EasyManua.ls Logo

Juniper SSG-350M-SH - Table of Contents

Juniper SSG-350M-SH
22 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Juniper Networks SSG 320M and 350M Security Policy
3
TABLE OF CONTENTS
Overview ................................................................................................................................................. 4
Validation Level ....................................................................................................................................... 5
Roles and Services ................................................................................................................................. 5
Authentication ......................................................................................................................................... 6
Strength of Authentication ............................................................................................................... 6
Interfaces ................................................................................................................................................ 7
Operation In FIPS Mode ......................................................................................................................... 8
Initial configuration .............................................................................................................................. 8
Connecting to the device ................................................................................................................. 8
Loading and authenticating firmware ............................................................................................... 8
Enabling FIPS mode ........................................................................................................................... 9
Determining the current mode ............................................................................................................ 9
Operating restrictions in FIPS mode ................................................................................................... 9
Security rules ..................................................................................................................................... 10
Self tests ........................................................................................................................................ 10
FIPS Approved Algorithms ................................................................................................................ 11
Non-FIPS Approved Algorithms ........................................................................................................ 11
Zeroization ......................................................................................................................................... 12
Physical Security Policy ........................................................................................................................ 13
Critical Security Parameter (CSP) Definitions ...................................................................................... 15
Public Key Definitions ........................................................................................................................ 15
Matrix Creation of Critical Security Parameter (CSP) versus the Services (Roles & Identity) .......... 15
Mitigation of Other Attacks Policy ......................................................................................................... 18
Definitions List ...................................................................................................................................... 19

Related product manuals