- play_arrow Overview
- play_arrow Configure Roles and Authentication Methods
- Overview of Roles and Services for Junos OS
- Overview of the Operational Environment for Junos OS in FIPS Mode
- Overview of Password Specifications and Guidelines for Junos OS in FIPS Mode
- Download Software Packages from Juniper Networks
- Install Software on the Device with Single Routing Engine
- Overview of Zeroization to Clear System Data for FIPS Mode
- Zeroize the System
- Enable FIPS Mode
- Configure Security Administrator and FIPS User Identification and Access
- play_arrow Configure Administrative Credentials and Privileges
- play_arrow Configure SSH and Console Connection
- play_arrow Configure the Remote Syslog Server
- play_arrow Configure Audit Log Options
- play_arrow Configure MACsec
- play_arrow Perform Self-Tests on a Device
- play_arrow Operational Commands
Event Logging Overview
The evaluated configuration requires the auditing of configuration changes through the system log.
In addition, Junos OS can:
Send automated responses to audit events (syslog entry creation).
Allow authorized managers to examine audit logs.
Send audit files to external servers.
Allow authorized managers to return the system to a known state.
The logging for the evaluated configuration must capture the following events:
Changes to secret key data in the configuration.
Committed changes.
Login/logout of users.
System startup.
Failure to establish an SSH session.
Establishment/termination of an SSH session.
Changes to the (system) time.
Termination of a remote session by the session locking mechanism.
Termination of an interactive session.
In addition, Juniper Networks recommends that logging also:
Capture all changes to the configuration.
Store logging information remotely.