STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to STIGs

Juniper EX Series Switches Network Device Management Security Technical Implementation Guide

Version

V2R4

Release Date

Dec 10, 2025

SCAP Benchmark ID

Juniper_EX_NDM_STIG

Total Checks

56

Tags

network
CAT I: 13CAT II: 42CAT III: 1

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSONDownload STIG ZIP

Checks (56)

V-253878MEDIUMThe Juniper EX switch must be configured to limit the number of concurrent management sessions to 10 or an organization-defined value.V-253879MEDIUMThe Juniper EX switch must be configured to automatically audit account creation.V-253883HIGHThe Juniper EX switch must be configured to assign appropriate user roles or access levels to authenticated users.V-253884MEDIUMThe Juniper EX switch must be configured to enforce approved authorizations for controlling the flow of management information within the network device based on information flow control policies.V-253885MEDIUMThe Juniper EX switch must be configured to enforce the limit of three consecutive invalid logon attempts for any given user, after which time it must block any login attempt for that user for 15 minutes.V-253886MEDIUMThe Juniper EX switch must be configured to display the Standard Mandatory DOD Notice and Consent Banner before granting access to the device.V-253889MEDIUMThe Juniper device must be configured to produce audit log records containing sufficient information to establish what type of event occurred.V-253890MEDIUMThe Juniper EX switch must be configured to produce audit records containing information to establish when (date and time) the events occurred.V-253891MEDIUMThe Juniper EX switch must be configured to produce audit records containing information to establish where the events occurred.V-253892MEDIUMThe Juniper EX switch must be configured to produce audit log records containing information to establish the source of events.V-253893MEDIUMThe Juniper EX switch must be configured to produce audit records that contain information to establish the outcome of the event.V-253894MEDIUMThe Juniper EX switch must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.V-253896MEDIUMThe Juniper EX switch must be configured to protect audit information from unauthorized modification.V-253897MEDIUMThe Juniper EX switch must be configured to protect audit information from unauthorized deletion.V-253898MEDIUMThe Juniper EX switch must be configured to protect audit tools from unauthorized access.V-253899MEDIUMThe Juniper EX switch must be configured to limit privileges to change the software resident within software libraries.V-253900HIGHThe Juniper EX switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.V-253901MEDIUMThe Juniper EX switch must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.V-253903MEDIUMThe Juniper EX switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.V-253904MEDIUMThe Juniper EX switch must be configured to enforce a minimum 15-character password length.V-253905MEDIUMThe Juniper EX switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.V-253906MEDIUMThe Juniper EX switch must be configured to enforce password complexity by requiring that at least one lowercase character be used.V-253907MEDIUMThe Juniper EX switch must be configured to enforce password complexity by requiring that at least one numeric character be used.V-253908MEDIUMThe Juniper EX switch must be configured to enforce password complexity by requiring that at least one punctuation (special) character be used.V-253909MEDIUMThe Juniper EX switch must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.V-253910HIGHThe Juniper EX switch must be configured to only store cryptographic representations of passwords.V-253911HIGHThe Juniper EX switch must be configured to use FIPS 140-2/140-3-validated algorithms for authentication to a cryptographic module.V-253913HIGHThe Juniper EX switch must be configured to end all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill mission requirements.V-253914HIGHThe Juniper device must be configured to only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).V-253916MEDIUMThe Juniper EX switch must be configured to enforce organization-defined role-based access control policies over defined subjects and objects.V-253918MEDIUMThe Juniper EX switch must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.V-253919MEDIUMThe Juniper EX switch must be configured to generate an immediate real-time alert of all audit failure events requiring real-time alerts.V-253920MEDIUMThe Juniper EX switch must be configured to synchronize internal information system clocks using redundant authoritative time sources.V-253921MEDIUMThe Juniper EX switch must be configured to record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).V-253922MEDIUMThe Juniper EX switch must be configured to prohibit installation of software without explicit privileged status.V-253923MEDIUMThe Juniper EX switch must be configured to enforce access restrictions associated with changes to device configuration.V-253925HIGHThe Juniper EX switch must be configured to authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC).V-253926LOWThe Juniper EX switch must use an an NTP service that is hosted by a trusted source or a DOD-compliant enterprise or local NTP server.V-253927MEDIUMThe Juniper EX switch must be configured to prohibit the use of cached authenticators after an organization-defined time period.V-253928HIGHThe Juniper EX switches must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.V-253929HIGHThe Juniper EX switch must be configured to implement cryptographic mechanisms using a FIPS 140-2/140-3 approved algorithm to protect the confidentiality of remote maintenance sessions.V-253930MEDIUMThe Juniper EX switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.V-253933MEDIUMThe Juniper EX switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.V-253934MEDIUMThe Juniper EX switch must be configured to generate audit records for privileged activities or other system-level access.V-253935MEDIUMThe Juniper EX switch must be configured to generate audit records showing starting and ending time for administrator access to the system.V-253936MEDIUMThe Juniper EX switch must be configured to generate audit records when concurrent logons from different workstations occur.V-253937MEDIUMThe Juniper EX switch must be configured to offload audit records onto a different system or media than the system being audited.V-253939MEDIUMThe Juniper EX switch must be configured to generate log records for a locally developed list of auditable events.V-253940MEDIUMThe Juniper EX switch must be configured to enforce access restrictions associated with changes to the system components.V-253941HIGHThe Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.V-253942MEDIUMThe Juniper EX switch must be configured to conduct backups of system level information contained in the information system when changes occur.V-253943MEDIUMThe Juniper EX switch must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.V-253944HIGHThe Juniper EX switch must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).V-253945HIGHThe Juniper EX switch must be configured with an operating system release that is currently supported by the vendor.V-253946MEDIUMThe Juniper EX switch must change credentials for account of last resort when administrators who know the credential leave the organization.V-253947HIGHThe Juniper EX switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.