Juniper Networks SSG 320M and 350M Security Policy
TABLE OF CONTENTS
Overview ................................................................................................................................................. 4
Validation Level ....................................................................................................................................... 5
Roles and Services ................................................................................................................................. 5
Authentication ......................................................................................................................................... 6
Strength of Authentication ............................................................................................................... 6
Interfaces ................................................................................................................................................ 7
Operation In FIPS Mode ......................................................................................................................... 8
Initial configuration .............................................................................................................................. 8
Connecting to the device ................................................................................................................. 8
Loading and authenticating firmware ............................................................................................... 8
Enabling FIPS mode ........................................................................................................................... 9
Determining the current mode ............................................................................................................ 9
Operating restrictions in FIPS mode ................................................................................................... 9
Security rules ..................................................................................................................................... 10
Self tests ........................................................................................................................................ 10
FIPS Approved Algorithms ................................................................................................................ 11
Non-FIPS Approved Algorithms ........................................................................................................ 11
Zeroization ......................................................................................................................................... 12
Physical Security Policy ........................................................................................................................ 13
Critical Security Parameter (CSP) Definitions ...................................................................................... 15
Public Key Definitions ........................................................................................................................ 15
Matrix Creation of Critical Security Parameter (CSP) versus the Services (Roles & Identity) .......... 15
Mitigation of Other Attacks Policy ......................................................................................................... 18
Definitions List ...................................................................................................................................... 19