Understanding Junos OS in FIPS Mode
Federal Information Processing Standards (FIPS) 140-2 defines security levels for hardware and software that perform cryptographic functions. By meeting the applicable overall requirements within the FIPS standard, the Juniper Networks RE-S-X6-64G, and REMX2K-X8-64G Routing Engines on Juniper Networks MX Series 3D Universal Edge Routers or EX9200-RE and EX9200-RE2 Routing Engines on EX Series Ethernet Switches running the Juniper Networks Junos operating system (Junos OS) in FIPS mode comply with the FIPS 140-2 Level 1 standard.
Operating MX Series routers or EX Series Ethernet Switches in a FIPS 140-2 Level 1 environment requires enabling and configuring FIPS mode on the routers or switches from the Junos OS command-line interface (CLI).
The Crypto Officer enables FIPS mode in Junos OS Release 18.1R1 and sets up keys and passwords for the system and other FIPS users.
About the Cryptographic Boundary on Your Router or Switch
FIPS 140-2 compliance requires a defined cryptographic boundary around each cryptographic module on a router or switch. Junos OS in FIPS mode prevents the cryptographic module from executing any software that is not part of the FIPS-certified distribution, and allows only FIPS-approved cryptographic algorithms to be used. No critical security parameters (CSPs), such as passwords and keys, can cross the cryptographic boundary of the module in unencrypted form.
Virtual Chassis features are not supported in FIPS mode. Do not configure a Virtual Chassis in FIPS mode.
How FIPS Mode Differs from Non-FIPS Mode
Unlike Junos OS in non-FIPS mode, Junos OS in FIPS mode is a non-modifiable operational environment. In addition, Junos OS in FIPS mode differs in the following ways from Junos OS in non-FIPS mode:
Self-tests of all cryptographic algorithms are performed at startup.
Self-tests of random number and key generation are performed continuously.
Weak cryptographic algorithms such as Data Encryption Standard (DES) and MD5 are disabled.
Weak or unencrypted management connections must not be configured.
Passwords must be encrypted with strong one-way algorithms that do not permit decryption.
Administrator passwords must be at least 10 characters long.
Validated Version of Junos OS in FIPS Mode
To determine whether a Junos OS release is NIST-validated, see the compliance page on the Juniper Networks Web site (https://apps.juniper.net/compliance).
Supported Platforms and Hardwares
For the features described in this document, below hardware components are used for FIPS certification.
Routing Engine: RE-S-X6-64G on MX240, MX480, and MX960 devices:
RE-S-X6-64G Routing Engine Description
Routing Engine: REMX2K-X8-64G on MX2010, and MX2020 devices:
REMX2K-X8-64G Routing Engine Description
Routing Engine: EX9200-RE2 on EX9204, EX9208, and EX9214 devices:
Routing Engine Module in an EX9200 Switch
Crypto line card: MS-MPC on MX240, MX480, MX960, MX2010, and MX2020 devices:
Non-crypto line card: MIC-3D-20GE-SFP on MX240, MX480, MX960, MX2010, and MX2020 devices:
Gigabit Ethernet MIC with SFP