From Juniper SRX SG VPN Security Technical Implementation Guide
Part of SRG-NET-000510
Associated with: CCI-002450
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The network element must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
Verify all Internet Key Exchange (IKE) proposals are set to use the AES encryption algorithm.  show security ike View the value of the encryption algorithm for each defined proposal. If the value of the authentication method and other options are not set to use FIPS-compliant values, this is a finding.
The following example commands configure the IKE (phase 1) proposal.
set security ike proposal
Lavender hyperlinks in small type off to the right (of CSS
id, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header
Powered by sagemincer