STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper EX Series Switches Router Security Technical Implementation Guide

V-254050

CAT III (Low)

The Juniper multicast Designated Router (DR) must be configured to filter the IGMP and MLD Report messages to allow hosts to join only multicast groups that have been approved by the organization.

Rule ID

SV-254050r844262_rule

STIG

Juniper EX Series Switches Router Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-002403

Discussion

Real-time multicast traffic can entail multiple large flows of data. Large unicast flows tend to be fairly isolated (i.e., someone downloading a file here or there), whereas multicast can have broader impact on bandwidth consumption, resulting in extreme network congestion. Hence, it is imperative that there is multicast admission control to restrict which multicast groups hosts are allowed to join via IGMP or MLD.

Check Content

Review the configuration of the DR to verify that it is filtering IGMP or MLD report messages, allowing hosts to join only those groups that have been approved.

Note: This requirement is only applicable to Source Specific Multicast (SSM) implementation. This requirement is not applicable to Any Source Multicast (ASM) since the filtering is being performed by the Rendezvous Point router.

[edit policy-options]
policy-statement <name> {
    term unauth-groups {
        from {
            route-filter 224.0.1.2/32 exact;
            route-filter 224.0.2.2/32 exact;
        }
        then reject;
    }
    term allow-others {
        then accept;
    }
}
policy-statement <name IPv6> {
    term unauth-groups {
        from {
            route-filter fec0:1:1:4::/64 exact;
        }
        then reject;
    }
    term allow-others {
        then accept;
    }
}

[edit protocols]
igmp {
    interface <name>.<logical unit> {
        group-policy <policy name>;
    }
}
mld {
    interface <name>.<logical unit> {
        group-policy <policy name IPv6>;
    }
}

If the DR is not filtering IGMP or MLD report messages, this is a finding.

Fix Text

Configure the DR to filter the IGMP and MLD report messages to allow hosts to join only those multicast groups that have been approved.

set policy-options policy-statement <name> term unauth-groups from route-filter 224.0.1.2/32 exact
set policy-options policy-statement <name> term unauth-groups from route-filter 224.0.2.2/32 exact
set policy-options policy-statement <name> term unauth-groups then reject
set policy-options policy-statement <name> term accept-others then accept

set policy-options policy-statement <name IPv6> term unauth-groups from route-filter fec0:1:1:4::/64 exact
set policy-options policy-statement <name IPv6> term unauth-groups then reject
set policy-options policy-statement <name IPv6> term accept-others then accept

set protocols igmp interface <name>.<logical unit> group-policy <policy name>
set protocols mld interface <name>.<logical unit> group-policy <policy name IPv6>