Juniper Networks SSG 520M and SSG 550M Security Policy          
TABLE OF CONTENTS 
 
Overview ................................................................................................................................................. 4 
Validation Level ....................................................................................................................................... 5 
Roles and Services ................................................................................................................................. 5 
Authentication ......................................................................................................................................... 6 
Strength of Authentication ............................................................................................................... 6 
Interfaces ................................................................................................................................................ 7 
Operation In FIPS Mode ......................................................................................................................... 8 
Initial configuration .............................................................................................................................. 8 
Connecting to the device ................................................................................................................. 8 
Loading and authenticating firmware ............................................................................................... 8 
Enabling FIPS mode ........................................................................................................................... 9 
Determining the current mode ............................................................................................................ 9 
Operating restrictions in FIPS mode ................................................................................................... 9 
Security rules ....................................................................................................................................... 9 
Self tests ........................................................................................................................................ 10 
FIPS Approved Algorithms ................................................................................................................ 11 
Non-FIPS Approved Algorithms ........................................................................................................ 11 
Zeroization ......................................................................................................................................... 12 
Physical Security Policy ........................................................................................................................ 13 
Cryptographic Algorithm Validation ....................................................................................................... 17 
Critical Security Parameter (CSP) Definitions ...................................................................................... 18 
Public Key Definitions ........................................................................................................................ 18 
Matrix Creation of Critical Security Parameter (CSP) versus the Services (Roles & Identity) .......... 18 
Mitigation of Other Attacks Policy ......................................................................................................... 21 
Definitions List ...................................................................................................................................... 22