Enterasys Networks XSR-3250, XSR-1805, XSR-1850 manual Table of Contents

Page 2

Table of Contents

 

INTRODUCTION

3

PURPOSE

3

REFERENCES

3

DOCUMENT ORGANIZATION

3

ENTERASYS NETWORKS XSR-1805,XSR-1850, AND XSR-3250

5

OVERVIEW

5

CRYPTOGRAPHIC MODULE

6

MODULE INTERFACES

8

ROLES AND SERVICES

11

Crypto Officer Role

11

User Role

14

Authentication Mechanisms

14

PHYSICAL SECURITY

14

OPERATIONAL ENVIRONMENT

14

CRYPTOGRAPHIC KEY MANAGEMENT

16

Key Generation

18

Key Establishment

18

Key Entry and Output

18

Key Storage

19

Key Zeroization

19

SELF-TESTS

20

DESIGN ASSURANCE

21

MITIGATION OF OTHER ATTACKS

21

SECURE OPERATION

22

CRYPTO OFFICER GUIDANCE

22

Initial Setup

22

Management

23

USER GUIDANCE

24

ACRONYMS

25

© Copyright 2003 Enterasys Networks Page 2 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 2
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents Document Organization PurposeReferences Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Overview Copyright 2003 Enterasys Networks Page 5Cryptographic Module Copyright 2003 Enterasys Networks Page 7 Self-tests Design Assurance Mitigation of Other Attacks Module InterfacesEMI/EMC Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Module Physical Ports Fips 140-2 Logical Interface Copyright 2003 Enterasys Networks Page 10Roles and Services Copyright 2003 Enterasys Networks Page 11SSH SnmpVPN Copyright 2003 Enterasys Networks Page 14 Authenticate to the module during IKE. ThisIKE Operational Environment Algorithm using a 1024 bit key pairPhysical Security Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Self-Tests Copyright 2003 Enterasys Networks Page 20Copyright 2003 Enterasys Networks Page 21 Design AssuranceMitigation of Other Attacks Crypto Officer Guidance Copyright 2003 Enterasys Networks Page 22Enter copy running-config startup-config Copyright 2003 Enterasys Networks Page 23User Guidance Copyright 2003 Enterasys Networks Page 24XSR Copyright 2003 Enterasys Networks Page 25