Juniper NS-5400 Security Policy
13
•
Non-FIPS Approved:
MD5
DH (key agreement, key establishment methodology provides
80 bits of encryption strength)
RSA Encrypt/Decrypt (used for key wrapping only, key
establishment methodology provides 80 bits of encryption
strength)
•
The NetScreen-5400 conforms to FCC part 15, class A.
•
Upon the failure of any power-up self-test, the module enters and
stays in either the Algorithm Error State or Device specific error
state, depending on the self-test failure. The console displays error
messages and the status LED flashes red. It is the responsibility of
the Crypto-Officer to return the module to Juniper Networks for
further analysis.
•
Upon the failure of any conditional test, the module enters and stays
in a permanent error state, depending on the type of failure: Bypass
test failure, DH key agreement test failure, DSA pair-wise test failure,
or RSA pair-wise agreement test failure. The console displays error
messages and the status LED flashes red. It is the responsibility of
the Crypto-Officer to return the module to Juniper Networks for
further analysis.
•
On power down, previous authentications are erased from memory
and need to be re-authenticated again on power-up.
•
Bypass tests are performed at power-up, and as a conditional test.
Bypass state occurs when the administrator configures the box with
a non- VPN policy, and traffic matching this policy arrives at the
network port. The bypass-enabled status can be found by retrieving
the entire policy list. Two internal actions must exist in order for
bypass to happen: (1) a non- VPN policy is matched for this traffic,
and (2) a routing table entry exists for the traffic that matches this
non-VPN policy.
•
In FIPS mode, SSH can use 3DES only to encrypt/decrypt
commands. Also if the command from SSH is to set or get the AES
manual key, it will fail and a message will be logged.
•
A VPN with AES encryption is manual key or IKE.
•
HA traffic encryption is 256 bit AES.
•
If a VPN uses 3DES Encryption, the key exchange protocol IKE is
enforced to use group 5 only.
•
SHA-1 algorithm on GigaScreen II has the limitation that it cannot
hash more than 8K of data. Other ASIC chips have no such
limitation.
•
The module is not designed to mitigate against attacks which are
outside of the scope of FIPS 140-2.