Do you have a question about the Juniper SSG 5 and is the answer not in the manual?
Lists the validation level for each FIPS 140-2 area.
Describes the three distinct roles: Crypto-Officer, User, and Read-Only User.
Details the services available to each role, such as Configure, Status, Zeroize.
Details password complexity, case sensitivity, and login attempt restrictions.
Explains initial setup via console port and default credentials.
Describes firmware loading, integrity checks, and DSA signature verification.
Details the physical security mechanisms and their inspection/testing guidance.