EasyManua.ls Logo

Juniper SSG-350M-SH User Manual

Juniper SSG-350M-SH
22 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
FIPS 140-2 SECURITY POLICY
Juniper Networks, Inc.
SSG 320M and SSG 350M
HW P/N SSG-320M-SB, SSG-320M-SH, SSG-320M-SB-TAA, SSG-320M-SH-TAA, SSG-320M-SB-DC-N-TAA,
SSG-320M-SH-DC-N-TAA, SSG-350M-SB, SSG-350M-SH, SSG-350M-SB-TAA, SSG-350M-SH-TAA, SSG-
350M-SB-DC-N-TAA, SSG-350M-SH-DC-N-TAA , FW Version ScreenOS 6.3.0r6
Question and Answer IconNeed help?

Do you have a question about the Juniper SSG-350M-SH and is the answer not in the manual?

Juniper SSG-350M-SH Specifications

General IconGeneral
New Sessions Per Second5, 000
Expansion Slots2
Input Voltage100-240 VAC
Operating Temperature32°F to 104°F (0°C to 40°C)
Maximum Number of Users SupportedUnrestricted
Dimensions (HxWxD)1.75 x 17.5 x 16.5 in (4.4 x 44.5 x 41.9 cm)
Fixed I/O6 x 10/100/1000

Summary

Overview

Module Validation Level

Lists validation levels for FIPS 140-2 security requirement areas.

Roles and Services

User Roles

Defines Cryptographic Officer, User (Admin), and Read-Only User roles and their privileges.

Authentication

Strength of Authentication

Details password complexity requirements, case sensitivity, and login attempt handling.

Operation In FIPS Mode

Initial Configuration and Connection

Steps for initial setup via console or network ports, including default credentials and connection methods.

Security Rules

FIPS Approved Algorithms

Zeroization Procedures

Physical Security Policy

Cryptographic Algorithm Validation

Critical Security Parameter Definitions

Related product manuals