STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper Router RTR Security Technical Implementation Guide

V-217024

CAT II (Medium)

The Juniper router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.

Rule ID

SV-217024r855892_rule

STIG

Juniper Router RTR Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-002385

Discussion

The ICMP supports IP traffic by relaying information about paths, routes, and network conditions. Routers automatically send ICMP messages under a wide variety of conditions. Redirect ICMP messages are commonly used by attackers for network mapping and diagnosis.

Check Content

Review the device configuration to determine if it has been configured to ensure the router does not send ICMP Redirect messages out to any external interface.

interfaces {
    ge-1/0/0 {
        unit 0 {
            family inet {
                no-redirects;
                address 11.1.12.2/24;
            }
        }
    }
    ge-1/1/0  {
        unit 0 {
            family inet {
                no-redirects;
                address 11.1.23.2/24;
            }
        }
    }

If ICMP Redirect messages are enabled on any external interfaces, this is a finding.

Fix Text

Disable ICMP redirects on all external interfaces as shown in the example below.

[edit interfaces]
set ge-1/0/0 unit 0 family inet no-redirects
set ge-1/1/0 unit 0 family inet no-redirects