The Juniper SRX Services Gateway VPN Internet Key Exchange (IKE) must be configured to use an approved Commercial Solution for Classified (CSfC) when transporting classified traffic across an unclassified network.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
highV-214690SRG-NET-000352JUSX-VN-000023SV-214690r1056094_rule2024-12-203
Description
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The National Security Agency/Central Security Service's (NSA/CSS) CSfC Program enables commercial products to be used in layered solutions to protect classified National Security Systems (NSS) data. Currently, Suite B cryptographic algorithms are specified by NIST and are used by NSA's Information Assurance Directorate in solutions approved for protecting classified and unclassified NSS. However, quantum resistant algorithms will be required for future required Suite B implementations.
ℹ️ Check
If the device is not used to transport classified traffic across an unclassified network, this is not applicable. [edit] show security ike <suiteb-proposal-name> View the configured options. If the IKE proposal encryption algorithms are not configured in compliance with CSfC, this is a finding.
✔️ Fix
Navigate to the IKE proposal stanza. Example stanza. [edit] set security ike proposal <name-proposal> set ike proposal <name-proposal> authentication-method ecdsa-signatures-384 set ike proposal <name-proposal> dh-group group20 set ike proposal <name-proposal> authentication-algorithm sha-384 set ike proposal <name-proposal> encryption-algorithm aes-256-cbc