running Junos OS in FIPS mode of operaon. All values, including the keys, must be
stacally specied in the conguraon.
SPI Security parameter index (SPI). A numeric idener used with the desnaon address
and security protocol in IPsec to idenfy an SA. Because you manually congure the
SA for Junos OS in FIPS mode of operaon, the SPI must be entered as a parameter
rather than derived randomly.
SSH A protocol that uses strong authencaon and encrypon for remote access across a
nonsecure network. SSH provides remote login, remote program execuon, le copy,
and other funcons. It is intended as a secure replacement for rlogin, rsh, and rcp in a
UNIX environment. To secure the informaon sent over administrave connecons,
use SSHv2 for CLI conguraon. In Junos OS, SSHv2 is enabled by default, and
SSHv1, which is not considered secure, is disabled.
Zeroizaon Erasure of all CSPs and other user-created data on a device before its operaon as a
FIPS cryptographic module—or in preparaon for repurposing the device for non-
FIPS operaon. The Security Administrator can zeroize the system with a CLI
operaonal command. For details, see "Overview of Zeroizaon to Clear System Data
for FIPS Mode" on page 23.
Supported Cryptographic Algorithms
Each implementaon of an algorithm is checked by a series of known answer test (KAT) self-tests. Any
self-test failure results in a FIPS error state.
BEST PRACTICE: For FIPS 140-3 compliance, use only FIPS-approved cryptographic
algorithms in Junos OS in FIPS mode of operaon.
The following cryptographic algorithms are supported in FIPS mode of operaon. Symmetric methods
use the same key for encrypon and decrypon, while asymmetric methods (preferred) use dierent
keys for encrypon and decrypon.
AES The Advanced Encrypon Standard (AES), dened in FIPS PUB 197. The AES algorithm uses
keys of 128, 192, or 256 bits to encrypt and decrypt data in blocks of 128 bits.
Die-
Hellman
A method of key exchange across a nonsecure environment (such as the Internet). The
Die-Hellman algorithm negoates a session key without sending the key itself across the
network by allowing each party to pick a paral key independently and send part of that key
7