This part of the Secure JUNOS Configuration Guide provides configuration and operational information to help you perform the tasks associated with effectively configuring a network of Juniper Networks routers in a Federal Information Processing Standards (FIPS) 140-2 environment. The FIPS 140-2 environment is implemented as both hardware and software. Two major roles are defined:
Both user types can also perform normal router configuration tasks, such as configuring routing protocols and routing policies as individual user configuration allows.
![]() |
Note: Because this guide only covers JUNOS-FIPS configuration and operation, and is not related to the release of any specific products running the JUNOS software, refer to other JUNOS hardware and software manuals for non-JUNOS-FIPS configuration tasks. While JUNOS-FIPS configuration statements and commands are noted in other JUNOS hardware and software configuration guides, all details relating to JUNOS-FIPS operation are presented in the JUNOS-FIPS Configuration Guide. |
This guide is not intended as a troubleshooting guide. However, you can use it with a broader troubleshooting strategy to identify JUNOS-FIPS network problems.
This chapter discusses the following topics: