EasyManua.ls Logo

Juniper SSG 5 - User Manual

Juniper SSG 5
21 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
FIPS 140-2 SECURITY POLICY
Juniper Networks, Inc.
SSG 5 and SSG 20
HW P/N SSG-5 and SSG-20, FW Version ScreenOS 6.3.0r6
Question and Answer IconNeed help?

Do you have a question about the Juniper SSG 5 and is the answer not in the manual?

Juniper SSG 5 Specifications

General IconGeneral
BrandJuniper
ModelSSG 5
CategoryServer
LanguageEnglish

Summary

Overview of Juniper SSG 520 Security Policy

Validation Level

Lists the validation level for each FIPS 140-2 area.

Roles and Services

Supported Roles

Describes the three distinct roles: Crypto-Officer, User, and Read-Only User.

Available Services

Details the services available to each role, such as Configure, Status, Zeroize.

Authentication Methods

Strength of Authentication

Details password complexity, case sensitivity, and login attempt restrictions.

Network Interfaces

Operation in FIPS Mode

Initial Configuration Steps

Explains initial setup via console port and default credentials.

Loading and Authenticating Firmware

Describes firmware loading, integrity checks, and DSA signature verification.

Enabling FIPS Mode

Determining Current Mode

Operating Restrictions in FIPS Mode

Security Rules Enforcement

Self-Tests Performed

FIPS Approved Cryptographic Algorithms

Non-FIPS Approved Algorithms

Zeroization Procedure

Physical Security Policy

Inspection and Testing of Physical Security Mechanisms

Details the physical security mechanisms and their inspection/testing guidance.

Cryptographic Algorithm Validation Certificates

Critical Security Parameter (CSP) Definitions

Public Key Definitions

CSP Matrix: Services, Roles, and Identity

Mitigation of Other Attacks Policy

Definitions List

Related product manuals