Juniper Networks EX4300 Ethernet Switches Non-Proprietary .

2y ago
28 Views
2 Downloads
281.96 KB
19 Pages
Last View : 15d ago
Last Download : 3m ago
Upload by : Ronan Garica
Transcription

The Juniper Networks EX Series Ethernet Switches are fully compatible with the JuniperNetworks Unified Access Control (UAC), delivering an extra layer of security by first authenticatingusers and performing virus checks, then enforcing precise, end-to-end security policies thatdetermine who can access what network resources, as well as quality of service (QoS) policies toensure delivery of business processes.The Juniper Networks EX4300 Ethernet Switches deliver a full suite of Layer 2 and Layer 3 switchingcapabilities. The EX4300 switches can be interconnected over multiple 40GbE quad small form factorpluggable plus (QSFP ) transceiver ports to form a 320 gigabit per second (Gbps) backplane. Aflexible uplink module that supports both 1GbE and 10GbE options is also available, enabling highspeed connectivity to aggregation- or core-layer switches which connect multiple floors or buildings.

Page 5FIPS Policy2. Module OverviewThis is a non-proprietary Cryptographic Module Security Policy for the Juniper Networks EX4300Ethernet Switches Cryptographic Module from Juniper Networks. It provides detailed informationrelating to each of the FIPS 140-2 security requirements relevant to Juniper Networks EX4300Ethernet Switches Cryptographic Modules along with instructions on how to run the module in asecure FIPS 140-2 mode.The cryptographic module provides for an encrypted connection, using SSH, between themanagement console and the switch. All other data input or output from the switch is consideredplaintext for this FIPS 140-2 validation.The EX switches run JUNOS. The validated version of JUNOS is 14.1X53-D30.3; the image for theEX4300 hardware platforms is: The Juniper Networks EX4300 Ethernet Switches are cryptographic modules that are defined asmultiple-chip standalone modules that execute JUNOS 14.1X53-D30.3 firmware on the EX4300Ethernet Switches listed in Table 1. The cryptographic boundaries for the EX4300 Ethernet Switchesare defined as the outer edge of each switch. The cryptographic modules’ operational environment isa limited operational environment.Table 1 gives a list of the hardware versions that are part of the module validation and the basicconfiguration of the hardware. Each hardware version requires use of a tamper seal (P/N 520052564).Table 1-EX4300 hernetPower 4TFreescalePowerPCP 10/100/1000BASE-T Power over EthernetT 10/100/1000BASE-TF 100/1000BASE-X

Page 6FIPS PolicyImages of the Cryptographic ModulesEX4300-24P/24TEX4300-48P/48TEX4300-32F3. Security LevelThe cryptographic modules meet the overall requirements applicable to Level 1 security of FIPS 1402. The following table lists the level of validation for each area in FIPS 140-2:Table 2-Security Level per FIPS 140-2 Individual SectionsSecurity Requirements SectionLevelCryptographic Module Specification1Module Ports and Interfaces1Roles, Services, and Authentication3Finite State Model1Physical Security1Operational EnvironmentN/ACryptographic Key Management1EMI/EMC1Self-Tests1Design Assurance3Mitigation of Other AttacksN/A

Page 7FIPS Policy4. Modes of OperationApproved Mode of OperationThe EX4300 switches support a FIPS Approved mode of operation. The cryptographic officer canconfigure the module to run in a FIPS Approved mode of operation by following the instructions in thecrypto-officer guidance.Approved AlgorithmsThe FIPS Approved mode of operation supports the following FIPS Approved algorithms 1:Table 3-FIPS Approved AlgorithmsAlgorithmImplementationReferenceOpenSSL AESFIPS 197, SP800-38AOpenSSL SSH KDFSP 800-135OpenSSL DRBGSP 800-90AOpenSSL ECDSAFIPS 186-4ModeCBC, CTRSSH Enc/DecSSHv2SSH KeyDerivationHMAC-SHA-256Random BitGenerationSSH SigGen, P-256, P-384, orP-521)CO Authentication Public KeysUsed to authenticate CO to the module. ECDSA (P-256, P-384, or P521)JuniperRootCAECDSA P-256 w/ SHA-256 X.509 certificateUsed to verify the validity of the PackageCA certificate.PackageCAECDSA P-256 w/ SHA-256 X.509 certificateUsed to verify the validity of the Package Production certificate.

Page 14Package ProductionFIPS PolicyECDSA P-256 w/ SHA-256 X.509 certificateUsed to verify the validity of the Juniper image during the firmwareload and power-up integrity tests.ECDH (P-256, P-384, or P-521)ECDH Public KeysUsed within SSH-2 for key establishment.Definition of CSP Modes of AccessTable 11 defines the relationship between access to CSPs and the different module services. Themodes of access shown in the table are defined as follows:Table 11- CSP Access Rights within Roles & ServicesRoleCOServiceUserXCryptographic Keys and CSP AccessOperationR Read, W Write, D Delete, G GenerateConfigurationManagementAll CSPs (R, W, D)ConfigurationManagementNo access to CSPsSwitch ControlNo access to CSPsStatus ChecksNo access to CSPsXZeroizeAll CSPs (D)XLoad New SoftwareNo access to CSPsXXXXSSH-2 Private Host Key (W, D, G)XXSSH-2SSH-2 session key (R, G)XXConsole AccessCO Authentication Key, User Authentication Key (R)XAccountManagementCreates or removes passwords (W, D)XSelf-testsNo access to CSPsXChange ModeAll CSPs (D)9. Operational EnvironmentThe FIPS 140-2 Operational Environment is a limited operational environment. The module’soperating system is JUNOS OS version 14.1X53-D30.3.

Page 15FIPS Policy10. Security RulesThe cryptographic module design corresponds to the cryptographic module security rules. Thissection documents the security rules enforced by the cryptographic module to implement the securityrequirements of a FIPS 140-2 Level 1 module.In order to prevent any secure data from being released, it is important to test the cryptographiccomponents of a security module to ensure that all components are functioning correctly. Thiscryptographic module performs the following self-tests: Power Up Self-Tests:o Cryptographic Algorithm Tests Triple-DES Encrypt Known Answer Test (KAT) Triple-DES Decrypt KAT AES-CBC 128 Encrypt KAT AES-CBC 128 Decrypt KAT AES-CBC 192 Encrypt KAT AES-CBC 192 Decrypt KAT AES-CBC 256 Encrypt KAT AES-CBC 256 Decrypt KAT SHA-256 KAT HMAC-SHA-1 KAT HMAC-SHA-256 KAT HMAC-SHA-384 KAT HMAC-SHA-512 KAT FIPS SP 800-90A HMAC DRBG KAT: includes instantiate, reseed, and generate ECDSA P-256 pairwise consistency test (sign/verify) ECDH P-256 KAT KDF SSH KAT MD HMAC-SHA-1 KAT MD HMAC-SHA-256 KAT MD SHA-512 KATo Firmware integrity test: ECDSA digital signature verification (P-256, SHA-256)o Critical functions tests Verification of Limited Environment Conditional self-tests:o Pairwise consistency tests upon key generation: ECDSA pairwise consistency test (sign/verify) ECDH pairwise consistency testo Firmware load test: ECDSA digital signature verification (P-256, SHA-256)o Continuous random number generator test: performed on the Approved DRBG and on theNDRNGs before each use.If any of the self-tests fail, the module enters the error state and shuts down.

Page 16FIPS PolicyAny time the cryptographic module is in an idle state, the operator is capable of commanding themodules to perform the power-up self-test by power-cycling the module.Data output is inhibited during key generation, self-tests, zeroization, and error states.Status information does not contain CSPs or sensitive data that if misused could lead to acompromise of the modules.The module supports concurrent operators.The cryptographic officer must maintain control of the module while zeroization is in process(approximately 10 minutes).The module is validated with JUNOS 14.1X53-D30.3 firmware. The loading of non-validated firmwarenullifies the FIP

Juniper Networks Junos operating system—that power the world’s largest service provider networks. The Juniper Networks EX Series Ethernet Switches are fully compatible with the Juniper Networks Unified Access Control (UAC), delivering an extra layer of

Related Documents:

Jun 23, 2015 · Complete Hardware Guide for EX4300 Ethernet Switches . ex4300-48p

The Juniper Networks EX4300 line of Ethernet switches with Virtual Chassis technology combines the carrier-class reliability of modular systems with the economics and flexibility of stackable platforms, delivering a high-performance, scalable solution for data center, campus, and branch office environments. Both

Juniper Networks QFX Series Switches: Ideal for securing and automating your data center networks, QFX Series Switches build a strong foundation for flexible and high-performance EVPN-VXLAN fabrics that improve network reliability and agility. Juniper Networks EX Series Ethernet Switches: Cloud-

have partnered with Juniper Networks and worked closely with members of the Juniper Net-works Technical Certification Program to develop this Official Study Guide for the Juniper Networks Certified Internet Associate certification. Just as Juniper Networks is comm

Juniper Networks SRX300, SRX340, and SRX345 Services Gateways Non-Proprietary FIPS 140-2 Cryptographic Module Security Policy Version: 2.4 Date: December 22, 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net

Juniper Networks SRX1500, SRX4100 and SRX4200 Services Gateways Non-Proprietary FIPS 140-2 Cryptographic Module Security Policy Version: 1.3 Date: February 21, 2018 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net

play in the Juniper JN0-210 certification exam. This study guide is an instrument to get you on the same page with Juniper and understand the nature of the Juniper JNCIA-Cloud exam. Our team of experts has composed this Juniper JN0-210 exam preparation guide to provide the overview about Juniper Clou

Austin, Oscar Palmer Nacogdoches, TX Vietnam War Austin, William . Lopez, Jose Mendoze Mission, TX (Santiago Huitlan, Mexico) World War II (Most sources say that Lopez was born in Texas but he later stated in multiple interviews and his funeral program recorded that he was born in Mexico) Lummus, Jack Ennis, TX World War II Martinez, Benito Fort Hancock, TX Korean War . Compiled by Gayle .