Home

Juniper SA6500 FIPS

image

Contents

1. x Overview Appliances cect csame te thee enavekne feae ceed ewe pe a mer uS tose 3 SA4500and SAG500 442 22s0debteecwee order reines IIS eus 3 Standard Flardwate sware qms x dex Gehan Shear eis Se dansent ES 3 SA Series 6500 Field Replaceable Units 4 FIPS ada 7 cpu Pr 7 SA FIPS EXeGUtlOl a gxpaadoaws aki eee dhe EE E NEE EE e aus dun 8 FIPS OVEMOEW 53 oum yr ER EE NY der mme ane ee Rmi be RIEN AN 9 Planning Network Preparation 4 444444 sisi sus eee eee eae 13 Secure Access ApplianGes sir acandack edad bee bod ER 3 whee ed AOE s 13 Name and Password Restrictions 15 Name and Password Restrictions 15 Security WONG 5 Sueno s tite a koe y s CREE Pars crar EEA a v d 17 Creating a New Security World 17 Recovering an Archived Security World 20 Installation Hardware ie aia ie ie re tement ecetoe sonia detecte 25 Installing Secure Access Appliance Hardware 25 CIUS BIS E 2228 assume secte diamants 27 JOINING axe Sep sd ata dia dom ded d ed aos 8 deed s ddr due Efe d Ro Rond 27 Deploying a Cluster in a Secure Access FIPS Environment 28 Copyright O 2012 Juniper Networks Inc iii SA Se
2. Manually update the security world on each of the machines After creating a cluster you must initialize each cluster node with the specified member s security world using an administrator card that is pre initialized to the security world and the serial console Prior to joining a cluster each node is in its own security world As a consequence after a node joins the cluster the administrator card from the joining node will be invalid Only the administrator card set from the cluster will be valid Similarly if you want to modify an existing security world on a cluster you must individually update each cluster member s cryptographic module using an administrator card and the Secure Access serial console The basic process for creating a cluster follows these high level steps l Initialize one Secure Access from the serial console creating administrator cards 2 Create the cluster from this Secure Access admin console 3 Add nodes to the cluster from this Secure Access admin console 4 Reboot the joining node from the serial console 5 When prompted supply the cluster details including the current node s IP address netmask and domain 6 When prompted insert an administrator card from the cluster s set of cards The node s administrator card if any will become invalid as the node joins the security world of the cluster 28 Copyright 2012 Juniper Networks Inc Chapter 7 Clusters To initialize a
3. Removing an IOM To remove an IOM 1 Unplug the power cord 2 Disconnect the cables from the IOM 3 If necessary arrange the cables to prevent them from dislodging or developing stress points 4 Loosen the thumb screws on each side of the IOM faceplate 5 Grasp the thumbscrews and pull to remove the IOM If you are not reinstalling an IOM into the empty slot install a blank IOM faceplate over the empty slot to maintain proper airflow Copyright O 2012 Juniper Networks Inc 45 SA Series 4500 6500 and FIPS Appliances Related Documentation SA4500 and SA6500 on page 3 Replacing a Hard Drive on page 44 Replacing a Hard Drive on page 44 Replacing a Power Supply on page 46 Replacing a Power Supply 46 Removing and Installing an AC Power Supply The Juniper Networks appliance ships with one AC power supply installed in the back of the chassis You can add an optional second power supply to support redundancy and load sharing features In addition if you need to replace one of the power supplies you can hot swap the faulty power supply for a replacement while the optional second power supply assumes responsibility for the entire power load thus avoiding a situation where you have to power off the Secure Access Service before replacing the removable unit To remove and install an AC power supply module 1 Press the release trigger in and to the right to release the module 2 Grasp the
4. Replacing IOC Modules on page 44 Replacing a Power Supply on page 46 Replacing IOC Modules 44 This section contains information about removing and installing IOC Modules IOMs in the SA 6500 Copyright O 2012 Juniper Networks Inc Chapter 11 Hardware Replacement A CAUTION Power off the device before removing or installing IOMs IOMs are not hot swappable Removing a Blank IOM Faceplate To maintain proper airflow through the device leave blank faceplates in place over slots that do not contain IOMs Do not remove a blank faceplate unless you are installing an IOM in the empty slot To remove a blank faceplate 1 Unplug the power cord 2 Loosen the thumbscrews on each side of the faceplate 3 Grasp the thumbscrews and pull to remove the faceplate Installing an IOM 1 Unplug the power cord 2 Line the IOM up with an empty port on the front of the chassis 3 Carefully slide the IOM in until it seats firmly in the device 4 Tighten the screws on each side of the IOM faceplate 5 Insert the appropriate cables into the cable connectors on the IOM 6 If necessary arrange the cables to prevent them from dislodging or developing stress points Secure the cable so that it is not supporting its own weight as it hangs to the floor Place excess cable out of the way in a neatly coiled loop Use fasteners to maintain the shape of cable loops 7 Insert the power cord into the AC power receptacle
5. Table 1 on page viii defines notice icons used in this guide Copyright O 2012 Juniper Networks Inc vii SA Series 4500 6500 and FIPS Appliances Table 1 Notice Icons Icon Meaning O Informational note Description Indicates important features or instructions Caution Indicates a situation that might result in loss of data or hardware damage Warning Alerts you to the risk of personal injury or death Laser warning A PA Alerts you to the risk of personal injury from a laser Table 2 on page viii defines the text and syntax conventions used in this guide Table 2 Text and Syntax Conventions Convention Bold text like this Description Represents text that you type Examples To enter configuration mode type theconfigure command user host gt configure Fixed width text like this Represents output that appears on the terminal screen user host gt show chassis alarms No alarms currently active Italic text like this e Introduces or emphasizes important e A policy term is a named structure new terms that defines match conditions and Identifies book names actions Identifies REC and Internet draft titles Unos OS System Basics Configuration Guide e RFC1997 BGP Communities Attribute Italic text like this Represents variables options for which Configure the machine s domain name you substitute a value in commands or configuration statements edit
6. root set system domain name domain name Text like this Represents names of configuration e To configure a stub area include the statements commands files and directories configuration hierarchy levels or labels on routing platform components stub statement at the edit protocols ospf area area id hierarchy level The console port is labeled CONSOLE angle brackets Enclose optional keywords or variables stub default metric metric Copyright O 2012 Juniper Networks Inc Table 2 Text and Syntax Conventions continued Convention pipe symbol Description Indicates a choice between the mutually exclusive keywords or variables on either side of the symbol The set of choices is often enclosed in parentheses for clarity About the Documentation Examples broadcast multicast string string2 string3 pound sign Indicates a comment specified on the same line asthe configuration statement to which it applies rsvp Required for dynamic MPLS only square brackets Enclose a variable for which you can substitute one or more values community name members community ids Indention and braces 1 Identify a level in the configuration hierarchy semicolon 4WebGUlConventlons Bold text like this Identifies a leaf statement at a configuration hierarchy level Represents J Web graphical user interface GUI it
7. SA Series 4500 6500 and FIPS Appliances 52 Copyright 2012 Juniper Networks Inc CHAPTER 13 Passwords Changing the Security Officer Password on page 53 Changing the Web User Password on page 54 Changing the Security Officer Password Occasionally you may want to change the security officer password In a cluster you can perform this operation from any node The new security officer password is updated to the other nodes automatically To change the security officer password 1 Connect to the serial console of the FIPS appliance you want to reset Enter 9 to select FIPS Option Enter 2 to select Change security officer password Enter the existing security officer password Enter the new password Re enter the new password when prompted to confirm G NOTE The SA Series FIPS appliance is said to be in a disassociated state when the key store state in the cache and on disk are different As a security measure you cannot change the security officer password when the appliance is in a disassociated state The option is disabled To resolve a disassociated state connect to the serial console and reload the FIPS keystore database Option 9 gt Sub option 1 Related FIPS Overview on page 9 Documentation Copyright 2012 Juniper Networks Inc 53 SA Series 4500 6500 and FIPS Appliances Changing the Web User Password 54 Related Documentation The web username and password are used to
8. FIPS cluster member s security world via the serial console 1 Insert an administrator card that is pre initialized with the active cluster member s security world into the smart card slot with the contacts facing up e NOTE If you have already performed the procedures required to configure the FIPS appliance as described in the Quick Start Guide you might be able to skip this step 2 Switch the cryptographic module s mode switch to initialization mode if it is not already in that position 3 Connect to the machine s serial console 4 Cycle the power to reboot the machine and watch its serial console After the system software starts you will see a message that the machine is about to boot asa stand alone Secure Access and to hit Tab for clustering options Press the Tab key as soon as you see this option n NOTE The interval to press the Tab key is five seconds If the machine begins to boot in stand alone mode wait for it to finish and then reboot again 5 Enter the number 2 to join the existing cluster or 1 to continue as a standalone Secure Access 6 Enter the initialization information as prompted including e Cluster name e Cluster password IP address of a node in the cluster IP address of the node you are adding e Netmask Gateway IP address NOTE After you initialize members of a Secure Access FIPS cluster with the same security world you may disable and re enable the cluster through the admin co
9. then click Enable 5 Wait for all the cluster members to go into an Enabled state 6 Set the mode switch on the cryptographic modules of cluster members that were earlier disabled to initialization mode 7 Reboot each of these nodes from the serial console 8 After a node joins the security world reset its cryptographic module s mode switch to O operational mode Replacing Administrator Cards You can replace an administrator card by selecting the Replace Administrator Card Set option from the serial console You cannot increase the number of administrator cards in an existing set If you want to do this you have to create a new security world which replaces all of the existing cards in a set and allow you to create a set with a larger or smaller number of cards e NOTE Replacing administrator cards restarts services on your standalone Secure Access device or cluster If you need to replace administrator cards for a security world you must have physical access to Acryptographic module that belongs to the security world smart card reader if you use an older model Secure Access device that does not contain a built in card reader An administrator card that is pre initialized with the security world An un formatted smart card or administrator card containing data that you can safely overwrite The same number of unformatted smart cards or administrator cards as in the original set containing dat
10. Ethernet Port LED Behavior on page 50 FIPS Device Status LED Behavior on page 51 Device Status LED Behavior Startup takes approximately one minute to complete If you want to turn the device off and on again we recommend you wait a few seconds between shutting it down and powering it back up There are three device status LEDs located on the left side of the front panel Power Hard disk access Fault Table 5 on page 49 lists the narne color status and description of each device status LED Table 5 Device Status LEDs Name Color State Description POWER Green Off Device is not receiving power On Steady Device is receiving power HARD DISK ACCESS Yellow Off Hard disk is idle Blinking Hard disk is being accessed FAULT Red Off Device is operating normally Slow Power supply fault blinking Fast blinking Fan failure Copyright 2012 Juniper Networks Inc 49 SA Series 4500 6500 and FIPS Appliances Related Documentation Table 5 Device Status LEDs continued Name Color State Description Solid Thermal failure SA4500 and SA6500 on page 3 Ethernet Port LED Behavior on page 50 Replacing the Cooling Fans on page 43 Replacing a Hard Drive on page 44 Replacing IOC Modules on page 44 Replacing a Power Supply on page 46 Ethernet Port LED Behavior 50 Related Documentation The Ethernet port LEDs show the status of each Ethernet port Tabl
11. IPS operations and the security of the keys within your security world we strongly recommend that you take the following precautions Copyright 2012 Juniper Networks Inc 57 SA Series 4500 6500 and FIPS Appliances 58 Related Documentation Create multiple administrator cards You cannot replace an administrator card unless you have another valid card and the pass phrase for that card the cryptographic module does not store administrator card recovery data Therefore we strongly recommend that you create at least one administrator card for standard administrative operations and another for backup purposes Otherwise you run the risk of losing your only administrator card and subsequently losing access to your security world and all the data it stores You can only create a set of administrator cards all at once You cannot add additional cards to an existing set Store a backup administrator card in a secure location Always keep your backup administrator card s in a secure location separate from the card you use for standard administrative operations to ensure that you do not lose all of your administrator cards to the same event such as a fire or theft Overwrite all remaining administrator cards if one gets lost If you lose or damage an administrator card immediately create a new security world and overwrite all remaining cards from the old security world Otherwise an attacker with an old administrator card may be ab
12. IdS 22329 5623 d bed i bbasemoniesm eendentesardbes dos ue 53 Changing the Security Officer Password 53 Changing the Web User Password 54 PEAS IASI ANS sos nates erbe eesum Ding Ua E a ra cele d istoc due ede n tes 55 Upgrading the HSM FitmWales socuwsdccewotecddcedeodoas iecaocdanaoands 55 Administrator Cards od oup wes traps REEE aang ee echec 57 Creating Administrator Cares 2 Mi seins ail acaba rds GURUA Ox ee SA qa 57 Troubleshooting HSM alt 5 sese rukoa dake dures DENOTE KE ERE Vat 61 Resetting the HSM Card In Case Of An Error 61 Index Ice TS Te UTeedSCE de Tee eA TES aoe Sears ab etnanews 65 Copyright 2012 Juniper Networks Inc List of Tables Part 2 Chapter 4 Part 3 Chapter 10 Part 4 Chapter 12 Copyright 2012 Juniper Networks Inc About the Documentation 0 5 05 00 dace RR Er RESET wees vii Table l NOCE ICONS so Sore dm e mede taque T eee ee ene de Ps viii Table 2 Text and Syntax Conventions viii Planning Name and Password Restrictions 15 Table 3 Security Officer Name and Username Requirements 15 Installation Initial Configuration 2431 Rr DERE IRE RIR Gc RE en 37 Table 4 Security Requirements 38 Maintenance ED Behavior 23532 euro Gordiano Prius auod Rug a dabdn ue a Ed
13. JU Per NETWORKS Junos Pulse Secure Access Service SA Series 4500 6500 and FIPS Appliances Published 2012 05 15 Copyright O 2012 Juniper Networks Inc Juniper Networks Inc 194 North Mathilda Avenue Sunnyvale California 94089 USA 408 745 2000 www juniper net Copyright 2012 Juniper Networks Inc All rights reserved Juniper Networks Junos Steel Belted Radius NetScreen and ScreenOS are registered trademarks of Juniper Networks Inc in the United States and other countries The Juniper Networks Logo the Junos logo and JunosE are trademarks of Juniper Networks Inc All other trademarks service marks registered trademarks or registered service marks are the property of their respective owners Juniper Networks assumes no responsibility for any inaccuracies in this document Juniper Networks reserves the right to change modify transfer or otherwise revise this publication without notice Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks U S Patent Nos 5 473 599 5 905 725 5 909 440 6 192 051 6 333 650 6 359 479 6 406 312 6 429 706 6 459 579 6 493 347 6 538 518 6 538 899 6 552 918 6 567 902 6 578 186 and 6 590 785 Junos Pulse Secure Access Service SA Series 4500 6500 and FIPS Appliances Release 7 2 Copyright 2012 Juniper Networks Inc All rights reserved T
14. a that you can safely overwrite e NOTE If you need toreplace administrator cards you must replace the same number of cards that you first initialized for the security world You cannot replace a subset of the cards NOTE If you require additional smart cards please contact your Secure Access Reseller Copyright 2012 Juniper Networks Inc 19 SA Series 4500 6500 and FIPS Appliances Related Documentation To replace all administrator cards or to create a larger number of cards for a security world 1 Create a new security world 2 Choose Replace Administrator Card Set from the list of configuration tasks 3 Enter the pass phrase for the security world 4 When prompted insert an un formatted smart card or an administrator card whose data you can safely overwrite into the smart card reader with the contacts facing up 5 Enter the additional initialization information for which you are prompted 6 Repeat steps 4 and 5 for as many cards as you want to create 7 Store at least one of the administrator cards in a secure location Recovering an Archived Security World on page 20 Recovering an Archived Security World 20 In rare cases you may need to recover your system using an archived security world The archived security world may be an older version of the security world that already exists on your system or the same version In order to recover your system you must have access to the system configuratio
15. abled to initialization mode Copyright 2012 Juniper Networks Inc 21 SA Series 4500 6500 and FIPS Appliances 7 Reboot each of these nodes from the serial console 8 After a node joins the security world reset its cryptographic module s mode switch to O operational mode Related Creating a New Security World on page 17 Documentation 22 Copyright 2012 Juniper Networks Inc PART 3 Installation Hardware on page 25 e Clusters on page 27 e Keystores on page 31 Device Certificates on page 35 e Initial Configuration on page 37 Copyright O 2012 Juniper Networks Inc 23 SA Series 4500 6500 and FIPS Appliances 24 Copyright 2012 Juniper Networks Inc CHAPTER 6 Hardware Installing Secure Access Appliance Hardware on page 25 Installing Secure Access Appliance Hardware The Secure Access 2500 4500 and 6500 ship with mounting ears and mid mounts The Secure Access 6500 includes rear mounting rails for use in a four post mounting rack We recommend you use the rear mounting rails when installing the Secure Access 6500 in a rack If you require an additional mounting kit contact Juniper Networks Next connect the included cables and power on the Secure Access appliance following these steps 1 On the front panel a Connect an Ethernet cable from one of the Ethernet ports on the device to a Gigabit switch port set to 1000BaseTX e NOTE DO NOT use autoselect on eithe
16. at you rebooted open the cluster status page in the admin console and wait for all nodes to exit from the Transitioning state 4 For all other nodes in the cluster connect to the serial console and enter 9 to select FIPS Options and then 1 to select Complete import of keystore and server certificates 5 Enter the restore password when prompted e FIPS Overview on page 9 Binary Importing and Exporting of the Keystore 32 Select Maintenance gt Import Export from the admin console to import and export the keystore You can do this from a stand alone node or from a node within a cluster The keystore is exported as part of the system settings configuration file Safely store the restore password associated with the archived keystore as you will need it for various FIPS operations If you forget the restore password you can create a new one from the serial console and then re export the configuration To import the keystore select the Import Key Store and Device Certificate s checkbox and import your configuration After the import process has completed open a serial console for that FIPS appliance and enter 9 for FIPS Options and then 1to select Complete import of keystore and server certificates If the keystore is different from the one installed on the HSM you will be prompted for the keystore s restore password Copyright 2012 Juniper Networks Inc Chapter 8 Keystores NOTE If you reboot the FIPS appliance witho
17. b option 1 Related FIPS Overview on page 9 Documentation Copyright 2012 Juniper Networks Inc 35 SA Series 4500 6500 and FIPS Appliances 36 Copyright 2012 Juniper Networks Inc CHAPTER 10 Initial Configuration Basic Setup for Secure Access Appliances on page 37 e Licensing and Configuring Your Secure Access on page 39 Basic Setup for Secure Access Appliances When you boot an unconfigured Secure Access appliance you need to enter basic network and machine information through the serial console to make the appliance accessible to the network After entering these settings you can continue configuring the appliance through the administrator Web console This topic describes the required serial console setup and the tasks you need To perform basic setup 1 Configure a console terminal or terminal emulation utility running on a computer such as HyperTerminal to use these serial connection parameters e 9600 bits per second e 8 bit No Parity 8NT e Stop Bit No flow control 2 Connectthe terminal or laptop to the serial cable plugged in to the appliance s console port and press Enter until you are prompted by the initialization script 3 Enter y to proceed and then y to accept the license terms or r to read the license first 4 Followthe directions in the serial console and enter the machine information for which you are prompted including the IP address of the internal port you con
18. ccess appliance and create a test user to verify user accessibility To test initial set up and continue configuring your Secure Access see Getting Started We recommend that you install the Secure Access appliance on your LAN to ensure that it can communicate with the appropriate resources like authentication servers DNS servers internal Web servers via HTTP HTTPS external Web sites via HTTP HTTPS optional Windows file servers optional NFS file servers optional and client server applications optional e NOTE If you decide to install your Secure Access appliance in your DVZ ensure that the Secure Access appliance can connect to these internal resources Installing Secure Access Appliance Hardware on page 25 e Basic Setup for Secure Access Appliances on page 37 Licensing and Configuring Your Secure Access on page 39 Copyright O 2012 Juniper Networks Inc 13 SA Series 4500 6500 and FIPS Appliances 14 Copyright 2012 Juniper Networks Inc CHAPTER 4 Name and Password Restrictions Name and Password Restrictions on page 15 Name and Password Restrictions Security officer names and usernames must adhere to the following requirements Table 3 Security Officer Name and Username Requirements Security Officer Name and Username Requirement Description Minimum Length At least one character Maximum Length 63 characters Valid Characters Alphanumeric underscore _ dash and per
19. d Restrictions on page 15 D tati ocumentation e Initializing a Keystore on page 31 Reinitializing the Keystore on page 31 Copyright O 2012 Juniper Networks Inc 9 SA Series 4500 6500 and FIPS Appliances Joining a Cluster on page 27 Importing Device Certificates on page 35 Changing the Security Officer Password on page 53 Changing the Web User Password on page 54 Resetting the HSM Card In Case Of An Error on page 61 Upgrading the HSM Firmware on page 55 Binary Importing and Exporting of the Keystore on page 32 Copyright 2012 Juniper Networks Inc PART 2 Planning e Network Preparation on page 13 Name and Password Restrictions on page 15 e Security World on page 17 Copyright 2012 Juniper Networks Inc SA Series 4500 6500 and FIPS Appliances 12 Copyright 2012 Juniper Networks Inc CHAPTER 3 Network Preparation Secure Access Appliances on page 13 Secure Access Appliances Related Documentation Thank you for choosing the Juniper Networks Secure Access Series appliance You can install Secure Access and start configuring your system using the following easy steps 1 Install the hardware 2 Perform basic setup 3 License and configure your Secure Access e NOTE After installing and setting up your Secure Access refer to the Initial Configuration task guide in the administrator Web console to install the most current Secure Access OS service package license your Secure A
20. data Also note that once you set the switch to and begin initialization you must complete the process Otherwise your security world is only partially initialized making it unusable Insert an administrator card that is pre initialized with the imported security world into the smart card reader slot with the contacts facing up Set the mode switch on the cryptographic module to initialization mode Access the Secure Access device s serial console and reboot the Secure Access device Reset the cryptographic module s mode switch to O operational mode when prompted Importing a Security World Into a Cluster To import an existing security world into a cluster 1 Sign in to the admin console of a cluster node To access a node s admin console enter its internal IP address followed by admin in a browser For example https x x x x admin On the System gt Clustering gt Status tab select the checkbox for all nodes other than the current node in the Cluster Members column and then click Disable Import an archived security world in to the cluster member When the installation process completes return to the node s System gt Clustering gt Status tab select the checkbox next to the disabled nodes in the Cluster Members column and then click Enable Wait for all the cluster members to go into the Enabled state Set the mode switch on the cryptographic modules of cluster members that were earlier dis
21. des 7100059 en pdf Product warranties For product warranty information visit http www juniper net support warranty JTAC hours of operation The JTAC centers have resources available 24 hours a day 7 days a week 365 days a year Self Help Online Tools and Resources For quick and easy problem resolution Juniper Networks has designed an online self service portal called the Customer Support Center CSC that provides you with the following features Find CSC offerings http www juniper net customers support Search for known bugs http www2 juniper net kb Find product documentation http www juniper net techpubs Find solutions and answer questions using our Knowledge Base http kb juniper net Download the latest versions of software and review release notes http www juniper net customers csc software Search technical bulletins for relevant hardware and software notifications https www juniper net alerts Join and participate in the Juniper Networks Community Forum http www juniper net company communities Open a case online in the CSC Case Management tool http www juniper net cm To verify service entitlement by product serial number use our Serial Number Entitlement SNE Tool https tools juniper net SerialNumberEntitlementSearch Opening a Case with JTAC You can open a case with JTAC on the Web or by telephone Use the Case Management tool in the CSC at http ww
22. e 6 4 Port Copper Gigabit Ethernet LEDs available on IC4500 and IC6500 MIB Color and State Description Link Activity Green Link Blinking green Activity Link Speed Off 10 Mbps Green 100 Mbps Yellow 1Gbps SA4500 and SA6500 on page 3 Device Status LED Behavior on page 49 Replacing the Cooling Fans on page 43 Replacing a Hard Drive on page 44 Replacing IOC Modules on page 44 Replacing a Power Supply on page 46 Copyright O 2012 Juniper Networks Inc FIPS Device Status LED Behavior Chapter 12 LED Behavior There are three device status LEDs located on the FIPS card S Status F FIPS e INIT Table 7 Status LED LED Color and State STATUS Off Description Bootstrap firmware is executing Blinking green IDLE OPERATIONAL or FAILSAFE state Green POST or DISABLED state driver not attached Blinking red Error occurred during boot process Red HALTED fatal error state or when a low level hardware initialization failure occurred FIPS Off Operating in non FIPS mode Green Operating in FIPS mode Blinking yellow Zeroize jumper is present INIT Off Board is not initialized Green Board initialized by security officer Yellow POST DIAGNOSTIC or FAILSAFE firmware not upgraded state Blinking yellow Running diagnostics Related FIPS Overview on page 9 Documentation Copyright 2012 Juniper Networks Inc 51
23. e new security world until you reformat them with the new security world s data Also note that once you set the switch to and begin initialization you must complete the process Otherwise your security world is only partially initialized making it unusable A WARNING You must obtain one or more new device certificates from your CA whenever you create a new security world Creating a Security World on a Stand Alone Secure Access Copyright 2012 Juniper Networks Inc 17 SA Series 4500 6500 and FIPS Appliances To create a new security world on a stand alone Secure Access 1 Insert an un formatted smart card or an administrator card containing data that you can safely overwrite into the card slot with the card contacts facing up Set the mode switch on the cryptographic module to initialization mode Access the Secure Access serial console and reboot the Secure Access device After the Secure Access device reboots you are prompted on the serial console with the following question Do you want to use the currently installed security world y n Perform one of the following f you want to create a new security world then a Enter n and press Enter b You are asked to confirm this choice with the prompt Are you sure you want to delete your existing Security World including server certificates y n If you choose to continue enter y and press Enter c Enter the number of administrator cards you want t
24. efore the module powers up in order to alert the unit that you want to begin day to day processing Otherwise the module prompts you through the serial console to join the existing security world or initialize a new one M Maintenance mode In future releases this setting will be used to upgrade the firmware on the cryptographic module Not yet supported Copyright O 2012 Juniper Networks Inc Chapter 2 FIPS Related SA FIPS on page 7 D tati ee Creating Administrator Cards on page 57 Creating a New Security World on page 17 Recovering an Archived Security World on page 20 FIPS Overview The Juniper Networks SA 4500 and 6500 FIPS is a standard SA4500 or SA6500 appliance equipped with a FIPS compliant crypto card The tamper proof hardware security module installed on a Secure Access FIPS system is certified to meet the FIPS 140 2 level 3 security benchmark The configuration process for Secure Access FIPS administrators is almost exactly the same as for the non FIPS Secure Access administrators requiring only minor configuration changes during the initialization clustering and certificate generation processes In the few cases where administration tasks are different this guide includes the appropriate instructions for both Secure Access and Secure Access FIPS administrators For end users Secure Access FIPS is exactly the same as a standard Secure Access system The FIPS compliant crypto card is a host bus ada
25. ems you click or select edit routing options f static route default f nexthop address retain e Inthe Logical Interfaces box select All Interfaces e To cancel the configuration click Cancel bold right angle bracket Separates levels in a hierarchy of J Web selections In the configuration editor hierarchy select Protocols Ospf Documentation Feedback We encourage you to provide feedback comments and suggestions so that we can improve the documentation You can send your comments to techpubs comments juniper net or fill out the documentation feedback form at https www juniper net cgi bin docbugreport If you are using e mail be sure to include the following information with your comments Document or topic name URL or page number Software release version if applicable Requesting Technical Support Technical product support is available through the Juniper Networks Technical Assistance Center JTAC If you are a customer with an active J Care or JNASC support contract Copyright O 2012 Juniper Networks Inc ix SA Series 4500 6500 and FIPS Appliances or are covered under warranty and need post sales technical support you can access our tools and resources online or open a case with JTAC JTAC policies For a complete understanding of our JTAC procedures and policies review the JTAC User Guide located at http www juniper net us en local pdf resource gui
26. entually turn green reboot your appliance Related FIPS Overview on page 9 Documentation Copyright O 2012 Juniper Networks Inc 61 SA Series 4500 6500 and FIPS Appliances 62 Copyright 2012 Juniper Networks Inc PART 6 Index Index on page 65 Copyright 2012 Juniper Networks Inc 63 SA Series 4500 6500 and FIPS Appliances 64 Copyright 2012 Juniper Networks Inc Index Symbols comments in configuration statements ix in syntax descriptions i 6500 4500 itti hier lt gt IN syntax descriptions viii in configuration statements sss ix in configuration statements sees eee ix pipe in syntax descriptions ne ix B braces in configuration statements ix brackets angle in syntax descriptions viii square in configuration statements ix C comments in configuration statements ix conventions text and SyntaX ec niin viii cooling fans FEPLACING cc seccsescseesesessssesesesessesssessestseestecees 43 curly braces in configuration statements ix customer SUPPOrT nn ix contacting STAG usant ix D documentation COMMENTS OTI nine diit p cte espe tene ix F field replaceable hardware FIPS device clustering ennennnes FIPS OverViGw rennes FIPS device certificate font conventions uictis
27. erial console prompts you for the keystore restore password before upgrading the HSM s firmware If you do not remember the password you have the option of upgrading the firmware at a later date using the serial console Note that the web server may not function properly if the firmware upgrade is required and is not updated To upgrade the firmware using the serial console 1 Click System gt Clustering gt Cluster Status tab in the admin console and wait for the node to be in the FIPS disassociated state 2 Opena serial console and enter 9 to select the FIPS option 3 Enter 6 to select Load Firmware NOTE The SA Series FIPS appliance is said to be in a disassociated state when the key store state in the cache and on disk are different As a security measure you cannot load firmware when the appliance is in a disassociated state The option is disabled To resolve a disassociated state connect to the serial console and reload the FIPS keystore database Option 9 gt Sub option 1 Related FIPS Overview on page 9 Documentation Copyright 2012 Juniper Networks Inc 55 SA Series 4500 6500 and FIPS Appliances 56 Copyright 2012 Juniper Networks Inc CHAPTER 15 Administrator Cards Creating Administrator Cards on page 57 Creating Administrator Cards When you receive your Secure Access FIPS product you receive 6 smart cards as part of the package A smart card is a removable key device that you
28. ess Service 4 Copyright O 2012 Juniper Networks Inc Related Documentation Chapter 1 Appliances Power supplies The SA6500 ships with one AC power supply installed in the back of the chassis You can add an optional second power supply to support redundancy and load sharing features In addition if you need to replace one of the power supplies you can swap the faulty power supply for a replacement while the optional second power supply assumes responsibility for the entire power load thus avoiding a situation where you have to power off the Secure Access Service before replacing the removable unit Cooling fans The SA6500 ships with two cooling fans installed in the back of the chassis If you need to replace one of the cooling fans you can swap the faulty fan for a replacement during operation in a matter of moments You can purchase additional cooling fans from your vendor when you order your SA6500 or you can purchase them in the future to replace faulty or failed cooling fans as necessary in the future Device Status LED Behavior on page 49 Ethernet Port LED Behavior on page 50 Replacing the Cooling Fans on page 43 Replacing a Hard Drive on page 44 Replacing IOC Modules on page 44 Replacing a Power Supply on page 46 Copyright 2012 Juniper Networks Inc 5 SA Series 4500 6500 and FIPS Appliances 6 Copyright 2012 Juniper Networks Inc CHAPTER 2 rib SA FIPS Related Docume
29. figure the external port through the administrator Web console after initial configuration e Network mask Default gateway address e Primary DNS server address Copyright O 2012 Juniper Networks Inc 37 SA Series 4500 6500 and FIPS Appliances Secondary DNS server address optional Default DNS domain name for example acmegizmo com e WINS server name or address optional e Administrator username Administrator password Common machine name for example connect acmegizmo com Organization name for example Acme Gizmo Inc Q NOTE Secure Access uses the common machine and organization names to create a self signed digital certificate for use during product evaluation andinitial setup We strongly recommend that you import a signed digital certificate from a trusted certificate authority CA before deploying Secure Access for production use For more information see Certificates 5 FIPS only The Secure Access FIPS appliances utilize FIPS 140 2 certified Hardware Security Modules HSM and require the following pieces of information to initialize the HSM and manage the HSM protected storage When prompted by the serial console enter the security officer name and password Save these credentials as they are required for creating new restore passwords and for changing the security officer password Enter the key store restore or HSM master key backup password Enter the username and passw
30. hard drives to offer component redundancy and help minimize down time The second redundant hard disk maintains an exact copy of the software image and configuration information on the working hard disk Therefore if the working hard disk fails the redundant hard disk immediately assumes responsibility for all operations This function is referred to as the Redundant Array of Independent Disks RAID mirroring process e NOTE The hard disk modules are hot swappable Once a new hard disk module is inserted you should wait until the RAID mirroring process has completed before rebooting or turning off the appliance To remove and install a hard drive 1 Onthe hard drive module press the blue handle release trigger in and to the right to release the insertion and removal handle 2 Grasp the handle and pull the hard drive module straight out of the chassis Once you have removed the hard drive module be sure to replace it with a replacement hard drive 3 With the insertion and removal handle on the hard drive module in the released out position line the hard drive module up with an empty hard drive port on the front of the chassis 4 Carefully slide the hard drive module into the chassis until it is clicks into place Retract the handle by swinging it back across the face of the hard drive until it is completely flush with the face of the hard drive module SA4500 and SA6500 on page 3 Replacing the Cooling Fans on page 43
31. he information in this document is current as of the date on the title page YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant Junos OS has no known time related limitations through the year 2038 However the NTP application is known to have some difficulty in the year 2036 END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of or is intended for use with Juniper Networks software Use of such software is subject to the terms and conditions of the End User License Agreement EULA posted at http www juniper net support eula html By downloading installing or using such software you agree to the terms and conditions of that EULA ii Copyright O 2012 Juniper Networks Inc Table of Contents Part 1 Chapter 1 Chapter 2 Part 2 Chapter 3 Chapter 4 Chapter 5 Part 3 Chapter 6 Chapter 7 About the Documentations 3359 5 5 52 62377 9 bd ews RR GE UR detent abated vii Documentation and Release Notes vii SopportedPlatfois es iii de hace doa Roo s Ro RC T m dod Rond ch saad vii Documentation Conventions vii Documentation Feedback 2225 ux dere eem EAE LAmESE LAE ix Requesting Technical S upport ix Self Help Online Tools and Resources X Opening a Case with JTAC
32. insertion and removal handle and pull the power supply module straight out of the chassis Once you have removed the supply module be sure to replace it with a replacement power supply or the dummy power supply port cover installed in your chassis at the time of shipping 3 Line the new power supply module up with an empty power supply port on the back of the chassis 4 Slowly slide the power supply module into the chassis until it clicks into place Removing and Installing a DC Power Supply To remove and install a DC power supply module 1 Unplug the power cord 2 Disconnect the DC supply wires from the lugs on the DC power supply 3 Press the release trigger in and to the right to release the module 4 Grasp the power supply module and pull it straight out of the chassis 5 Slowly slide the new module into the chassis until it clicks into place 6 Connect the DC supply wires to the module using the lugs Be sure to attach the ground wire 7 Attach the power cord Copyright O 2012 Juniper Networks Inc Related Documentation SA4500 and SA6500 on page 3 Replacing the Cooling Fans on page 43 Replacing a Hard Drive on page 44 Replacing IOC Modules on page 44 Copyright 2012 Juniper Networks Inc Chapter 11 Hardware Replacement 47 SA Series 4500 6500 and FIPS Appliances 48 Copyright 2012 Juniper Networks Inc CHAPTER 12 LED Behavior Device Status LED Behavior on page 49
33. iod First Character Must be alphabetic Passwords must be at least six characters and no more than 63 characters Three characters must be alphabetic and one character must be non alphabetic Related FIPS Overview on page 9 Documentation Copyright 2012 Juniper Networks Inc 15 SA Series 4500 6500 and FIPS Appliances 16 Copyright 2012 Juniper Networks Inc CHAPTER 5 Security World Creating a New Security World on page 17 Recovering an Archived Security World on page 20 Creating a New Security World You cannot begin using a Secure Access FIPS machine until you create a security world on it However in some case you may need to overwrite that security world with a new one For example if you lose an administrator card we recommend that you create a brand new security world to prevent an untrusted source from finding the card and accessing your security world You may also need to create a new security world if you cannot remember your original administrator cards pass phrases In order to create a new security world you must have physical access to The cryptographic module s that belong to the security world smart card reader if you use an older model Secure Access device that does not contain a built in card reader One or more unformatted smart cards or administrator cards containing data that you can safely overwrite e NOTE Yourold administrator cards will not work with th
34. ity World on page 17 Recovering an Archived Security World on page 20 e SA FIPS Execution on page 8 Copyright O 2012 Juniper Networks Inc 7 SA Series 4500 6500 and FIPS Appliances SA FIPS Execution When you first install a FIPS system the Secure Access Service serial console walks you through the process of creating a security world through the serial console A security world is a key management system used by SA FIPS consisting of the following elements Cryptographic module The cryptographic module also sometimes called the hardware security module or HSM included with SA FIPS Appliance includes hardware and firmware installed directly on the appliance A security world may contain a single cryptographic module standard environment or multiple modules clustered environment However a single Secure Access FIPS appliance is always equipped with a single cryptographic module e Security world key A security world key is a unique Triple DES encrypted key that protects all other application keys within a security world As required by the Federal Information Processing Standards you cannot import this key into a security world you must directly create it from a cryptographic module In a clustered environment all of the modules within the security world share the same security world key Smart cards A smart card is a removable key device that looks like a credit card A smart card authenticates users allowi
35. le to access old host data stored on a backup tape or another host With the old host data and an old card the attacker may then be able to re create your keys Protect the administrator card s pass phrase For maximum security you should never write down your pass phrase tell it to untrusted Users or Use a pass phrase that is easy to guess Protecting your pass phrase adds an extra level of security to your operations Only use your administrator card with known trusted sources Always obtain smart cards from a trusted source never insert a smart card into an untrusted smart card reader and never insert untrusted smart cards into your smart reader SA FIPS on page 7 Creating a New Security World on page 17 Recovering an Archived Security World on page 20 Copyright 2012 Juniper Networks Inc Troubleshooting HSM Card on page 61 Copyright 2012 Juniper Networks Inc 59 SA Series 4500 6500 and FIPS Appliances 60 Copyright 2012 Juniper Networks Inc CHAPTER 16 HSM Card Resetting the HSM Card In Case Of An Error on page 61 Resetting the HSM Card In Case Of An Error If the FIPS card LEDs indicates an error or fault try resetting the HSM card prior to rebooting your appliance To reset the HSM card 1 Connectto the serial console of the FIPS appliance you want to reset 2 Enter 9 to select FIPS Option 3 Enter 5 to select Reset the HSM 4 Observe the LEDS on the FIPS card If they do not ev
36. must use in order to gain access to some of the critical data and processes controlled by the cryptographic module Secure Access FIPS first requires you to use one of your smart cards while initializing the cryptographic module through the serial console During this process Secure Access FIPS creates a security world and transforms the smart card into an administrator card that gives the holder access only to that security world Once the module is initialized you do not need the administrator card for normal Secure Access operations However you are required to use the administrator card whenever you want to add another Secure Access FIPS machine to a cluster reinitialize a module with a new or different security world or replace administrator cards As arule of thumb any Secure Access FIPS operation that you must execute through the Secure Access serial console requires an administrator card D NOTE Whenever you change your security world you must determine how to handle your existing administrator cards Your choices include Reset your existing administrator cards to the new security world Use administrator cards that are pre initialized to the new security world and leave your existing administrator cards unchanged Note that if you choose this option however you cannot use the old unchanged cards to access the new security world Administrator Card Precautions Since administrator cards are so critical to Secure Access F
37. n file by default system cfg that holds the archived security world and its corresponding certificate In addition if you are overwriting your security world with a different security world you must have physical access to All of the cryptographic modules that belong to the security world A smart card reader if you use an older model Secure Access device that does not contain a built in card reader An administrator card that is pre initialized with the security world and administrator passphrase that you want to import Importing a Security World Into a Stand Alone Secure Access Device Copyright O 2012 Juniper Networks Inc Chapter 5 Security World To import an existing security world into a stand alone Secure Access device 1 Import the system configuration file that contains the archived security world and its corresponding certificate into the Secure Access device and then initialize the security world if necessary If the configuration file contains an archive of The same security world that was already present on the machine no further configuration is required Adifferent security world than was already present on the machine you must initialize the new security world e NOTE If you import a configuration file containing a different security world note that your existing administrator cards will not work with the imported security world until you reformat them with the new security world s
38. ng fans installed in the back of the chassis If you need to replace one of the cooling fans you can hot swap the faulty fan for a replacement during operation in a matter of moments You can purchase additional cooling fans from your authorized Juniper reseller or you can purchase them in the future to replace faulty or failed cooling fans as necessary To remove and install a cooling fan module 1 To release the cooling fan module do one of the following e Press and slide the release trigger toward the center of the cooling fan module e Loosen the thumbscrews 2 Grasp the cooling fan module and carefully pull it out CAUTION Once you remove the cooling fan module it is important that you replace it with a replacement cooling fan The second fan is required for proper air flow across the chassis s internal components it is not a redundant fan 3 Line the a cooling fan module up with an empty cooling fan port on the back of the chassis 4 Slowly slide the module into the chassis until it clicks into place 5 If your cooling fan is equipped with thumb screws tighten the screws Related SA4500 and SA6500 on page 3 D tati SM Replacing a Hard Drive on page 44 Copyright O 2012 Juniper Networks Inc 43 SA Series 4500 6500 and FIPS Appliances Replacing IOC Modules on page 44 Replacing a Power Supply on page 46 Replacing a Hard Drive Related Documentation The SA 6500 ships with two standard
39. ng them access to various data and processes controlled by the cryptographic hardware module During the initialization process you must insert one of your smart cards into the reader built in or external depending upon which device model you own As part of the initialization process the smart card is transformed into an administrator card that allows the card holder access to the security world Encrypted data Encrypted host data in a Secure Access FIPS environment includes keys and other data required to share information in a secure manner These elements interlock to create a comprehensive security world When you start the appliance it confirms that the security world is valid and that the cryptographic module is in operational mode before starting normal operations You can set the cryptographic module into operational mode using a hardware switch on the outside of the module The switch s settings include Initialization mode Use this setting when initializing the cryptographic module with a new security world or when adding a module to an existing security world in a Secure Access cluster Note that once you set the switch to and begin initialization you must complete the process Otherwise your security world is only partially initialized making it unusable O Operational mode Use this setting to place the cryptographic module into operational mode after initialization Note that you must set the switch to O b
40. nsole You are no longer required to use the serial console once the cluster members are all members of the same security world 7 Select 1 to continue joining the cluster 8 After the FIPS appliance initializes the card switch the cryptographic module s mode switch to O operational mode Copyright 2012 Juniper Networks Inc 29 SA Series 4500 6500 and FIPS Appliances Related gt Using the Serial Console Documentation 30 Copyright 2012 Juniper Networks Inc CHAPTER 8 Keystores e Initializing a Keystore on page 31 e Reinitializing the Keystore on page 31 Binary Importing and Exporting of the Keystore on page 32 Initializing a Keystore When the FIPS appliance is powered on from a factory reset or when its configuration is reset the serial console requires the initialization of a keystore and a self signed device certificate The steps for initialization are During the boot process the current release s HSM firmware is installed on the FIPS compliant crypto card HSM You are prompted to create a new keystore As part of the new keystore creation you must provide the following data The security officer name and password Save these credentials as they are required for such tasks as creating new restore passwords and for changing the security officer password The keystore restore or HSM master key backup password Every time you export the system configuration save the current rest
41. ntation SAFIPS on page 7 SA FIPS Execution on page 8 e FIPS Overview on page 9 FIPS or Federal Information Processing Standards are National Institute of Standards and Technology regulations for handling keys and encrypting data Juniper Networks SA FIPS is a standard SA4000 or SA6000 NetScreen Instant Virtual Extranet equipped with a FIPS certified cryptographic module The tamper proof hardware security module installed on an SA FIPS Series Appliance is certified to meet the FIPS 140 2 level 3 security benchmark The module handles private cryptographic key management and SSL handshakes simultaneously ensuring FIPS compliance and off loading CPU intensive public key infrastructure PKI tasks from the Secure Access Service to a dedicated module The configuration process for SA FIPS administrators is almost exactly the same as for the non SA FIPS administrators requiring only minor configuration changes during the initialization clustering and certificate generation processes In the few cases where administration tasks are different this guide includes the appropriate instructions for both SA and SA FIPS administrators For end users SA FIPS is exactly the same asa standard Secure Access Service system SA FIPS is a hardware feature that is built into selected Secure Access Services It is not available on SA700 Series Appliances e SA FIPS Execution on page 8 Creating Administrator Cards on page 57 Creating a New Secur
42. o create and press Enter d Enter y and press Enter to confirm the number of cards you want to create f you want to use the currently installed security world then a Enter y and press Enter b Proceed to the next numbered step in this procedure Reset the cryptographic module s mode switch to O operational mode Add the common name and company name when prompted The system uses the existing self signed certificate temporarily Create a new device certificate that shares the new security world s private key A WARNING You must obtain one or more new server certificates from your CA whenever you create a new security world Creating a Security World in a Clustered Environment To create a new security world in a clustered environment 1 Sign in to the admin console of a cluster node To access a node s admin console enter its internal IP address followed by admin in a browser For example https x x x x admin On the System gt Clustering gt Status tab select the checkbox for all nodes other than the current node in the Cluster Members column and then click Disable Initialize the cluster member with a security world If this is the first node in the cluster create a new security world Copyright 2012 Juniper Networks Inc Chapter 5 Security World 4 Return to the node s System gt Clustering gt Status tab select the checkbox next to disabled nodes in the Cluster Members column and
43. ord for the HSM private key storage Security officer names Usernames and key store names must adhere to the following requirements in Table 4 on page 38 Table 4 Security Requirements Requirement Description Minimum length At least one character Maximum length 63 characters for security officer names and user names 32 characters for keystore names Valid characters Alphanumeric underscore _ dash and period First character Must be alphabetic Passwords must be at least six characters Three characters must be alphabetic and one character must be non alphabetic 38 Copyright 2012 Juniper Networks Inc Related Documentation Chapter 10 Initial Configuration In a browser enter the machine s URL followed by admin to access the administrator sign in page The URL is in the format https a b c d admin where a b c d is the machine IP address you entered in step 4 When prompted with the security alert to proceed without a signed certificate click Yes When the administrator sign in page appears you have successfully connected your Secure Access appliance to the network On the sign in page enter the administrator user name and password you created in step 4 and then click Sign In The administrator Web console opens to the System gt Status gt Overview page Secure Access Appliances on page 13 Installing Secure Access Appliance Hardware on page 25 Licensing and Configuring Your Sec
44. ore password for the archived keystore Web username and password for running cryptographic operations using keys stored in the HSM s keystore The self signed certificate creation proceeds as normal except that the HSM is used to generate a secure RSA private key which is stored in the HSM s database Related FIPS Overview on page 9 Documentation Reinitializing the Keystore If there is a change in the security policy of the deployment that requires the creation of new RSA key pairs and corresponding certificates you will need to reinitialize the keystore You canrreinitialize the keystore from either a stand alone node or from a cluster Copyright O 2012 Juniper Networks Inc 3l SA Series 4500 6500 and FIPS Appliances Documentation To reinitialize the keystore from a stand alone node 1 Reboot the stand alone node During the boot process you are prompted to re initialize the keystore 2 Press y to delete the current keystore and server certificates D NOTE If you do not press y within 10 seconds the appliance will proceed to boot normally To reinitialize the keystore from a cluster 1 Reboot a node within the cluster During the boot process you are prompted to re initialize the keystore 2 Press y to delete the current keystore and server certificates A new keystore is initialized NOTE If you do not press y within 10 seconds the appliance will proceed to boot normally 3 On the node th
45. pter card that combines IPsec and SSL cryptographic acceleration with Hardware Security Module HSM features This combination of a dedicated HSM advanced cryptographic security and secure key management meet the security and performance needs for any service This card has two main roles a security officer and a user role The FIPS compliant crypto card replaces the need for administrator cards with the concept of a security officer who is responsible for key and password management The security officer credential protects the keystore from being exported and imported onto another FIPS compliant crypto card User roles perform cryptographic operations such as accessing keying material within the keystore as well as performing bulk encryption operations The security officer credentials user credentials and RSA private keys are stored in the HSM encrypted keystore located on the Secure Access disk You are prompted to provide these credentials whenever any operation requires them Credentials are not automatically retrieved from the HSM keystore Keystores are stored on the disk and are encrypted with a master key The master key is storedinthe cryto card firmware and can be backed up by a security officer using a restore password This restore password can then be used to restore the master key onto the same or different FIPS compliant crypto cards allowing the keystore to be shared across a cluster for example Related Name and Passwor
46. r Networks Inc CHAPTER 7 Clusters Joining a Cluster Joining a Cluster on page 27 Deploying a Cluster in a Secure Access FIPS Environment on page 28 Joining a cluster involves using both the admin console and serial console To join a cluster 1 If you have not already done so define and initialize a cluster If you are currently running stand alone appliances that you want to cluster we recommend that before you create a cluster you first configure system and user settings on one machine After doing so use the same machine to create the cluster This machine joins the cluster as part of the creation process When other Secure Access devices join the cluster this machine propagates its configuration to the new cluster member Before you can add an appliance to a cluster you need to make its identity known to the cluster Join the appliance to the cluster through the admin console or through the serial console When joining a node to a cluster using the serial console you are prompted for the cluster keystore s restore password If the restore password fails enter 9 to select FIPS Option and then enter 1 to select Complete import of keystore and server certificates When a cluster is created on a node the node s keystore becomes the cluster s keystore Any node joining the cluster must import the cluster s keystore You need the current keystore restore password to do this When you see the message confi
47. r port Once you apply power to the Secure Access device the port uses two LEDs to indicate the connection status b Plug the serial cable into the console port 2 Onthe rear panel plug the power cord into the AC receptacle There is no on off switch on Secure Access Once you plug the power cord into the AC receptacle Secure Access powers up Hardware installation is complete after you rack mount the appliance and connect the power network and serial cables The next step is to connect to the appliance s serial console using bonding By default on the SA 6500 only Secure Access uses bonding of the multiple ports to provide failover protection Bonding describes a technology for aggregating two physical ports into one logical group Bonding two ports on Secure Access increases the failover Copyright O 2012 Juniper Networks Inc 25 SA Series 4500 6500 and FIPS Appliances capabilities by automatically shifting traffic to the secondary port when the primary port fails The SA 6500 appliance bonds ports as follows Internal port Port O Port1 External port Port 2 Port 3 Secure Access indicates ina message on the System gt Network gt Overview page whether or not the failover functionality is enabled Related Secure Access Appliances on page 13 D tati ocumentaton Basic Setup for Secure Access Appliances on page 37 Licensing and Configuring Your Secure Access on page 39 26 Copyright O 2012 Junipe
48. ries 4500 6500 and FIPS Appliances Chapter 8 Chapter 9 Chapter 10 Part 4 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Part 5 Chapter 16 Part 6 KEYVSEOMOS is iiss some sie cesdhuacen code cnemadaociencesmedeseurssnt 31 initializing a KeystOte duoc eePeOweXyPc EPIS eo ewes aida S aes SR ESTEE 31 Reinitializing the Keystore 31 Binary Importing and Exporting of the Keystore 32 Device CertifiCates ous Leda dae ae Hardee ards Bon Eod a p occ 35 importing Device Certifieates isi 25 deo ok oie or aoc do Sox aon a Do e ded Acme a 35 Initial COntlSUratlOn iudi ibus Eee RpewrtroRdedstete eei eee 37 Basic Setup for Secure Access Appliances 37 Licensing and Configuring Your Secure Access 39 Maintenance Hardware Replacement leeren hn 43 Replacing the Cooling Faris secre egere Oe ere ERUP PPS os 43 Replacing a Hardi DVE cens aii sous oe ent eA UNE XA DERE Ris 44 Replacing OC Modul s 44 4 varier tru bey wed Ru Woe mares dede 44 Replacing a Power SUDDIy za desee e I irune pr SER quar deka aay 46 LED BenaViOk 2 mac disegno xy eame a ebat deA oS eben uie a bran on 49 Device Status LED Behavior 2 49 Ethernet Port LED Behavior 0 0 aen 50 FIPS Device Status LED Behavior 51 PassWOL
49. rming that the machine has joined the cluster click the System Clustering Cluster Status tab in the admin console of any active cluster member When all nodes have exited from the Transitioning state connect to the serial console of each node that has a non CL license and enter 9 to select FIPS Options and then 1to select Complete import of keystore and server certificates Enter the cluster keystore restore password Copyright O 2012 Juniper Networks Inc 27 SA Series 4500 6500 and FIPS Appliances Related FIPS Overview on page 9 Documentation Deploying a Cluster in a Secure Access FIPS Environment In addition to sharing state user profile user session and monitoring state data the members of a Secure Access FIPS cluster also share security world data All cluster members share the same private key and are accessible using the same administrator cards Since changing a security world requires physical access to a cryptographic module however Secure Access FIPS cluster members cannot share all of their data using the standard Secure Access synchronization process Instead to create a Secure Access FIPS cluster you must Create a cluster of Secure Access FIPS machines through the admin console As with a standard Secure Access cluster each cluster node in a Secure Access FIPS cluster is initialized using system state data from the specified cluster member overwriting all existing data on the node machine
50. rt 2 Port 3 LINK LINK LINK ACT SPD ACTSPD ACT SPD Les Internal Ports External Ports The Secure Access Service indicates in a message on the System gt Network gt Overview page of the administrator admin console whether or not the failover functionality is enabled Copyright 2012 Juniper Networks Inc 3 SA Series 4500 6500 and FIPS Appliances Bonding ports cannot span separate networks multi homed Management port The SA6500 s management port Enables seamless integration into a dedicated Management Network e Provides continuously available management access to the Secure Access Service Enables you to perform management activities without impacting user traffic Allows you to separate administrative access from user access between the Secure Access Service and Enterprise devices on the internal network You can configure the Management port information and advanced settings via the admin console just as you would configure the internal port SFP ports 4 port Small Form factor Pluggable SFP ports are available as an optional feature for link redundancy to internal switches Status LEDs Three device status LEDs are located on the left side of the front panel to display power hard disk access and fault status Ethernet Port LEDs The Ethernet port LEDs show the status of each Ethernet port The appliance supports up to four node active active clusters or 2 node active pas
51. s S pea are n 49 Table 57 Device Status EDS aseo ond esu ovd os kd b p PAG T CES 49 Table 6 4 Port Copper Gigabit Ethernet LEDs available on IC4500 and ICOSG 22 2 hassan nico ted de Ad dX das dal dosmmbisa sien tele ins 50 Table 7 Status BED Js soa esat beta hol Ud bb Bore e dos tee unseres 5 SA Series 4500 6500 and FIPS Appliances vi Copyright 2012 Juniper Networks Inc About the Documentation Documentation and Release Notes on page vii Supported Platforms on page vii Documentation Conventions on page vii Documentation Feedback on page ix Requesting Technical Support on page ix Documentation and Release Notes To obtain the most current version of all Juniper Networks technical documentation see the product documentation page on the Juniper Networks website at http www juniper net techpubs If the information in the latest release notes differs from the information in the documentation follow the product Release Notes Juniper Networks Books publishes books by Juniper Networks engineers and subject matter experts These books go beyond the technical documentation to explore the nuances of network architecture deployment and administration The current list can be viewed at http www juniper net books Supported Platforms For the features described in this document the following platforms are supported e SA6500 FIPS SA4500 FIPS SA6500 SA4500 Documentation Conventions
52. securely store the RSA private keys in the HSM s encrypted database These credentials are used by the Secure Access Service processes to carry out RSA operations The keys will never be available for use outside the HSM You can later change the web password but not the web username In a cluster you can perform this operation from any node The new password is updated to the other nodes automatically e NOTE Changing the web user password restarts the web server To change the web password 1 Connect to the serial console of the FIPS appliance you want to reset Enter 9 to select FIPS Option Enter 3 to select Change web user password Enter the existing web user password Enter the new password e NOTE The SA Series FIPS appliance is said to be in a disassociated state when the key store state in the cache and on disk are different As a security measure you cannot change the web user password when the appliance is in a disassociated state The option is disabled To resolve a disassociated state connect to the serial console and reload the FIPS keystore database Option 9 Sub option 1 FIPS Overview on page 9 Copyright O 2012 Juniper Networks Inc CHAPTER 14 HSM Firmware Upgrading the HSM Firmware on page 55 Upgrading the HSM Firmware Some system software upgrades may also require firmware updates Typically firmware upgrades occur during the boot process After the system software updates the s
53. senectt acne viii H hard drive replacing hardware amp bOUT nn HSM card resetting FIPS device 61 HSM firmware upgrading FIPS device 55 Copyright 2012 Juniper Networks Inc l initializing keystore FIPS device K keystore importing and exporting FIPS ave keystore initializing FIPS device L led device Status 49 led ethernet iii 50 LEDS FIPS device eee tete eter 5 M manuals COMMENTS On eese rennen nnne tenere nene ix P parentheses in syntax descriptions ix power supply replacing eene 46 R restting HSM card FIPS device 61 S SA 4500 6500 FIPS oOverview eese 9 security officer password changing FIPS device ettet eet inei estes 53 security officer name and password restrictions BIPS device i eerte ne er 15 support technical See technical support Syntax cOonVentiONnS is sereine viii T technical support contacting JTAC rene ix W web user password changing FIPS device 54 65 SA Series 4500 6500 and FIPS Appliances 66 Copyright 2012 Juniper Networks Inc
54. sive SA Series 6500 Field Replaceable Units The SA 6500 chassis features three types of field replaceable units FRUs that you can add or replace The FRUs are hot swappable meaning you do not have to first shut down the SA 6500 before adding or replacing any of the FRUs The SA4500 hasa cold swappable power supply For safety information refer to the Juniper Networks Products Safety Guide available on the Juniper Networks Support site Hard disks The SA6500 ships with one hard disk however you can add an optional second hard disk to the SA6500 chassis to offer component redundancy and help minimize the Secure Access Service down time When a second redundant hard disk is installed it maintains an exact copy of the software image and configuration information on the working hard disk Therefore if the working hard disk fails the redundant hard disk immediately assumes responsibility for all Secure Access Service operations This function is referred to as the Redundant Array of Independent Disks RAID mirroring process e NOTE The SA6500 hard disk modules are hot swappable You must make sure that the Secure Access Service finishes booting and is operating correctly before removing replacing or upgrading a hard disk module After you insert a new hard disk module you must wait until the RAID mirroring process is completely finished which takes approximately 4O minutes before rebooting or turning off the Secure Acc
55. ure Access on page 39 Licensing and Configuring Your Secure Access After you install Secure Access and perform basic setup you are ready to install the most current Secure Access OS service package license Secure Access verify accessibility and complete the configuration process Related Documentation To install the most current Secure Access OS service package license your Secure Access and create a test user to verify user accessibility follow the task guide embedded in the administrator Web console To test initial set up and continue configuring your Secure Access see Getting Started Secure Access Appliances on page 13 Installing Secure Access Appliance Hardware on page 25 Basic Setup for Secure Access Appliances on page 37 Copyright 2012 Juniper Networks Inc 39 SA Series 4500 6500 and FIPS Appliances 40 Copyright 2012 Juniper Networks Inc PART 4 Maintenance Hardware Replacement on page 43 LED Behavior on page 49 Passwords on page 53 HSM Firmware on page 55 Administrator Cards on page 57 Copyright O 2012 Juniper Networks Inc 41 SA Series 4500 6500 and FIPS Appliances 42 Copyright 2012 Juniper Networks Inc CHAPTER 11 Hardware Replacement Replacing the Cooling Fans on page 43 Replacing a Hard Drive on page 44 Replacing IOC Modules on page 44 Replacing a Power Supply on page 46 Replacing the Cooling Fans The SA 6500 ships with two cooli
56. ut performing the serial console step above you are prompted to import the keystore during the boot process Enter y to import the keystore If you do not enter y within five seconds the FIPS appliance continues to boot normally If this occurs perform the serial console step after the FIPS appliance completes its boot process If the FIPS appliance is in a cluster go to each node within the cluster and perform the serial console step above to complete the keystore import process Related FIPS Overview on page 9 Documentation Copyright 2012 Juniper Networks Inc 33 SA Series 4500 6500 and FIPS Appliances 34 Copyright 2012 Juniper Networks Inc CHAPTER 9 Device Certificates Importing Device Certificates on page 35 Importing Device Certificates To import a device certificate generate a CSR from the appliance and then import its corresponding certificate after it is validated by a CA Each CSR request generates a new RSA key pair NOTE Device certificates without a CSR request from the appliance cannot be imported D NOTE The SA Series FIPS appliance is said to be in a disassociated state when the key store state in the cache and on disk are different As a security measure you cannot create or delete a CSR when the appliance is in a disassociated state The options are grayed out To resolve a disassociated state connect to the serial console and reload the FIPS keystore database Option 9 gt Su
57. w juniper net cm Call 1 888 314 JTAC 1 888 314 5822 toll free in the USA Canada and Mexico For international or direct dial options in countries without toll free numbers see http www juniper net support requesting support html x Copyright 2012 Juniper Networks Inc PART 1 Overview Appliances on page 3 FIPS on page 7 Copyright 2012 Juniper Networks Inc SA Series 4500 6500 and FIPS Appliances 2 Copyright 2012 Juniper Networks Inc CHAPTER Appliances SA4500 and SA6500 on page 3 SA4500 and SA6500 Standard Hardware The SA4500 and SA6500 SA 4500 6500 are next generation appliances featuring a number of notable hardware features The SA 4500 6500 chassis features the following hardware components Console port You use the console port to initially set up the SA 4500 6500 before you fully integrate it as the secure gateway to your internal network You can also use the console port to perform certain configuration and clustering tasks after the Secure Access Service begins operating as the secure gateway Bonding ports By default on the SA6500 only the Secure Access Service uses bonding of the multiple ports to provide failover protection Bonding two ports on the Secure Access Service automatically shifts traffic to the secondary port when the primary port fails The SA6500 appliance bonds ports as follows Internal port Port 0 Port 1 External port Po

Download Pdf Manuals

image

Related Search

Related Contents

DMX_Splitter IP65_User_man_eng_v1-0  Télécharger la version PDF  無線LAN機器に関するレンタル約款 このレンタル約款  Friteuses à gaz de la série Decathlon (modèles D et HD)    op manual - MBM Corporation  Powerhouse LMS User Manual  A D D E N D U M #1  

Copyright © All rights reserved.
Failed to retrieve file