EasyManua.ls Logo

Juniper SSG 5 - Mitigation of Other Attacks Policy

Juniper SSG 5
21 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Juniper Networks SSG 5 and SSG 20 Security Policy
20
Table D: How Keys Are Generated
CSP Method of Generation
IPSEC HMAC SHA-1 Key May be either entered directly at the CLI
by the administrator, or generated
internally via ANSI X9.31 RNG as a result
of IKE protocol exchanges.
IPSEC ESP Key
IKE Pre-shared Key Entered directly at the CLI by
administrator
IKE Encryption Key Internally via ANSI X9.31 RNG, as a result
of IKE protocol exchanges
IKE HMAC SHA-1 Key
Password Entered directly at the CLI by
administrator
SSH Server/Host DSA Private Key Internally via ANSI X9.31 RNG when DSA
key-pair is generated.
SSH Encryption Key Internally via ANSI X9.31 RNG, as a result
of Diffie-Hellman key exchange during
SSH session establishment.
SSH HMAC SHA-1 Key
HA Key Entered directly at the CLI by
administrator
IKE RSA/DSA/ECDSA Private Key Internally via ANSI X9.31 RNG
Diffie Hellman Private Key
Components
PRNG Seed and Seed Key Initial generation via entropy gathered
from a variety of internal sources.
RADIUS Secret Key Entered directly at the CLI by
administrator
Mitigation of Other Attacks Policy
The module is not designed to mitigate against attacks which are outside of the scope of FIPS 140-2.

Related product manuals