Table Of Contents - Juniper SSG 5 Manual

Hide thumbs Also See for SSG 5:
Table of Contents

Advertisement

Overview ................................................................................................................................................. 4
Validation Level ....................................................................................................................................... 5
Roles and Services ................................................................................................................................. 5
Authentication ......................................................................................................................................... 6
Strength of Authentication ............................................................................................................... 6
Interfaces ................................................................................................................................................ 7
Operation In FIPS Mode ......................................................................................................................... 8
Initial configuration .............................................................................................................................. 8
Connecting to the device ................................................................................................................. 8
Loading and authenticating firmware ............................................................................................... 9
Enabling FIPS mode ........................................................................................................................... 9
Determining the current mode ............................................................................................................ 9
Operating restrictions in FIPS mode ................................................................................................... 9
Security rules ..................................................................................................................................... 10
Self tests ........................................................................................................................................ 10
FIPS Approved Algorithms ................................................................................................................ 11
Non-FIPS Approved Algorithms ........................................................................................................ 12
Zeroization ......................................................................................................................................... 12
Physical Security Policy ........................................................................................................................ 13
Critical Security Parameter (CSP) Definitions ...................................................................................... 16
Public Key Definitions ........................................................................................................................ 16
Mitigation of Other Attacks Policy ......................................................................................................... 19
Definitions List ...................................................................................................................................... 20
Juniper Networks SSG 5 and SSG 20 Security Policy

TABLE OF CONTENTS

3

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ssg 20

Table of Contents