Enterasys Networks XSR-1850, XSR-1805, XSR-3250 manual Fips 140-2 Non-Proprietary Security Policy

Page 1

XSR-1805, XSR-1850, and XSR-3250

(Hardware Version: REV 0A-G, Software Version: REL 6.3, Firmware Version: REL 6.3)

FIPS 140-2 Non-Proprietary

Security Policy

Level 2 Validation

Version 1.00

September 2003

© Copyright 2003 Enterasys Networks

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 1
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents References PurposeDocument Organization Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Copyright 2003 Enterasys Networks Page 5 OverviewCryptographic Module Copyright 2003 Enterasys Networks Page 7 EMI/EMC Module InterfacesSelf-tests Design Assurance Mitigation of Other Attacks Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Copyright 2003 Enterasys Networks Page 10 Module Physical Ports Fips 140-2 Logical InterfaceCopyright 2003 Enterasys Networks Page 11 Roles and ServicesSnmp SSHVPN IKE Authenticate to the module during IKE. ThisCopyright 2003 Enterasys Networks Page 14 Physical Security Algorithm using a 1024 bit key pairOperational Environment Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Copyright 2003 Enterasys Networks Page 20 Self-TestsMitigation of Other Attacks Design AssuranceCopyright 2003 Enterasys Networks Page 21 Copyright 2003 Enterasys Networks Page 22 Crypto Officer GuidanceCopyright 2003 Enterasys Networks Page 23 Enter copy running-config startup-configCopyright 2003 Enterasys Networks Page 24 User GuidanceCopyright 2003 Enterasys Networks Page 25 XSR