- play_arrow Overview
- Understanding the Common Criteria Evaluated Configuration
- Understanding Junos OS in FIPS Mode of Operation
- Understanding FIPS Mode of Operation Terminology and Supported Cryptographic Algorithms
- Configuring the Time and Date
- Configuring the User Session Idle Timeout
- Understanding Management Interfaces
- play_arrow Configuring Administrative Credentials and Privileges
- play_arrow Configuring Network Time Protocol
- play_arrow Configuring Roles and Authentication Methods
- Understanding Roles and Services for Junos OS in FIPS Mode of Operation
- Understanding Services for Junos OS in FIPS Mode of Operation
- Downloading Software Packages from Juniper Networks (FIPS Mode)
- Installing Junos Software Packages
- Understanding Zeroization to Clear System Data for FIPS Mode of Operation
- How to Enable and Configure Junos OS in FIPS Mode of Operation
- play_arrow Configuring SSH and Console Connection
- play_arrow Configuring the Remote Syslog Server
- play_arrow Configuring Audit Log Options
- play_arrow Configuring Event Logging
- play_arrow Configuring VPNs
- play_arrow Configuring Security Flow Policies
- play_arrow Configuring Network Attacks
- Configuring IP Teardrop Attack Screen
- Configuring TCP Land Attack Screen
- Configuring ICMP Fragment Screen
- Configuring Ping-Of-Death Attack Screen
- Configuring tcp-no-flag Attack Screen
- Configuring TCP SYN-FIN Attack Screen
- Configuring TCP fin-no-ack Attack Screen
- Configuring UDP Bomb Attack Screen
- Configuring UDP CHARGEN DoS Attack Screen
- Configuring TCP SYN and RST Attack Screen
- Configuring ICMP Flood Attack Screen
- Configuring TCP SYN Flood Attack Screen
- Configuring TCP Port Scan Attack Screen
- Configuring UDP Port Scan Attack Screen
- Configuring IP Sweep Attack Screen
- play_arrow Configuring the IDP Extended Package
- play_arrow Configuring Cluster Mode
- play_arrow Performing Self-Tests on a Device
- play_arrow Configuration Statements
- checksum-validate
- code
- data-length
- destination-option
- extension-header
- header-type
- home-address
- identification
- icmpv6 (Security IDP Custom Attack)
- ihl (Security IDP Custom Attack)
- option-type
- reserved (Security IDP Custom Attack)
- routing-header
- sequence-number (Security IDP ICMPv6 Headers)
- type (Security IDP ICMPv6 Headers)
- play_arrow Junos-FIPS Configuration Restrictions
Configuring Default Deny-All and Reject Rules
By default, security devices running Junos OS deny traffic unless rules are explicitly created to allow it using the following command:
[edit] user@host#set security policies default-policy deny-all
You can configure your security devices running Junos OS to enforce the following default reject rules with logging on all network traffic:
Invalid fragments
Fragmented IP packets that cannot be reassembled completely
Where the source address is equal to the address of the network interface
Where the source address does not belong to the networks associated with the network interface
Where the source address is defined as being on a broadcast network
Where the source address is defined as being on a multicast network
Where the source address is defined as being a loopback address
Where the source address is a multicast packet
Where the source or destination address is a link-local address
Where the source or destination address is defined as being an address “reserved for future use” as specified in RFC 5735 for IPv4
Where the source or destination address is defined as an “unspecified address” or an address “reserved for future definition and use” as specified in RFC 3513 for IPv6
With the IP option Loose Source Routing, Strict Source Routing, or Record Route is specified