in IPv4 ARP attacks. To mitigate these vulnerabilities, links that have no hosts connected such as the interface connecting to external gateways must be configured to suppress router advertisements.

Check Content

This requirement is not applicable for the DODIN Backbone. 

Review the router configuration to verify that Router Advertisements are suppressed on all external IPv6-enabled interfaces as shown in the example below.

By default, router advertisements are disabled by Junos. Verify that there are no external-facing interfaces defined under the protocols router-advertisement hierarchy as shown in the example below.

protocols {
    router-advertisement {
        interface fe-0/1/0.0 {
            prefix 2001:1:123::/64;
        }
    }
}

If the router is not configured to suppress Router Advertisements on all external IPv6-enabled interfaces, this is a finding.

Fix Text

Remove any external IPv6-enabled interfaces from the protocols router-advertisement hierarchy.