SECURE OPERATION
The XSR modules meet level 2 requirements for FIPS
The User can use the module after the Crypto Officer changes the mode of operation to FIPS mode. The secure operation for the User is described in “User Guidance” on page 24.
Crypto Officer Guidance
The secure operation procedures for the Crypto Officer are covered in the initial setup and Management section. Following these procedures ensure that the module runs in a
Initial Setup
The Crypto Officer receives the module in a carton. Within the carton the module is placed inside an ESD bag. The Crypto Officer should examine the carton and the ESD bag for evidence of tampering.
Since the module does not enforce an access control mechanism before it is initialized, the Crypto Officer must maintain control of the module at all times until the initial setup is complete.
Before turning on the module, the Crypto Officer must ensure that the module meets level 2 physical security requirements. To satisfy these requirements, the Crypto Officer must apply the
After all the labels are in place, the Crypto Officer can open a Console session to the XSR using Microsoft’s HyperTerminal, Procomm or other program. The session properties must be set as follows: BPS – 9600, Data bits – 8, Parity – none, Stop bits – 1, Flow control – none.
Setting Passwords
During the first five seconds of initialization, the Crypto Officer must press the key combination
To set the Bootrom password
1. Enter bp
© Copyright 2003 Enterasys Networks Page 22 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.