DOWNLOAD - Juniper device hardeningIntroductionRationaleAn out-of-box firewall implementation is not fully secure and needs to be hardened. This document details the various aspects of Juniper firewall security and standards implemented for securing Juniper firewalls.PurposeThis document is to define a baseline security standard for the Juniper Firewall implementations by firewall administrators.ScopeThese security standards cover the Juniper Firewall Screen OS implementation.However, for some setups, this minimum requirement and some features of these standards may not be practical for implementation. For exceptions, the system administrators must document the reasons for not complying fully with these standards and request an exemption from the Security department.AudienceFirewall administrators bear the primary responsibility of implementing these standards. During their reviews and inspections, auditors must use this document to verify standards compliance.Business managers can read the rationale behind each of the points in the standards to gain an understanding of the importance of applying it to their environments.ImplementationThe Juniper Firewall administrators must use these standards to build the installation and operational procedures.Juniper Firewall Security OverviewThis section gives a very brief overview of various aspects of Juniper Firewall security. The hardening details for each aspect are present in the subsequent sections of the document.The Juniper Firewall operating security environment consists of various aspects:Device & ScreenOS initial setup
Device Configuration
Device Management
User management
Services
System access
System logging and monitoring
Policy logging and monitoring
Device and ScreenOS SetupThe security of a Juniper firewall Screen OS starts with a secure setup. The factors that influence this include using the correct Screen OS version.Properly Identify Device for Physical TamperingThe outside packaging cannot show damage, or evidence that unauthorized persons have opened it. If the cardboard shows damage that would allow the device to be unpacked or exchanged, this may be evidence of tampering.Each packed box arrives with custom tape to indicate that Juniper or an authorized manufacturer packaged the device. The tape is unique; with the word, "Juniper" printed repeatedly throughout the tape. If the tape is not present, this may be evidence of tampering.The internal packaging cannot show damage or evidence of tampering. The plastic bag should not have a large hole and the label that seals the plastic bag should not be detached or missing. Any damage to the bag or the seal may be evidence of tampering.Verify correct version of hardware and softwareTo verify that the product received is the correct version of hardware and software, run the following command from the CLI:get systemThe output of this command includes two key items, hardware version and software version. The hardware and software versions must match the common criteria security target to be in full compliance with the common criteria evaluated configuration.The firewalls come with pre-installed Screen OS software. However, the Screen OS software versions installed on the devices might vary depending on the manufacturing time of the security appliances.Upgrading a Juniper FirewallThe correct Screen OS software image needs to be loaded on to the security appliance.Before the Screen OS software image can be loaded, configure the manage interface though which the images can be downloaded from the FTP server to the security appliances. The following commands will configure the zone and IP address for the manage interface.set interface interface-name zone trustset interface interface-name ip ip-addressNote: Interface-name should the name of the actual interface connected to the PC serving as FTP firewall; through this interface, the security appliances can communicate with the FTP firewall. For the 5-series devices, interface trust – bound to the security zone trust by default – can be used. For devices Juniper NetScreen-204 and 208, you can use interface ethernet1. For Juniper NetScreen-500, interface ethernet1/1in the security zone trust can be in place of interface-name. On high-level security, appliances including Juniper NetScreen-ISG2000 and ISG1000 interface can use ethernet1/1. Juniper NetScreen-5200 and NetScreen 5400 can use Interface ethernet2/1.The ip-address should be a valid IP address, which can be in the same or different subnet with the TFTP firewall.Once configured, use the following commands to download the Screen OS image from the FTP firewall to the security appliance:save software from tftp tftp-firewall-ip Screen OS-image to flashwhere, tftp-firewall-ip is IP address for PC serving as the TFTP firewall where the Screen OS software images reside and, Screen OS-image is relative path to the Screen OS software image file and the name of the file itself.For example, if the Screen OS image for the device Juniper NetScreen-5GT is "ns5gt.5.4.0r4.0" and resides on FTP firewall (with IP address 10.155.95.253), under the directory /tftpboot/screen OS-image/5.4/, the command should be as the following:save software from tftp 10.155.95.253 /tftpboot/screen OS-image/5.4/ns5gt.5.4.0r4.0 to flashThe downloading process will take a few minutes. After the downloading process is completed, the security appliance will return to the CLI prompt and requires a reboot. Issue the command reset and provide answers for the questions below to completely load the image to the security appliance and restore the default manufacture configurations.resetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] yThe security appliance will return to the login prompt. At this time, the security appliance has been completely loaded with the proper Screen OS software version.Screen OS UpgradesUpdate the firewalls' Screen OS with the vendor recommended updates as part of quarterly.Device ConfigurationRestore default settingsRestore the firewall to the default manufacturing operation mode and configurations before putting the appliance in a different operation modes including Transparent Authenticated mode (a.k.a. Transparent VPN mode) or NAT/Route Authenticated mode (a.k.a. NAT/Route VPN mode) or before performing any configurations for any specific testing.Use the commands unset all and reset along with the following answers to restored the default operation mode and configurations for the appliance.unset allErase all system config, are you sure y/ [n]? YresetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] ySet accurate date and timeEnable the following command to ensure that the date and time stamps used on audit messages are accurate:set clock mm/dd/yyyy hh:mmSetting the Operation ModeTo determine which operation mode the juniper firewall is, use the following command.get system"System in NAT/Route mode" indicates it is operating in NAT/Route mode"System in transparent mode" indicates it is operating in transparent mode.All security appliances are, by default, configured in NAT/Route mode without VPN.To ensure that a security appliance is in a mode compliant with the Common Criteria EAL4 evaluated configuration, follow one of the following three sets of steps depending on the desired configuration:Unauthenticated NAT/Route ModeAuthenticated NAT/Route ModeRoute-Based VPNPolicy-Based VPNAuthenticated Transparent ModeAuthenticated NAT/Route ModeConfigure the firewall in authenticated NAT/Route Mode using either a Route-based VPN or Policy-based VPN. You can configure both Route-based VPN and Policy-based VPN in authenticated NAT/Route mode.Only Manual Key is supported in the Evaluated Configuration, i.e. AutoKey cannot be used. Take care in selecting Manual Key values such that they follow the same rules as administrative passwords. Distribute the manual keys using a secure method to ensure that they are not publicly accessible.Route-Based VPNConfigure the respective security appliance with a Route-based VPN in authenticated NAT/Route mode.Policy-Based VPNConfigure the respective security appliance with a Policy-based VPN in authenticated NAT/Route mode.Firewall Naming ConventionBranch Firewalls: (Naming convention not set)Data Center Firewalls: (Naming convention not set)Configuring Screen OptionsSecurity appliances must prevent all types of Denial of Service (DoS) and attack signatures on every security zone to prevent these types of attacks from occurring on the network.To view the default screening options for a particular security zone, issue the following command.get zone zone-name screenBy default, the screening options enabled for the Untrust/V1-Untrust security zone (and the interfaces in Untrust/V1-Untrust zone) in Screen OS 5.0:Tear-drop Attack Protection onSYN Flood Protection (200) onAlarm Threshold: alarm-thresholdQueue Size: Q-sizeTimeout Value: 20Source Threshold: src-thresholdDestination Threshold: dst-thresholdDrop unknown MAC (transparent mode only): offPing-of-Death Protection onSource Route IP Option Filter onLand Attack Protection onAlarm-threshold, Q-size, src-threshold, and dst-threshold are platform dependent as specified in the table below.For the Trust/V1-Trust and DMZ/V1-DMZ zones (and the interfaces in Trust and DMZ zone), no screen options are enabled by default.Screen function only generate alarm without dropping packet: OFFTo disable all the default screening option for zone Untrust/V1-Untrust, the following commands are used:unset zone untrust screen tear-dropunset zone untrust screen syn-floodunset zone untrust screen ping-deathunset zone untrust screen ip-filter-srcunset zone untrust screen landThe following displays when the security zone has no screening options enabled:"Screen function only generate alarm without dropping packet: OFF"The following CLI command enables all screens on a per-zone basis (and is applied to all interfaces within that zone):set zone zone-name screen block-fragset zone zone-name screen component-blockset zone zone-name screen fin-no-ackset zone zone-name screen icmp-floodset zone zone-name screen icmp-fragmentset zone zone-name screen icmp-largeset zone zone-name screen ip-bad-optionset zone zone-name screen ip-filter-src
IntroductionRationaleAn out-of-box firewall implementation is not fully secure and needs to be hardened. This document details the various aspects of Juniper firewall security and standards implemented for securing Juniper firewalls.PurposeThis document is to define a baseline security standard for the Juniper Firewall implementations by firewall administrators.ScopeThese security standards cover the Juniper Firewall Screen OS implementation.However, for some setups, this minimum requirement and some features of these standards may not be practical for implementation. For exceptions, the system administrators must document the reasons for not complying fully with these standards and request an exemption from the Security department.AudienceFirewall administrators bear the primary responsibility of implementing these standards. During their reviews and inspections, auditors must use this document to verify standards compliance.Business managers can read the rationale behind each of the points in the standards to gain an understanding of the importance of applying it to their environments.ImplementationThe Juniper Firewall administrators must use these standards to build the installation and operational procedures.Juniper Firewall Security OverviewThis section gives a very brief overview of various aspects of Juniper Firewall security. The hardening details for each aspect are present in the subsequent sections of the document.The Juniper Firewall operating security environment consists of various aspects:Device & ScreenOS initial setup
Device Configuration
Device Management
User management
Services
System access
System logging and monitoring
Policy logging and monitoring
Device and ScreenOS SetupThe security of a Juniper firewall Screen OS starts with a secure setup. The factors that influence this include using the correct Screen OS version.Properly Identify Device for Physical TamperingThe outside packaging cannot show damage, or evidence that unauthorized persons have opened it. If the cardboard shows damage that would allow the device to be unpacked or exchanged, this may be evidence of tampering.Each packed box arrives with custom tape to indicate that Juniper or an authorized manufacturer packaged the device. The tape is unique; with the word, "Juniper" printed repeatedly throughout the tape. If the tape is not present, this may be evidence of tampering.The internal packaging cannot show damage or evidence of tampering. The plastic bag should not have a large hole and the label that seals the plastic bag should not be detached or missing. Any damage to the bag or the seal may be evidence of tampering.Verify correct version of hardware and softwareTo verify that the product received is the correct version of hardware and software, run the following command from the CLI:get systemThe output of this command includes two key items, hardware version and software version. The hardware and software versions must match the common criteria security target to be in full compliance with the common criteria evaluated configuration.The firewalls come with pre-installed Screen OS software. However, the Screen OS software versions installed on the devices might vary depending on the manufacturing time of the security appliances.Upgrading a Juniper FirewallThe correct Screen OS software image needs to be loaded on to the security appliance.Before the Screen OS software image can be loaded, configure the manage interface though which the images can be downloaded from the FTP server to the security appliances. The following commands will configure the zone and IP address for the manage interface.set interface interface-name zone trustset interface interface-name ip ip-addressNote: Interface-name should the name of the actual interface connected to the PC serving as FTP firewall; through this interface, the security appliances can communicate with the FTP firewall. For the 5-series devices, interface trust – bound to the security zone trust by default – can be used. For devices Juniper NetScreen-204 and 208, you can use interface ethernet1. For Juniper NetScreen-500, interface ethernet1/1in the security zone trust can be in place of interface-name. On high-level security, appliances including Juniper NetScreen-ISG2000 and ISG1000 interface can use ethernet1/1. Juniper NetScreen-5200 and NetScreen 5400 can use Interface ethernet2/1.The ip-address should be a valid IP address, which can be in the same or different subnet with the TFTP firewall.Once configured, use the following commands to download the Screen OS image from the FTP firewall to the security appliance:save software from tftp tftp-firewall-ip Screen OS-image to flashwhere, tftp-firewall-ip is IP address for PC serving as the TFTP firewall where the Screen OS software images reside and, Screen OS-image is relative path to the Screen OS software image file and the name of the file itself.For example, if the Screen OS image for the device Juniper NetScreen-5GT is "ns5gt.5.4.0r4.0" and resides on FTP firewall (with IP address 10.155.95.253), under the directory /tftpboot/screen OS-image/5.4/, the command should be as the following:save software from tftp 10.155.95.253 /tftpboot/screen OS-image/5.4/ns5gt.5.4.0r4.0 to flashThe downloading process will take a few minutes. After the downloading process is completed, the security appliance will return to the CLI prompt and requires a reboot. Issue the command reset and provide answers for the questions below to completely load the image to the security appliance and restore the default manufacture configurations.resetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] yThe security appliance will return to the login prompt. At this time, the security appliance has been completely loaded with the proper Screen OS software version.Screen OS UpgradesUpdate the firewalls' Screen OS with the vendor recommended updates as part of quarterly.Device ConfigurationRestore default settingsRestore the firewall to the default manufacturing operation mode and configurations before putting the appliance in a different operation modes including Transparent Authenticated mode (a.k.a. Transparent VPN mode) or NAT/Route Authenticated mode (a.k.a. NAT/Route VPN mode) or before performing any configurations for any specific testing.Use the commands unset all and reset along with the following answers to restored the default operation mode and configurations for the appliance.unset allErase all system config, are you sure y/ [n]? YresetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] ySet accurate date and timeEnable the following command to ensure that the date and time stamps used on audit messages are accurate:set clock mm/dd/yyyy hh:mmSetting the Operation ModeTo determine which operation mode the juniper firewall is, use the following command.get system"System in NAT/Route mode" indicates it is operating in NAT/Route mode"System in transparent mode" indicates it is operating in transparent mode.All security appliances are, by default, configured in NAT/Route mode without VPN.To ensure that a security appliance is in a mode compliant with the Common Criteria EAL4 evaluated configuration, follow one of the following three sets of steps depending on the desired configuration:Unauthenticated NAT/Route ModeAuthenticated NAT/Route ModeRoute-Based VPNPolicy-Based VPNAuthenticated Transparent ModeAuthenticated NAT/Route ModeConfigure the firewall in authenticated NAT/Route Mode using either a Route-based VPN or Policy-based VPN. You can configure both Route-based VPN and Policy-based VPN in authenticated NAT/Route mode.Only Manual Key is supported in the Evaluated Configuration, i.e. AutoKey cannot be used. Take care in selecting Manual Key values such that they follow the same rules as administrative passwords. Distribute the manual keys using a secure method to ensure that they are not publicly accessible.Route-Based VPNConfigure the respective security appliance with a Route-based VPN in authenticated NAT/Route mode.Policy-Based VPNConfigure the respective security appliance with a Policy-based VPN in authenticated NAT/Route mode.Firewall Naming ConventionBranch Firewalls: (Naming convention not set)Data Center Firewalls: (Naming convention not set)Configuring Screen OptionsSecurity appliances must prevent all types of Denial of Service (DoS) and attack signatures on every security zone to prevent these types of attacks from occurring on the network.To view the default screening options for a particular security zone, issue the following command.get zone zone-name screenBy default, the screening options enabled for the Untrust/V1-Untrust security zone (and the interfaces in Untrust/V1-Untrust zone) in Screen OS 5.0:Tear-drop Attack Protection onSYN Flood Protection (200) onAlarm Threshold: alarm-thresholdQueue Size: Q-sizeTimeout Value: 20Source Threshold: src-thresholdDestination Threshold: dst-thresholdDrop unknown MAC (transparent mode only): offPing-of-Death Protection onSource Route IP Option Filter onLand Attack Protection onAlarm-threshold, Q-size, src-threshold, and dst-threshold are platform dependent as specified in the table below.For the Trust/V1-Trust and DMZ/V1-DMZ zones (and the interfaces in Trust and DMZ zone), no screen options are enabled by default.Screen function only generate alarm without dropping packet: OFFTo disable all the default screening option for zone Untrust/V1-Untrust, the following commands are used:unset zone untrust screen tear-dropunset zone untrust screen syn-floodunset zone untrust screen ping-deathunset zone untrust screen ip-filter-srcunset zone untrust screen landThe following displays when the security zone has no screening options enabled:"Screen function only generate alarm without dropping packet: OFF"The following CLI command enables all screens on a per-zone basis (and is applied to all interfaces within that zone):set zone zone-name screen block-fragset zone zone-name screen component-blockset zone zone-name screen fin-no-ackset zone zone-name screen icmp-floodset zone zone-name screen icmp-fragmentset zone zone-name screen icmp-largeset zone zone-name screen ip-bad-optionset zone zone-name screen ip-filter-src
RationaleAn out-of-box firewall implementation is not fully secure and needs to be hardened. This document details the various aspects of Juniper firewall security and standards implemented for securing Juniper firewalls.PurposeThis document is to define a baseline security standard for the Juniper Firewall implementations by firewall administrators.ScopeThese security standards cover the Juniper Firewall Screen OS implementation.However, for some setups, this minimum requirement and some features of these standards may not be practical for implementation. For exceptions, the system administrators must document the reasons for not complying fully with these standards and request an exemption from the Security department.AudienceFirewall administrators bear the primary responsibility of implementing these standards. During their reviews and inspections, auditors must use this document to verify standards compliance.Business managers can read the rationale behind each of the points in the standards to gain an understanding of the importance of applying it to their environments.ImplementationThe Juniper Firewall administrators must use these standards to build the installation and operational procedures.Juniper Firewall Security OverviewThis section gives a very brief overview of various aspects of Juniper Firewall security. The hardening details for each aspect are present in the subsequent sections of the document.The Juniper Firewall operating security environment consists of various aspects:Device & ScreenOS initial setup
Device Configuration
Device Management
User management
Services
System access
System logging and monitoring
Policy logging and monitoring
Device and ScreenOS SetupThe security of a Juniper firewall Screen OS starts with a secure setup. The factors that influence this include using the correct Screen OS version.Properly Identify Device for Physical TamperingThe outside packaging cannot show damage, or evidence that unauthorized persons have opened it. If the cardboard shows damage that would allow the device to be unpacked or exchanged, this may be evidence of tampering.Each packed box arrives with custom tape to indicate that Juniper or an authorized manufacturer packaged the device. The tape is unique; with the word, "Juniper" printed repeatedly throughout the tape. If the tape is not present, this may be evidence of tampering.The internal packaging cannot show damage or evidence of tampering. The plastic bag should not have a large hole and the label that seals the plastic bag should not be detached or missing. Any damage to the bag or the seal may be evidence of tampering.Verify correct version of hardware and softwareTo verify that the product received is the correct version of hardware and software, run the following command from the CLI:get systemThe output of this command includes two key items, hardware version and software version. The hardware and software versions must match the common criteria security target to be in full compliance with the common criteria evaluated configuration.The firewalls come with pre-installed Screen OS software. However, the Screen OS software versions installed on the devices might vary depending on the manufacturing time of the security appliances.Upgrading a Juniper FirewallThe correct Screen OS software image needs to be loaded on to the security appliance.Before the Screen OS software image can be loaded, configure the manage interface though which the images can be downloaded from the FTP server to the security appliances. The following commands will configure the zone and IP address for the manage interface.set interface interface-name zone trustset interface interface-name ip ip-addressNote: Interface-name should the name of the actual interface connected to the PC serving as FTP firewall; through this interface, the security appliances can communicate with the FTP firewall. For the 5-series devices, interface trust – bound to the security zone trust by default – can be used. For devices Juniper NetScreen-204 and 208, you can use interface ethernet1. For Juniper NetScreen-500, interface ethernet1/1in the security zone trust can be in place of interface-name. On high-level security, appliances including Juniper NetScreen-ISG2000 and ISG1000 interface can use ethernet1/1. Juniper NetScreen-5200 and NetScreen 5400 can use Interface ethernet2/1.The ip-address should be a valid IP address, which can be in the same or different subnet with the TFTP firewall.Once configured, use the following commands to download the Screen OS image from the FTP firewall to the security appliance:save software from tftp tftp-firewall-ip Screen OS-image to flashwhere, tftp-firewall-ip is IP address for PC serving as the TFTP firewall where the Screen OS software images reside and, Screen OS-image is relative path to the Screen OS software image file and the name of the file itself.For example, if the Screen OS image for the device Juniper NetScreen-5GT is "ns5gt.5.4.0r4.0" and resides on FTP firewall (with IP address 10.155.95.253), under the directory /tftpboot/screen OS-image/5.4/, the command should be as the following:save software from tftp 10.155.95.253 /tftpboot/screen OS-image/5.4/ns5gt.5.4.0r4.0 to flashThe downloading process will take a few minutes. After the downloading process is completed, the security appliance will return to the CLI prompt and requires a reboot. Issue the command reset and provide answers for the questions below to completely load the image to the security appliance and restore the default manufacture configurations.resetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] yThe security appliance will return to the login prompt. At this time, the security appliance has been completely loaded with the proper Screen OS software version.Screen OS UpgradesUpdate the firewalls' Screen OS with the vendor recommended updates as part of quarterly.Device ConfigurationRestore default settingsRestore the firewall to the default manufacturing operation mode and configurations before putting the appliance in a different operation modes including Transparent Authenticated mode (a.k.a. Transparent VPN mode) or NAT/Route Authenticated mode (a.k.a. NAT/Route VPN mode) or before performing any configurations for any specific testing.Use the commands unset all and reset along with the following answers to restored the default operation mode and configurations for the appliance.unset allErase all system config, are you sure y/ [n]? YresetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] ySet accurate date and timeEnable the following command to ensure that the date and time stamps used on audit messages are accurate:set clock mm/dd/yyyy hh:mmSetting the Operation ModeTo determine which operation mode the juniper firewall is, use the following command.get system"System in NAT/Route mode" indicates it is operating in NAT/Route mode"System in transparent mode" indicates it is operating in transparent mode.All security appliances are, by default, configured in NAT/Route mode without VPN.To ensure that a security appliance is in a mode compliant with the Common Criteria EAL4 evaluated configuration, follow one of the following three sets of steps depending on the desired configuration:Unauthenticated NAT/Route ModeAuthenticated NAT/Route ModeRoute-Based VPNPolicy-Based VPNAuthenticated Transparent ModeAuthenticated NAT/Route ModeConfigure the firewall in authenticated NAT/Route Mode using either a Route-based VPN or Policy-based VPN. You can configure both Route-based VPN and Policy-based VPN in authenticated NAT/Route mode.Only Manual Key is supported in the Evaluated Configuration, i.e. AutoKey cannot be used. Take care in selecting Manual Key values such that they follow the same rules as administrative passwords. Distribute the manual keys using a secure method to ensure that they are not publicly accessible.Route-Based VPNConfigure the respective security appliance with a Route-based VPN in authenticated NAT/Route mode.Policy-Based VPNConfigure the respective security appliance with a Policy-based VPN in authenticated NAT/Route mode.Firewall Naming ConventionBranch Firewalls: (Naming convention not set)Data Center Firewalls: (Naming convention not set)Configuring Screen OptionsSecurity appliances must prevent all types of Denial of Service (DoS) and attack signatures on every security zone to prevent these types of attacks from occurring on the network.To view the default screening options for a particular security zone, issue the following command.get zone zone-name screenBy default, the screening options enabled for the Untrust/V1-Untrust security zone (and the interfaces in Untrust/V1-Untrust zone) in Screen OS 5.0:Tear-drop Attack Protection onSYN Flood Protection (200) onAlarm Threshold: alarm-thresholdQueue Size: Q-sizeTimeout Value: 20Source Threshold: src-thresholdDestination Threshold: dst-thresholdDrop unknown MAC (transparent mode only): offPing-of-Death Protection onSource Route IP Option Filter onLand Attack Protection onAlarm-threshold, Q-size, src-threshold, and dst-threshold are platform dependent as specified in the table below.For the Trust/V1-Trust and DMZ/V1-DMZ zones (and the interfaces in Trust and DMZ zone), no screen options are enabled by default.Screen function only generate alarm without dropping packet: OFFTo disable all the default screening option for zone Untrust/V1-Untrust, the following commands are used:unset zone untrust screen tear-dropunset zone untrust screen syn-floodunset zone untrust screen ping-deathunset zone untrust screen ip-filter-srcunset zone untrust screen landThe following displays when the security zone has no screening options enabled:"Screen function only generate alarm without dropping packet: OFF"The following CLI command enables all screens on a per-zone basis (and is applied to all interfaces within that zone):set zone zone-name screen block-fragset zone zone-name screen component-blockset zone zone-name screen fin-no-ackset zone zone-name screen icmp-floodset zone zone-name screen icmp-fragmentset zone zone-name screen icmp-largeset zone zone-name screen ip-bad-optionset zone zone-name screen ip-filter-src
PurposeThis document is to define a baseline security standard for the Juniper Firewall implementations by firewall administrators.ScopeThese security standards cover the Juniper Firewall Screen OS implementation.However, for some setups, this minimum requirement and some features of these standards may not be practical for implementation. For exceptions, the system administrators must document the reasons for not complying fully with these standards and request an exemption from the Security department.AudienceFirewall administrators bear the primary responsibility of implementing these standards. During their reviews and inspections, auditors must use this document to verify standards compliance.Business managers can read the rationale behind each of the points in the standards to gain an understanding of the importance of applying it to their environments.ImplementationThe Juniper Firewall administrators must use these standards to build the installation and operational procedures.Juniper Firewall Security OverviewThis section gives a very brief overview of various aspects of Juniper Firewall security. The hardening details for each aspect are present in the subsequent sections of the document.The Juniper Firewall operating security environment consists of various aspects:Device & ScreenOS initial setup
Device Configuration
Device Management
User management
Services
System access
System logging and monitoring
Policy logging and monitoring
Device and ScreenOS SetupThe security of a Juniper firewall Screen OS starts with a secure setup. The factors that influence this include using the correct Screen OS version.Properly Identify Device for Physical TamperingThe outside packaging cannot show damage, or evidence that unauthorized persons have opened it. If the cardboard shows damage that would allow the device to be unpacked or exchanged, this may be evidence of tampering.Each packed box arrives with custom tape to indicate that Juniper or an authorized manufacturer packaged the device. The tape is unique; with the word, "Juniper" printed repeatedly throughout the tape. If the tape is not present, this may be evidence of tampering.The internal packaging cannot show damage or evidence of tampering. The plastic bag should not have a large hole and the label that seals the plastic bag should not be detached or missing. Any damage to the bag or the seal may be evidence of tampering.Verify correct version of hardware and softwareTo verify that the product received is the correct version of hardware and software, run the following command from the CLI:get systemThe output of this command includes two key items, hardware version and software version. The hardware and software versions must match the common criteria security target to be in full compliance with the common criteria evaluated configuration.The firewalls come with pre-installed Screen OS software. However, the Screen OS software versions installed on the devices might vary depending on the manufacturing time of the security appliances.Upgrading a Juniper FirewallThe correct Screen OS software image needs to be loaded on to the security appliance.Before the Screen OS software image can be loaded, configure the manage interface though which the images can be downloaded from the FTP server to the security appliances. The following commands will configure the zone and IP address for the manage interface.set interface interface-name zone trustset interface interface-name ip ip-addressNote: Interface-name should the name of the actual interface connected to the PC serving as FTP firewall; through this interface, the security appliances can communicate with the FTP firewall. For the 5-series devices, interface trust – bound to the security zone trust by default – can be used. For devices Juniper NetScreen-204 and 208, you can use interface ethernet1. For Juniper NetScreen-500, interface ethernet1/1in the security zone trust can be in place of interface-name. On high-level security, appliances including Juniper NetScreen-ISG2000 and ISG1000 interface can use ethernet1/1. Juniper NetScreen-5200 and NetScreen 5400 can use Interface ethernet2/1.The ip-address should be a valid IP address, which can be in the same or different subnet with the TFTP firewall.Once configured, use the following commands to download the Screen OS image from the FTP firewall to the security appliance:save software from tftp tftp-firewall-ip Screen OS-image to flashwhere, tftp-firewall-ip is IP address for PC serving as the TFTP firewall where the Screen OS software images reside and, Screen OS-image is relative path to the Screen OS software image file and the name of the file itself.For example, if the Screen OS image for the device Juniper NetScreen-5GT is "ns5gt.5.4.0r4.0" and resides on FTP firewall (with IP address 10.155.95.253), under the directory /tftpboot/screen OS-image/5.4/, the command should be as the following:save software from tftp 10.155.95.253 /tftpboot/screen OS-image/5.4/ns5gt.5.4.0r4.0 to flashThe downloading process will take a few minutes. After the downloading process is completed, the security appliance will return to the CLI prompt and requires a reboot. Issue the command reset and provide answers for the questions below to completely load the image to the security appliance and restore the default manufacture configurations.resetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] yThe security appliance will return to the login prompt. At this time, the security appliance has been completely loaded with the proper Screen OS software version.Screen OS UpgradesUpdate the firewalls' Screen OS with the vendor recommended updates as part of quarterly.Device ConfigurationRestore default settingsRestore the firewall to the default manufacturing operation mode and configurations before putting the appliance in a different operation modes including Transparent Authenticated mode (a.k.a. Transparent VPN mode) or NAT/Route Authenticated mode (a.k.a. NAT/Route VPN mode) or before performing any configurations for any specific testing.Use the commands unset all and reset along with the following answers to restored the default operation mode and configurations for the appliance.unset allErase all system config, are you sure y/ [n]? YresetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] ySet accurate date and timeEnable the following command to ensure that the date and time stamps used on audit messages are accurate:set clock mm/dd/yyyy hh:mmSetting the Operation ModeTo determine which operation mode the juniper firewall is, use the following command.get system"System in NAT/Route mode" indicates it is operating in NAT/Route mode"System in transparent mode" indicates it is operating in transparent mode.All security appliances are, by default, configured in NAT/Route mode without VPN.To ensure that a security appliance is in a mode compliant with the Common Criteria EAL4 evaluated configuration, follow one of the following three sets of steps depending on the desired configuration:Unauthenticated NAT/Route ModeAuthenticated NAT/Route ModeRoute-Based VPNPolicy-Based VPNAuthenticated Transparent ModeAuthenticated NAT/Route ModeConfigure the firewall in authenticated NAT/Route Mode using either a Route-based VPN or Policy-based VPN. You can configure both Route-based VPN and Policy-based VPN in authenticated NAT/Route mode.Only Manual Key is supported in the Evaluated Configuration, i.e. AutoKey cannot be used. Take care in selecting Manual Key values such that they follow the same rules as administrative passwords. Distribute the manual keys using a secure method to ensure that they are not publicly accessible.Route-Based VPNConfigure the respective security appliance with a Route-based VPN in authenticated NAT/Route mode.Policy-Based VPNConfigure the respective security appliance with a Policy-based VPN in authenticated NAT/Route mode.Firewall Naming ConventionBranch Firewalls: (Naming convention not set)Data Center Firewalls: (Naming convention not set)Configuring Screen OptionsSecurity appliances must prevent all types of Denial of Service (DoS) and attack signatures on every security zone to prevent these types of attacks from occurring on the network.To view the default screening options for a particular security zone, issue the following command.get zone zone-name screenBy default, the screening options enabled for the Untrust/V1-Untrust security zone (and the interfaces in Untrust/V1-Untrust zone) in Screen OS 5.0:Tear-drop Attack Protection onSYN Flood Protection (200) onAlarm Threshold: alarm-thresholdQueue Size: Q-sizeTimeout Value: 20Source Threshold: src-thresholdDestination Threshold: dst-thresholdDrop unknown MAC (transparent mode only): offPing-of-Death Protection onSource Route IP Option Filter onLand Attack Protection onAlarm-threshold, Q-size, src-threshold, and dst-threshold are platform dependent as specified in the table below.For the Trust/V1-Trust and DMZ/V1-DMZ zones (and the interfaces in Trust and DMZ zone), no screen options are enabled by default.Screen function only generate alarm without dropping packet: OFFTo disable all the default screening option for zone Untrust/V1-Untrust, the following commands are used:unset zone untrust screen tear-dropunset zone untrust screen syn-floodunset zone untrust screen ping-deathunset zone untrust screen ip-filter-srcunset zone untrust screen landThe following displays when the security zone has no screening options enabled:"Screen function only generate alarm without dropping packet: OFF"The following CLI command enables all screens on a per-zone basis (and is applied to all interfaces within that zone):set zone zone-name screen block-fragset zone zone-name screen component-blockset zone zone-name screen fin-no-ackset zone zone-name screen icmp-floodset zone zone-name screen icmp-fragmentset zone zone-name screen icmp-largeset zone zone-name screen ip-bad-optionset zone zone-name screen ip-filter-src
ScopeThese security standards cover the Juniper Firewall Screen OS implementation.However, for some setups, this minimum requirement and some features of these standards may not be practical for implementation. For exceptions, the system administrators must document the reasons for not complying fully with these standards and request an exemption from the Security department.AudienceFirewall administrators bear the primary responsibility of implementing these standards. During their reviews and inspections, auditors must use this document to verify standards compliance.Business managers can read the rationale behind each of the points in the standards to gain an understanding of the importance of applying it to their environments.ImplementationThe Juniper Firewall administrators must use these standards to build the installation and operational procedures.Juniper Firewall Security OverviewThis section gives a very brief overview of various aspects of Juniper Firewall security. The hardening details for each aspect are present in the subsequent sections of the document.The Juniper Firewall operating security environment consists of various aspects:Device & ScreenOS initial setup
Device Configuration
Device Management
User management
Services
System access
System logging and monitoring
Policy logging and monitoring
Device and ScreenOS SetupThe security of a Juniper firewall Screen OS starts with a secure setup. The factors that influence this include using the correct Screen OS version.Properly Identify Device for Physical TamperingThe outside packaging cannot show damage, or evidence that unauthorized persons have opened it. If the cardboard shows damage that would allow the device to be unpacked or exchanged, this may be evidence of tampering.Each packed box arrives with custom tape to indicate that Juniper or an authorized manufacturer packaged the device. The tape is unique; with the word, "Juniper" printed repeatedly throughout the tape. If the tape is not present, this may be evidence of tampering.The internal packaging cannot show damage or evidence of tampering. The plastic bag should not have a large hole and the label that seals the plastic bag should not be detached or missing. Any damage to the bag or the seal may be evidence of tampering.Verify correct version of hardware and softwareTo verify that the product received is the correct version of hardware and software, run the following command from the CLI:get systemThe output of this command includes two key items, hardware version and software version. The hardware and software versions must match the common criteria security target to be in full compliance with the common criteria evaluated configuration.The firewalls come with pre-installed Screen OS software. However, the Screen OS software versions installed on the devices might vary depending on the manufacturing time of the security appliances.Upgrading a Juniper FirewallThe correct Screen OS software image needs to be loaded on to the security appliance.Before the Screen OS software image can be loaded, configure the manage interface though which the images can be downloaded from the FTP server to the security appliances. The following commands will configure the zone and IP address for the manage interface.set interface interface-name zone trustset interface interface-name ip ip-addressNote: Interface-name should the name of the actual interface connected to the PC serving as FTP firewall; through this interface, the security appliances can communicate with the FTP firewall. For the 5-series devices, interface trust – bound to the security zone trust by default – can be used. For devices Juniper NetScreen-204 and 208, you can use interface ethernet1. For Juniper NetScreen-500, interface ethernet1/1in the security zone trust can be in place of interface-name. On high-level security, appliances including Juniper NetScreen-ISG2000 and ISG1000 interface can use ethernet1/1. Juniper NetScreen-5200 and NetScreen 5400 can use Interface ethernet2/1.The ip-address should be a valid IP address, which can be in the same or different subnet with the TFTP firewall.Once configured, use the following commands to download the Screen OS image from the FTP firewall to the security appliance:save software from tftp tftp-firewall-ip Screen OS-image to flashwhere, tftp-firewall-ip is IP address for PC serving as the TFTP firewall where the Screen OS software images reside and, Screen OS-image is relative path to the Screen OS software image file and the name of the file itself.For example, if the Screen OS image for the device Juniper NetScreen-5GT is "ns5gt.5.4.0r4.0" and resides on FTP firewall (with IP address 10.155.95.253), under the directory /tftpboot/screen OS-image/5.4/, the command should be as the following:save software from tftp 10.155.95.253 /tftpboot/screen OS-image/5.4/ns5gt.5.4.0r4.0 to flashThe downloading process will take a few minutes. After the downloading process is completed, the security appliance will return to the CLI prompt and requires a reboot. Issue the command reset and provide answers for the questions below to completely load the image to the security appliance and restore the default manufacture configurations.resetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] yThe security appliance will return to the login prompt. At this time, the security appliance has been completely loaded with the proper Screen OS software version.Screen OS UpgradesUpdate the firewalls' Screen OS with the vendor recommended updates as part of quarterly.Device ConfigurationRestore default settingsRestore the firewall to the default manufacturing operation mode and configurations before putting the appliance in a different operation modes including Transparent Authenticated mode (a.k.a. Transparent VPN mode) or NAT/Route Authenticated mode (a.k.a. NAT/Route VPN mode) or before performing any configurations for any specific testing.Use the commands unset all and reset along with the following answers to restored the default operation mode and configurations for the appliance.unset allErase all system config, are you sure y/ [n]? YresetConfiguration modified, save? [y]/n nSystem reset, are you sure? y/[n] ySet accurate date and timeEnable the following command to ensure that the date and time stamps used on audit messages are accurate:set clock mm/dd/yyyy hh:mmSetting the Operation ModeTo determine which operation mode the juniper firewall is, use the following command.get system"System in NAT/Route mode" indicates it is operating in NAT/Route mode"System in transparent mode" indicates it is operating in transparent mode.All security appliances are, by default, configured in NAT/Route mode without VPN.To ensure that a security appliance is in a mode compliant with the Common Criteria EAL4 evaluated configuration, follow one of the following three sets of steps depending on the desired configuration:Unauthenticated NAT/Route ModeAuthenticated NAT/Route ModeRoute-Based VPNPolicy-Based VPNAuthenticated Transparent ModeAuthenticated NAT/Route ModeConfigure the firewall in authenticated NAT/Route Mode using either a Route-based VPN or Policy-based VPN. You can configure both Route-based VPN and Policy-based VPN in authenticated NAT/Route mode.Only Manual Key is supported in the Evaluated Configuration, i.e. AutoKey cannot be used. Take care in selecting Manual Key values such that they follow the same rules as administrative passwords. Distribute the manual keys using a secure method to ensure that they are not publicly accessible.Route-Based VPNConfigure the respective security appliance with a Route-based VPN in authenticated NAT/Route mode.Policy-Based VPNConfigure the respective security appliance with a Policy-based VPN in authenticated NAT/Route mode.Firewall Naming ConventionBranch Firewalls: (Naming convention not set)Data Center Firewalls: (Naming convention not set)Configuring Screen OptionsSecurity appliances must prevent all types of Denial of Service (DoS) and attack signatures on every security zone to prevent these types of attacks from occurring on the network.To view the default screening options for a particular security zone, issue the following command.get zone zone-name screenBy default, the screening options enabled for the Untrust/V1-Untrust security zone (and the interfaces in Untrust/V1-Untrust zone) in Screen OS 5.0:Tear-drop Attack Protection onSYN Flood Protection (200) onAlarm Threshold: alarm-thresholdQueue Size: Q-sizeTimeout Value: 20Source Threshold: src-thresholdDestination Threshold: dst-thresholdDrop unknown MAC (transparent mode only): offPing-of-Death Protection onSource Route IP Option Filter onLand Attack Protection onAlarm-threshold, Q-size, src-threshold, and dst-threshold are platform dependent as specified in the table below.For the Trust/V1-Trust and DMZ/V1-DMZ zones (and the interfaces in Trust and DMZ zone), no screen options are enabled by default.Screen function only generate alarm without dropping packet: OFFTo disable all the default screening option for zone Untrust/V1-Untrust, the following commands are used:unset zone untrust screen tear-dropunset zone untrust screen syn-floodunset zone untrust screen ping-deathunset zone untrust screen ip-filter-srcunset zone untrust screen landThe following displays when the security zone has no screening options enabled:"Screen function only generate alarm without dropping packet: OFF"The following CLI command enables all screens on a per-zone basis (and is applied to all interfaces within that zone):set zone zone-name screen block-fragset zone zone-name screen component-blockset zone zone-name screen fin-no-ackset zone zone-name screen icmp-floodset zone zone-name screen icmp-fragmentset zone zone-name screen icmp-largeset zone zone-name screen ip-bad-optionset zone zone-name screen ip-filter-src
However, for some setups, this minimum requirement and some features of these standards may not be practical for implementation. For exceptions, the system administrators must document the reasons for not complying fully with these standards and request an exemption from the Security department. Firewall administrators bear the primary responsibility of implementing these standards. During their reviews and inspections, auditors must use this document to verify standards compliance. Business managers can read the rationale behind each of the points in the standards to gain an understanding of the importance of applying it to their environments. The Juniper Firewall administrators must use these standards to build the installation and operational procedures. This section gives a very brief overview of various aspects of Juniper Firewall security. The hardening details for each aspect are present in the subsequent sections of the document. The Juniper Firewall operating security environment consists of various aspects: Device & ScreenOS initial setup Device Configuration Device Management User management Services System access System logging and monitoring Policy logging and monitoring The security of a Juniper firewall Screen OS starts with a secure setup. The factors that influence this include using the correct Screen OS version. The outside packaging cannot show damage, or evidence that unauthorized persons have opened it. If the cardboard shows damage that would allow the device to be unpacked or exchanged, this may be evidence of tampering. Each packed box arrives with custom tape to indicate that Juniper or an authorized manufacturer packaged the device. The tape is unique; with the word, "Juniper" printed repeatedly throughout the tape. If the tape is not present, this may be evidence of tampering. The internal packaging cannot show damage or evidence of tampering. The plastic bag should not have a large hole and the label that seals the plastic bag should not be detached or missing. Any damage to the bag or the seal may be evidence of tampering. To verify that the product received is the correct version of hardware and software, run the following command from the CLI: get system The output of this command includes two key items, hardware version and software version. The hardware and software versions must match the common criteria security target to be in full compliance with the common criteria evaluated configuration. The firewalls come with pre-installed Screen OS software. However, the Screen OS software versions installed on the devices might vary depending on the manufacturing time of the security appliances. The correct Screen OS software image needs to be loaded on to the security appliance. Before the Screen OS software image can be loaded, configure the manage interface though which the images can be downloaded from the FTP server to the security appliances. The following commands will configure the zone and IP address for the manage interface. set interface interface-name zone trust set interface interface-name ip ip-address Note: Interface-name should the name of the actual interface connected to the PC serving as FTP firewall; through this interface, the security appliances can communicate with the FTP firewall. For the 5-series devices, interface trust – bound to the security zone trust by default – can be used. For devices Juniper NetScreen-204 and 208, you can use interface ethernet1. For Juniper NetScreen-500, interface ethernet1/1in the security zone trust can be in place of interface-name. On high-level security, appliances including Juniper NetScreen-ISG2000 and ISG1000 interface can use ethernet1/1. Juniper NetScreen-5200 and NetScreen 5400 can use Interface ethernet2/1. The ip-address should be a valid IP address, which can be in the same or different subnet with the TFTP firewall. Once configured, use the following commands to download the Screen OS image from the FTP firewall to the security appliance: save software from tftp tftp-firewall-ip Screen OS-image to flash where, tftp-firewall-ip is IP address for PC serving as the TFTP firewall where the Screen OS software images reside and, Screen OS-image is relative path to the Screen OS software image file and the name of the file itself. For example, if the Screen OS image for the device Juniper NetScreen-5GT is "ns5gt.5.4.0r4.0" and resides on FTP firewall (with IP address 10.155.95.253), under the directory /tftpboot/screen OS-image/5.4/, the command should be as the following: save software from tftp 10.155.95.253 /tftpboot/screen OS-image/5.4/ns5gt.5.4.0r4.0 to flash The downloading process will take a few minutes. After the downloading process is completed, the security appliance will return to the CLI prompt and requires a reboot. Issue the command reset and provide answers for the questions below to completely load the image to the security appliance and restore the default manufacture configurations. reset Configuration modified, save? [y]/n n System reset, are you sure? y/[n] y The security appliance will return to the login prompt. At this time, the security appliance has been completely loaded with the proper Screen OS software version. Update the firewalls' Screen OS with the vendor recommended updates as part of quarterly. Restore default settings Restore the firewall to the default manufacturing operation mode and configurations before putting the appliance in a different operation modes including Transparent Authenticated mode (a.k.a. Transparent VPN mode) or NAT/Route Authenticated mode (a.k.a. NAT/Route VPN mode) or before performing any configurations for any specific testing. Use the commands unset all and reset along with the following answers to restored the default operation mode and configurations for the appliance. unset all Erase all system config, are you sure y/ [n]? Y reset Configuration modified, save? [y]/n n System reset, are you sure? y/[n] y Set accurate date and time Enable the following command to ensure that the date and time stamps used on audit messages are accurate: set clock mm/dd/yyyy hh:mm Setting the Operation Mode To determine which operation mode the juniper firewall is, use the following command. get system "System in NAT/Route mode" indicates it is operating in NAT/Route mode "System in transparent mode" indicates it is operating in transparent mode. All security appliances are, by default, configured in NAT/Route mode without VPN. To ensure that a security appliance is in a mode compliant with the Common Criteria EAL4 evaluated configuration, follow one of the following three sets of steps depending on the desired configuration: Unauthenticated NAT/Route Mode Authenticated NAT/Route Mode Route-Based VPN Policy-Based VPN Authenticated Transparent Mode Authenticated NAT/Route Mode Configure the firewall in authenticated NAT/Route Mode using either a Route-based VPN or Policy-based VPN. You can configure both Route-based VPN and Policy-based VPN in authenticated NAT/Route mode. Only Manual Key is supported in the Evaluated Configuration, i.e. AutoKey cannot be used. Take care in selecting Manual Key values such that they follow the same rules as administrative passwords. Distribute the manual keys using a secure method to ensure that they are not publicly accessible. Route-Based VPN Configure the respective security appliance with a Route-based VPN in authenticated NAT/Route mode. Policy-Based VPN Configure the respective security appliance with a Policy-based VPN in authenticated NAT/Route mode. Branch Firewalls: (Naming convention not set) Data Center Firewalls: (Naming convention not set) Configuring Screen Options Security appliances must prevent all types of Denial of Service (DoS) and attack signatures on every security zone to prevent these types of attacks from occurring on the network. To view the default screening options for a particular security zone, issue the following command. get zone zone-name screen By default, the screening options enabled for the Untrust/V1-Untrust security zone (and the interfaces in Untrust/V1-Untrust zone) in Screen OS 5.0: Tear-drop Attack Protection on SYN Flood Protection (200) on Alarm Threshold: alarm-threshold Queue Size: Q-size Timeout Value: 20 Source Threshold: src-threshold Destination Threshold: dst-threshold Drop unknown MAC (transparent mode only): off Ping-of-Death Protection on Source Route IP Option Filter on Land Attack Protection on Alarm-threshold, Q-size, src-threshold, and dst-threshold are platform dependent as specified in the table below. For the Trust/V1-Trust and DMZ/V1-DMZ zones (and the interfaces in Trust and DMZ zone), no screen options are enabled by default. Screen function only generate alarm without dropping packet: OFF To disable all the default screening option for zone Untrust/V1-Untrust, the following commands are used: unset zone untrust screen tear-drop unset zone untrust screen syn-flood unset zone untrust screen ping-death unset zone untrust screen ip-filter-src unset zone untrust screen land The following displays when the security zone has no screening options enabled: "Screen function only generate alarm without dropping packet: OFF" The following CLI command enables all screens on a per-zone basis (and is applied to all interfaces within that zone): set zone zone-name screen block-frag set zone zone-name screen component-block set zone zone-name screen fin-no-ack set zone zone-name screen icmp-flood set zone zone-name screen icmp-fragment set zone zone-name screen icmp-large set zone zone-name screen ip-bad-option set zone zone-name screen ip-filter-srcAudience
Implementation
Juniper Firewall Security Overview
Device and ScreenOS Setup
Properly Identify Device for Physical Tampering
Verify correct version of hardware and software
Upgrading a Juniper Firewall
Screen OS Upgrades
Device Configuration
Firewall Naming Convention