[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Common Criteria Overview
Common Criteria (ISO/IEC 15408) is a “cookbook”
that allows for considerable latitude in meeting specific functional
requirements. A secure JUNOS software environment targets several
areas of concern to deliver Evaluation Assurance Level 3 (EAL3)
security to users. These areas include:
- SHA-2 support—A secure JUNOS software environment
supports the SHA-2 family of
cryptographic algorithms internally.
- Routing correctness—A secure JUNOS software environment
supports all routing protocols required by Common Criteria EAL3.
- Manager identification and authentication—Only system
managers (superusers) can change the authentication data for locally
authenticated users in a secure JUNOS software environment.
- Configuration change accounting—Configuration changes
in a secure JUNOS software environment are audited through syslog
or RADIUS/TACACS+.
- Management traffic separation—A secure JUNOS software
environment treats managers and the information they require differently
from user traffic.
- CAVS—Cryptographic Algorithm Validation System.
Used as part of FIPS certification.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]