are registered trademarks of Juniper Networks, Inc. NetScreen-5GT, NetScreen-5XP, NetScreen-5XT, NetScreen-25,
NetScreen-50, NetScreen-100, NetScreen-204, NetScreen-208, NetScreen-500, NetScreen-5200, NetScreen-5400,
NetScreen-Global PRO, NetScreen-Global PRO Express, NetScreen-Remote Security Client, NetScreen-Remote VPN
Client, NetScreen-IDP 10, NetScreen-IDP 100, NetScreen-IDP 500, GigaScreen ASIC, GigaScreen-II ASIC, and
NetScreen ScreenOS are trademarks of Juniper Networks, Inc. All other trademarks and registered trademarks are the
property of their respective companies.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply
with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated in a commercial environment. The
equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the
instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own
expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates
and may radiate radio-frequency energy. If it is not installed in accordance with NetScreen’s installation instructions, it
may cause interference with radio and television reception. This equipment has been tested and found to comply with the
limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications
are designed to provide reasonable protection against such interference in a residential installation. However, there is no
guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the
equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Consult the dealer or an experienced radio/TV technician for help.
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN
THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS
REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT
YOUR NETSCREEN REPRESENTATIVE FOR A COPY.
Juniper NS-5400 Security Policy 2
Table of Contents
A. Scope of Document........................................................................................................ 4
B. Security Level ................................................................................................................ 5
C. Roles and Services ......................................................................................................... 5
D. Interfaces........................................................................................................................ 6
E. Setting FIPS mode.......................................................................................................... 8
F. Other Parameters ......................................................................................................... 10
G. FIPS Certificate Verification ....................................................................................... 14
H. Critical Security Parameter (CSP) Definitions ............................................................14
I. Public Key Definitions .................................................................................................. 14
J. Matrix Creation of Critical Security Parameter (CSP) versus the Services (Roles &
K. Definitions List ......................................................................................................... 17
Juniper NS-5400 Security Policy 3
A. Scope of Document
The Juniper Networks NetScreen-5400 is an internet security device that
integrates firewall, virtual private networking (VPN) and traffic shaping
functionalities. The model number is NetScreen-5400 and includes interface
options listed in Table 1.
Part Number Model Interface Option Power Supply
NS-5400-P00A-S00 NS-5400 2G24FE SPM AC
NS-5400-P00D-S00 NS-5400 2G24FE SPM DC
NS-5400-P01A-S00 NS-5400 8G SPM AC
NS-5400-P01D-S00 NS-5400 8G SPM DC
NS-5000-8G 8G SPM -CARD ONLY- N\A
NS-2G24FE 2G SPM -CARD ONLY- N\A
Table 1 – List of 5400 part numbers
Through the VPN, the NetScreen-5400 provides the following:
• IPSec standard security
• Data security using the Data Encryption Standard (DES), Triple-DES
and Advanced Encryption Standard (AES) algorithms
Note: DES – for legacy systems only; transitional phase only - valid until
May 19, 2007.
• Manual and automated IKE (ISAKMP)
• The use of RSA and DSA certificates
The NetScreen-5400 also provides an interface for users to configure or set
policies through the console or network ports.
The general components of the NetScreen-5400 include firmware and hardware.
The main hardware components consist of a main processor, memory, flash,
ASICs (GigaScreen version 2 and GigaScreen II), 10/100 Mbps ethernet
interface, GBIC network interface, console interface, backplane, redundant
power supplies and fan tray. The entire case is defined as the cryptographic
boundary of the modules. The NetScreen-5400's physical config uration is defined
as a multi-chip standalone module.
Juniper NS-5400 Security Policy 4
B. Security Level
The NetScreen-5400 meets the overall requirements applicable to Level 2
security of FIPS 140-2.
Table 2: Module Security Level Specification
Security Requirements Section Level
Cryptographic Module Specification 2
Cryptographic Module Ports and Interfaces 2
Roles, Services, and Authentication 2
Finite State Model 2
Physical Security 2
Operational Environment N/A
Cryptographic Key Management 2
EMI/EMC 2
Self-Tests 2
Design Assurance 2
Mitigation of Other Attacks N/A
C. Roles and Services
TheNetScreen-5400 supports five distinct roles:
• Cryptographic Officer Role (Root): The module allows one Crypto-
Officer. This role is assigned to the first operator who logs on to the
module using the default user name and password. Only the CryptoOfficer can create other administrators, and change to FIPS mode.
• User Role (Admin): The Admin user can configure specific security
policies. These policies provide the module with information on how
to operate (for example, configure access policies and VPN
encryption with Triple-DES).
• Read-Only User Role (Admin): This role can only perform a limited
set of services to retrieve information or status. This role cannot
perform services to configure the box.
• VSYS User Role: This role has the same operations as the User
Role above, except that a VSYS user only operates within a
particular virtual system. See the NetScreen Concept and Examples ScreenOS Reference Guide for more information about virtual
systems.
• VSYS Read-Only User Role: This role has the same operations as
the Read-Only User Role above, except that a VSYS read-only user
only operates within a particular virtual system. See the NetScreen Concept and Examples ScreenOS Reference Guide for more
information about virtual systems.
Juniper NS-5400 Security Policy 5
The module allows concurrent Admin users, either in a User Role or in a ReadOnly Role.
The root administrator can create a virtual system (vsys) administrator for each
vsys, if the device has multiple virtual systems configured. The vsys administrator
can function in either the "user" role or "read-only" role. A virtual system is the
architecture that enables the device to respond with a different set of
configurations for each vsys administrator. Therefore, a single box can appear to
be several logical "virtual systems."
The NetScreen-5400 provides the following services:
• Clear/Delete: Clear dynamic system info
• Exec: Exec system commands
• Exit: Exit command console
• Get: Get system information
• Ping: Ping other host
• Reset: Reset system
• Save: Save command
• Set: Configure system parameters
• Trace-route: Trace route
The NetScreen-5400 supports both role-based and identity-based authentication.
D. Interfaces
• Unset: Unconfigure system parameters
• All roles can be authenticated locally (within NS-5400); optionally,
the module supports authentication via a RADIUS server for only the
User role. Authentication by use of the RADIUS server is viewed as
role-based authentication; all other methods of authentication are
identity-based.
• All other forms of authentication (local database) are classified as
identity based.
• The module supports identity-based authentication for the CryptoOfficer (local database), the User Role (local database), the ReadOnly User Role (local database), VSYS User Role, and VSYS ReadOnly User Role.
• The NetScreen-5400 can accept up to three of two network interface
cards.
The network interface card options are:
1. 8GSPM: The 8GSPM provides eight Gigabit Ethernet mini-Gigabit
Interface Converter (GBIC) ports (labeled 1-8) using hot-swappable
transceivers. The 8GSPM delivers up to 4 Gigabits per-second
(Gbps) of firewall and up to 2 Gbps of Virtual Private Network (VPN)
capacity.
Juniper NS-5400 Security Policy 6
Loading...
+ 11 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.