- play_arrow Junos OS in FIPS Mode of Operation for SRX Series Security Devices
- Understanding Junos OS in FIPS Mode of Operation
- Identifying Secure Delivery
- Understanding FIPS Mode of Operation Terminology and Supported Cryptographic Algorithms
- Understanding Zeroization to Clear System Data for FIPS Mode of Operation
- Understanding FIPS Self-Tests
- Applying Tamper-Evident Seals to the Cryptographic Module
- play_arrow Configuring SSH and Console Connection
- play_arrow Configuring Junos OS in FIPS Mode of Operation
- play_arrow Junos-FIPS Configuration Restrictions
Understanding Services for Junos OS in FIPS Mode of Operation
All services implemented by the module are listed in the tables that follow.
Understanding Authenticated Services
Authenticated Services | Description | Cryptographic Officer | User (read-only) | User (network) |
---|---|---|---|---|
Configure security | Security relevant configuration | x | – | – |
Configure | Non-security relevant configuration | x | – | – |
Secure traffic | IPsec protected routing | – | – | x |
Status | Display the status | x | x | – |
Zeroize | Destroy all critical security parameters (CSPs) | x | – | – |
SSH connect | Initiate SSH connection for SSH monitoring and control (CLI) | x | x | – |
IPsec connect | Initiate IPsec connection (IKE) | x | – | x |
Console access | Console monitoring and control (CLI) | x | x | – |
Remote reset | Software-initiated reset | x | – | – |
#understanding-services-for-junos-os-in-fips-mode-of-operation__csps-table2 lists the authenticated services on the device running Junos OS.
Service | Description |
---|---|
Local reset | Hardware reset or power cycle |
Traffic | Traffic requiring no cryptographic services |
Critical Security Parameters
Critical security parameters (CSPs) are security-related information such as cryptographic keys and passwords that can compromise the security of the cryptographic module or the security of the information protected by the module if they are disclosed or modified.
Zeroization of the system erases all traces of CSPs in preparation for operating the device as a cryptographic module.
#understanding-services-for-junos-os-in-fips-mode-of-operation__aunthenticated-services lists the CSP access rights within services.
Service | CSPs | |||||
---|---|---|---|---|---|---|
DRBG_Seed | DRBG_State | SSH PHK | SSH DH | SSH-SEK | ESP-SEK | |
Configure security | – | E | G, W | – | – | – |
Configure | – | – | – | – | – | – |
Secure Traffic | – | – | – | – | – | E |
Status | – | – | – | – | – | – |
Zeroize | Z | Z | Z | Z | Z | Z |
SSH connect | – | E | E | G, E | G, E | – |
IPSec connect | – | E | – | – | – | G |
Console access | – | – | – | – | – | – |
Remote reset | G, E | G | – | Z | Z | Z |
Local Reset | G, E | G | – | Z | Z | Z |
Traffic | – | – | – | – | – | – |
Service | CSPs | ||||
---|---|---|---|---|---|
IKE-PSK | IKE-Priv | IKE-SKEYI | IKE-SKE | IKE-DH-PRI | |
Configure security | W | G, W | – | – | – |
Configure | – | – | – | – | – |
Secure Traffic | – | – | – | E | – |
Status | – | – | – | – | – |
Zeroize | Z | Z | – | – | – |
SSH connect | – | – | – | – | – |
IPSec connect | E | E | G | G | G |
Console access | – | – | – | – | – |
Remote reset | – | – | Z | Z | Z |
Local Reset | – | – | Z | Z | Z |
Traffic | – | – | – | – | – |
Here:
G = Generate: The device generates the CSP.
E = Execute: The device runs using the CSP.
W = Write: The CSP is updated or written to the device.
Z = Zeroize: The device zeroizes the CSP.