STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Juniper SRX SG IDPS Security Technical Implementation Guide

V-66399

CAT II (Medium)

The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that signature-based objects are applied to outbound communications traffic.

Rule ID

SV-80889r1_rule

STIG

Juniper SRX SG IDPS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-001095

Discussion

The IDPS must include protection against DoS attacks that originate from inside the enclave which can affect either internal or external systems. These attacks may use legitimate or rogue endpoints from inside the enclave. <br /><br />To perform signature-based attacks on the Juniper SRX IDPS device, create a signature-based attack object.

Check Content

From operational mode, enter the following command to verify that the signature-based attack object was created: <br /><br />show security idp policies<br /><br />If signature-based attack objects are not created, bound to a zone, and active, this is a finding.

Fix Text

Specify a name for the attack. Specify common properties for the attack. Specify the attack type and context. Specify the attack direction and the shellcode flag. Set the protocol and its fields. Specify the protocol binding and ports. Specify the direction.<br /><br />[edit]<br />edit security idp custom-attack sig1<br />set severity major<br />set recommended-action drop-packet<br />set time-binding scope source count 10<br />set attack-type signature context packet<br />set attack-type signature <signature object name><br />set attack-type signature protocol ip ttl value 128 match equal<br />set attack-type signature protocol-binding tcp minimum-port 50 maximum-port 100<br />set attack-type signature direction any