Overview ................................................................................................................................................. 4
Validation Level ....................................................................................................................................... 5
Roles and Services ................................................................................................................................. 5
Authentication ......................................................................................................................................... 6
Strength of Authentication ............................................................................................................... 6
Interfaces ................................................................................................................................................ 7
Operation In FIPS Mode ......................................................................................................................... 8
Initial configuration .............................................................................................................................. 8
Connecting to the device ................................................................................................................. 8
Enabling FIPS mode ........................................................................................................................... 9
Security rules ..................................................................................................................................... 10
Self tests ........................................................................................................................................ 10
FIPS Approved Algorithms ................................................................................................................ 11
Zeroization ......................................................................................................................................... 12
Physical Security Policy ........................................................................................................................ 13
Public Key Definitions ........................................................................................................................ 16
Definitions List ...................................................................................................................................... 20
Juniper Networks SSG 5 and SSG 20 Security Policy
TABLE OF CONTENTS
3