STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 7 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper EX Series Switches Network Device Management Security Technical Implementation Guide

V-253941

CAT I (High)

The Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.

Rule ID

SV-253941r1137887_rule

STIG

Juniper EX Series Switches Network Device Management Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-000366, CCI-000370, CCI-003627, CCI-003628, CCI-003831, CCI-004046, CCI-004047, CCI-004058, CCI-004059, CCI-004060, CCI-004061, CCI-004063, CCI-004064, CCI-004065, CCI-004068

Discussion

Centralized management of authentication settings increases the security of remote and nonlocal access methods. This control is particularly important protection against the insider threat. With robust centralized management, audit records for administrator account access to the organization's network devices can be more readily analyzed for trends and anomalies. The alternative method of defining administrator accounts on each device exposes the device configuration to remote access authentication attacks and system administrators with multiple authenticators for each network device.

Check Content

Review the network device configuration to verify the device is configured to use an authentication server as the primary source for authentication. Verify the RADIUS and/or TACACS+ server addresses.

[edit system]
radius-server {
    <RADIUS-1 address> secret "hashed PSK"; ## SECRET-DATA
    <RADIUS-2 address> secret "hashed PSK"; ## SECRET-DATA
}
tacplus-server {
    <TACPLUS-1 address> secret "hashed PSK"; ## SECRET-DATA
    <TACPLUS-2 address> secret "hashed PSK"; ## SECRET-DATA
}

Verify the authentication order places the external authentication server first.
[edit system]
authentication-order [ radius tacplus password ];

Note: Only the global authentication order is required; all administrative access methods will honor the global setting unless configured separately. 

If the network device is not configured to use an authentication server to authenticate users prior to granting administrative access, this is a finding.

Fix Text

Configure the network device to use an authentication server.
set system radius-server <RADIUS-1 address> secret "<PSK>"
set system tacplus-server <TACPLUS-1 address> secret "<PSK>"

Configure the authentication order to use the authentication server as primary source for authentication.
set system authentication-order radius
set system authentication-order tacplus
set system authentication-order password