Details
Limit clients to access SNMP.
Rationale:
Even when limited to read only access, SNMP can provide an attacker with a wealth of information about your router and network topology.
To limit the potential for attacks against your routers SNMP service your client lists should be configured to deny any source address which is not explicitly permitted (by being added to the list).
NOTE: SNMP does not appear to be configured on the target. This check is not applicable.
Solution
To configure a client list issue the following command under the [edit snmp client-list
[edit snmp client-list
[email protected]#set default restrict
Note – Client-lists may also be defined directly under the [edit snmp community
Default Value:
No SNMP communities are set by default on most platforms.
Supportive Information
The following resource is also helpful.
This security hardening control applies to the following category of controls within NIST 800-53: System and Communications Protection.This control applies to the following type of system Juniper.