EasyManuals Logo
Home>Juniper>Server>SSG-350M-SH

Juniper SSG-350M-SH User Manual

Juniper SSG-350M-SH
22 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #18 background imageLoading...
Page #18 background image
Juniper Networks SSG 320M and 350M Security Policy
18
Cryptographic Algorithm Validation
Cryptographic algorithm validation certificate numbers for are listed in the table below:
Table 7: Algorithm Validation Certificates
Algorithm
Certificate Number
TDES
1062
AES
1621
DSA
508
SHA
1430
RNG
869
RSA
799
HMAC
952
ECDSA
206
Critical Security Parameter (CSP) Definitions
Below is a list of Critical Security Parameter (CSP) definitions:
IPSEC HMAC SHA-1 Key: Used by IPsec for data integrity.
IPSEC ESP Key: Triple-DES, and AES for user traffic encryption.
IKE Pre-Shared Key: Used during the IKE protocol to establish cryptographic keys to be
used by IKE.
IKE Encryption Key: Triple-DES, and AES for peer-to-peer IKE message encryption.
IKE HMAC SHA-1 Key: Used by IKE for data integrity.
Password: Crypto-Officer and User passwords.
SSH Server/Host DSA Private Key: Used to create digital signatures.
SSH Encryption Key: Triple-DES encryption key to encrypt telnet commands.
SSH HMAC SHA-1 Key: Used by SSH for data integrity.
HA Key: AES Encryption key for HA data.
IKE RSA/DSA/ECDSA Private Key: RSA/DSA/ECDSA key used in IKE identity
authentication.
Diffie Hellman Private Key Components: Used during the DH key agreement protocol.
PRNG Seed and Seed Key: Used during the ANSI X9.31 generation of pseudo random
numbers.
RADIUS Secret Key: Used to authenticate exchanges with the RADIUS server
Public Key Definitions

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Juniper SSG-350M-SH and is the answer not in the manual?

Juniper SSG-350M-SH Specifications

General IconGeneral
BrandJuniper
ModelSSG-350M-SH
CategoryServer
LanguageEnglish

Related product manuals