Cryptographic
module—The set of hardware, software, and firmware that implements
approved security functions (including cryptographic algorithms and
key generation) and is contained within the cryptographic boundary.
EX Series switches are certified at FIPS 140-2 Level 1.
For fixed-configuration switches, the cryptographic module is the
switch case. For modular switches, the cryptographic module is the
Routing Engine.
ESP—Encapsulating Security Payload (ESP) protocol. The part of the
IPsec protocol that guarantees the confidentiality of packets through
encryption. The protocol ensures that if an ESP packet is successfully
decrypted, and no other party knows the secret key the peers share,
the packet was not wiretapped in transit.
FIPS—Federal Information Processing Standards. FIPS 140-2 specifies
requirements for security and cryptographic modules. Junos OS in FIPS
mode complies with FIPS 140-2 Level 1.
FIPS maintenance role—The role the Crypto Officer assumes to perform physical maintenance
or logical maintenance services such as hardware or software diagnostics.
For FIPS 140-2 compliance, the Crypto Officer zeroizes the Routing
Engine on entry to and exit from the FIPS maintenance role to erase
all plain-text secret and private keys and unprotected CSPs.
NoteThe FIPS maintenance role is not supported on Junos OS in FIPS
mode.
Hashing—A message authentication method that applies a cryptographic
technique iteratively to a message of arbitrary length and produces
a hash “message digest” or “signature” of
fixed length that is appended to the message when sent.
IKE—The Internet Key Exchange (IKE) is part of IPsec and provides
ways to securely negotiate the shared private keys that the AH and
ESP portions of IPsec need to function properly. IKE employs Diffie-Hellman
key-exchange methods and is optional in IPsec. (The shared keys can
be entered manually at the endpoints.)
IPsec—The IP Security (IPsec) protocol. A standard way to add security
to Internet communications. IPsec security association (SA) is required
on the switch to enable internal communication between the Routing
Engine and PFE.
An IPsec SA is required for fixed-configuration switches running
Junos OS in FIPS mode because the Routing Engine communicates with
system processes through logical connections; therefore, the switch
requires an internal, manual IPsec SA to protect those logical communications
when the switch is running in FIPS mode. By default design, the switch
has some innate characteristics of a master switch in a Virtual Chassis, and this use of logical communications
is one such characteristic. In a multimember Virtual Chassis, the
master switch’s Routing Engine would send control messages to
the Routing Engines of the other member switches by using those built-in
logical communications. Do not configure a Virtual Chassis in FIPS
mode. Note, however, that the IPsec SA is required on your single
switch to protect the built-in logical connections.
NoteVirtual Chassis features are not supported in FIPS mode—they
have not been tested by Juniper Networks. Do not configure a Virtual
Chassis in FIPS mode.
SA—Security association (SA). A connection between hosts that allows
them to communicate securely by defining, for example, how they exchange
private keys. As Crypto Officer, you must manually configure an internal
SA on switches running Junos OS in FIPS mode. All values, including
the keys, must be statically specified in the configuration. On switches
with more than one Routing Engine, the configuration must match on
both ends of the connection between the Routing Engines. For communication
to take place, each Routing Engine must have the same configured options,
which need no negotiation and do not expire. .
SPI—Security parameter index (SPI). A numeric identifier used with
the destination address and security protocol in IPsec to identify
an SA. Because you manually configure the SA for Junos OS in FIPS
mode, the SPI must be entered as a parameter rather than derived randomly.
SSH—A protocol that uses strong authentication and encryption for
remote access across a nonsecure network. SSH provides remote login,
remote program execution, file copy, and other functions. It is intended
as a secure replacement for rlogin, rsh, and rcp in a UNIX environment. To secure the information sent over
administrative connections, use SSHv2 for CLI configuration. In Junos
OS, SSHv2 is enabled by default, and SSHv1, which is not considered
secure, is disabled.