Enterasys Networks XSR-3250, XSR-1805, XSR-1850 manual Enter copy running-config startup-config

Page 23

2.At the prompt <Enter current password: >, press Enter.

3.At the prompt <Enter new password: >, enter the password.

4.At the prompt <Re-enter new password: >, re-enter the password.

5.At the prompt, enter bc for cold boot.

The Crypto Officer must now set the at least six character long CLI password.

To set the CLI password

1.When the XSR login appears, enter admin and enter no (blank) password.

2.At the CLI prompt, enter enable to acquire Privileged EXEC mode.

3.Enter configure to acquire Global mode.

4.Enter username <Super Crypto Officer name> privilege 15 password secret 0 <password>.

5.Enter exit.

6.Enter copy running-config startup-config.

7.At the prompt, enter y.

If the Super Crypto Officer name is not admin, the Super Crypto Officer must log into the newly created account and delete the admin user.

After setting the Bootrom and CLI passwords, the Crypto Officer can configure the LAN ports and activate SSH to enable the remote management of the module. For directions, refer to the XSR Quick Start Guide, XSR Getting Started Guide, XSR User’s Guide, and the CLI Reference Guide.

Management

The Crypto Officer must ensure that the module is always operating in a FIPS-approved mode of operation. This can be achieved by ensuring the following:

Passwords must be at least six characters long.

Telnet access must be disabled unless used over IPSec.

© Copyright 2003 Enterasys Networks Page 23 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 23
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents Copyright 2003 Enterasys Networks Page 3 PurposeReferences Document OrganizationCopyright 2003 Enterasys Networks Page 4 Copyright 2003 Enterasys Networks Page 5 OverviewCryptographic Module Copyright 2003 Enterasys Networks Page 7 Copyright 2003 Enterasys Networks Page 8 Module InterfacesEMI/EMC Self-tests Design Assurance Mitigation of Other AttacksCopyright 2003 Enterasys Networks Page 9 Copyright 2003 Enterasys Networks Page 10 Module Physical Ports Fips 140-2 Logical InterfaceCopyright 2003 Enterasys Networks Page 11 Roles and ServicesSnmp SSHVPN Copyright 2003 Enterasys Networks Page 14 Authenticate to the module during IKE. ThisIKE Mechanism is as strong as the RSA Algorithm using a 1024 bit key pairPhysical Security Operational EnvironmentCryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Copyright 2003 Enterasys Networks Page 20 Self-TestsCopyright 2003 Enterasys Networks Page 21 Design AssuranceMitigation of Other Attacks Copyright 2003 Enterasys Networks Page 22 Crypto Officer GuidanceCopyright 2003 Enterasys Networks Page 23 Enter copy running-config startup-configCopyright 2003 Enterasys Networks Page 24 User GuidanceCopyright 2003 Enterasys Networks Page 25 XSR