Juniper Networks SSG 520M and SSG 550M Security Policy
TABLE OF CONTENTS
Overview ................................................................................................................................................. 4
Validation Level ....................................................................................................................................... 5
Roles and Services ................................................................................................................................. 5
Authentication ......................................................................................................................................... 6
Strength of Authentication ............................................................................................................... 6
Interfaces ................................................................................................................................................ 7
Operation In FIPS Mode ......................................................................................................................... 8
Initial configuration .............................................................................................................................. 8
Connecting to the device ................................................................................................................. 8
Loading and authenticating firmware ............................................................................................... 8
Enabling FIPS mode ........................................................................................................................... 9
Determining the current mode ............................................................................................................ 9
Operating restrictions in FIPS mode ................................................................................................... 9
Security rules ....................................................................................................................................... 9
Self tests ........................................................................................................................................ 10
FIPS Approved Algorithms ................................................................................................................ 11
Non-FIPS Approved Algorithms ........................................................................................................ 11
Zeroization ......................................................................................................................................... 12
Physical Security Policy ........................................................................................................................ 13
Cryptographic Algorithm Validation ....................................................................................................... 17
Critical Security Parameter (CSP) Definitions ...................................................................................... 18
Public Key Definitions ........................................................................................................................ 18
Matrix Creation of Critical Security Parameter (CSP) versus the Services (Roles & Identity) .......... 18
Mitigation of Other Attacks Policy ......................................................................................................... 21
Definitions List ...................................................................................................................................... 22