STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper Router RTR Security Technical Implementation Guide

V-217093

CAT II (Medium)

The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to only accept MSDP packets from known MSDP peers.

Rule ID

SV-217093r855911_rule

STIG

Juniper Router RTR Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-002403

Discussion

MSDP peering with customer network routers presents additional risks to the DISN Core, whether from a rogue or misconfigured MSDP-enabled router. To guard against an attack from malicious MSDP traffic, the receive path or interface filter for all MSDP-enabled RP routers must be configured to only accept MSDP packets from known MSDP peers.

Check Content

Review the router configuration to determine if there is a receive path or interface filter to only accept MSDP packets from known MSDP peers.

Verify that the loopback has been configured to filter packets destined to the routing engine as shown in the example below.

interfaces {
    …
    …
    …
    }
    lo0 {
        unit 0 {
            family inet {
                filter {
                    input PROTECT_RE;
                }
                address 2.2.2.2/32;
            }
        }
    }
}

Verify that the filter is configured to only accept MSDP packets from known MSDP peers as shown in the example below.

firewall {
    family inet {
        filter PROTECT_RE {
            term MSDP_PEERS {
                from {
                    source-address {
                        0.0.0.0/0;
                        1.1.1.1/32 except;
                        5.5.5.5/32 except;
                    }
                    protocol tcp;
                    port msdp;
                }
                then {
                    discard;
                }
            }
            term ALLOW_OTHER {
                then accept;
            }
        }
    }
}

If the router is not configured to only accept MSDP packets from known MSDP peers, this is a finding.

Fix Text

Configure the receive path filter to only accept MSDP packets from known MSDP peers as shown in the following example:

[edit firewall family inet filter PROTECT_RE]
set term MSDP_PEERS from protocol tcp port msdp
set term MSDP_PEERS from source-address 0.0.0.0/0
set term MSDP_PEERS from source-address 1.1.1.1/32 except
set term MSDP_PEERS from source-address 5.5.5.5/32 except
set term MSDP_PEERS then discard
set term ALLOW_OTHER then accept

Apply the filter to the loopback interface.

[edit interfaces lo0 unit 0 family inet]
set filter input PROTECT_RE