Common Criteria—Common Criteria for information technology is an international
agreement signed by several countries that permits the evaluation
of security products against a common set of standards.
Security Administrator—For Common Criteria, user accounts in the TOE have the following
attributes: user identity (user name), authentication data (password),
and role (privilege). The Security Administrator is associated with
the defined login class “security-admin”, which has the
necessary permission set to permit the administrator to perform all
tasks necessary to manage the Junos OS.
NDcPP—Collaborative Protection Profile for Network Devices, version
2.1.
Cryptographic
module—The set of hardware, software, and firmware that implements
approved security functions (including cryptographic algorithms and
key generation) and is contained within the cryptographic boundary.
MX devices are certified at FIPS 140-2 Level 1.
FIPS—Federal Information Processing Standards. FIPS 140-2 specifies
requirements for security and cryptographic modules. Junos OS in FIPS
mode complies with FIPS 140-2 Level 1.
FIPS maintenance role—The role the security administrator assumes to perform physical
maintenance or logical maintenance services such as hardware or software
diagnostics. For FIPS 140-2 compliance, the security administrator
zeroizes the Routing Engine on entry to and exit from the FIPS maintenance
role to erase all plain-text secret and private keys and unprotected
CSPs.
NoteThe FIPS maintenance role is not supported on Junos OS in FIPS
mode.
SSH—A protocol that uses strong authentication and encryption for
remote access across a nonsecure network. SSH provides remote login,
remote program execution, file copy, and other functions. It is intended
as a secure replacement for rlogin, rsh, and rcp in a UNIX environment. To secure the information sent over
administrative connections, use SSHv2 for CLI configuration. In Junos
OS, SSHv2 is enabled by default, and SSHv1, which is not considered
secure, is disabled.
Zeroization—Erasure of all CSPs and other user-created data on device before
its operation as a FIPS cryptographic module or in preparation for
repurposing the device for non-FIPS operation. The security administrator
can zeroize the system with a CLI operational command.