Enterasys Networks XSR-1850, XSR-1805, XSR-3250 Module Physical Ports Fips 140-2 Logical Interface

Page 10

Three 10/100/1000BaseT GigabitEthernet LAN ports with two LEDs on each port, instead of the two 10/100BaseT FastEthernet LAN ports

Mini-Gigabit Interface Converter (MGBIC) fiberoptic port plus two LEDs

Two NCC slots with two NIM slots on each card

No power switch

No default configuration button

All of these physical ports are separated into logical interfaces defined by FIPS 140-2, as described in Table 3:

Module Physical Ports

FIPS 140-2 Logical Interface

Network ports

Data input interface

Network ports

Data output interface

Network ports, console port,

Control input interface

power switch (XSR-18xx only),

 

default button (XSR-18xx only)

 

Network ports, console port,

Status output interface

LEDs

 

Power connector(s)

Power interface

Table 3 – FIPS 140-2 Logical Interfaces

Data input and output, control input, and status output are defined as follows:

Data input and output are the packets that use the firewall, VPN, and routing functionalities of the modules.

Control input consists of manual control inputs for power and reset through the power and reset switch. It also consists of all of the data that is entered into the module while using the management interfaces.

Status output consists of the status indicators displayed through the LEDs and the status data that is output from the modules while using the management interfaces.

The modules distinguish between different forms of data, control, and status traffic over the network ports by analyzing the packets header information and contents.

© Copyright 2003 Enterasys Networks Page 10 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 10
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents Document Organization PurposeReferences Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Overview Copyright 2003 Enterasys Networks Page 5Cryptographic Module Copyright 2003 Enterasys Networks Page 7 Self-tests Design Assurance Mitigation of Other Attacks Module InterfacesEMI/EMC Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Module Physical Ports Fips 140-2 Logical Interface Copyright 2003 Enterasys Networks Page 10Roles and Services Copyright 2003 Enterasys Networks Page 11SSH SnmpVPN IKE Authenticate to the module during IKE. ThisCopyright 2003 Enterasys Networks Page 14 Operational Environment Algorithm using a 1024 bit key pairPhysical Security Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Self-Tests Copyright 2003 Enterasys Networks Page 20Mitigation of Other Attacks Design AssuranceCopyright 2003 Enterasys Networks Page 21 Crypto Officer Guidance Copyright 2003 Enterasys Networks Page 22Enter copy running-config startup-config Copyright 2003 Enterasys Networks Page 23User Guidance Copyright 2003 Enterasys Networks Page 24XSR Copyright 2003 Enterasys Networks Page 25