Enterasys Networks XSR-1850, XSR-1805, XSR-3250 Xsr, Copyright 2003 Enterasys Networks Page 25

Page 25

ACRONYMS

AAA

Authentication, Authorization, and Accounting

AES

Advanced Encryption Standard

ANSI

American National Standards Institute

BOM

Bill of Materials

CLI

Command Line Interface

CSP

Critical Security Parameter

DES

Data Encryption Standard

DSA

Digital Signature Standard

EDC

Error Detection Code

EMC

Electromagnetic Compatibility

EMI

Electromagnetic Interference

ESD

Electro Static Dissipative

FCC

Federal Communication Commission

FIPS

Federal Information Processing Standard

FTP

File Transfer Protocol

IKE

Internet Key Exchange

IPSec

IP Security

KAT

Known Answer Test

L2TP

Layer 2 Tunneling Protocol

LAN

Local Area Network

LED

Light Emitting Diode

MAC

Message Authentication Code

MIB

Management Information Base

NIM

Network Interface Module

NIST

National Institute of Standards and Technology

NVRAM

Nonvolatile Random Access Memory

PRNG

Pseudo Random Number Generator

RAM

Random Access Memory

RADIUS

Remote Authentication Dial-in User Service

RSA

Rivest Shamir and Adleman

SHA

Secure Hash Algorithm

SNMP

Simple Network Management Protocol

SP

Security Parameters

SSH

Secure Shell

TFTP

Trivial File Transfer Protocol

VPN

Virtual Private Network

WAN

Wide Area Network

XSR

X-Pedition Security Router

© Copyright 2003 Enterasys Networks Page 25 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 25
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents References PurposeDocument Organization Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Copyright 2003 Enterasys Networks Page 5 OverviewCryptographic Module Copyright 2003 Enterasys Networks Page 7 EMI/EMC Module InterfacesSelf-tests Design Assurance Mitigation of Other Attacks Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Copyright 2003 Enterasys Networks Page 10 Module Physical Ports Fips 140-2 Logical InterfaceCopyright 2003 Enterasys Networks Page 11 Roles and ServicesSnmp SSHVPN IKE Authenticate to the module during IKE. ThisCopyright 2003 Enterasys Networks Page 14 Physical Security Algorithm using a 1024 bit key pairOperational Environment Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Copyright 2003 Enterasys Networks Page 20 Self-TestsMitigation of Other Attacks Design AssuranceCopyright 2003 Enterasys Networks Page 21 Copyright 2003 Enterasys Networks Page 22 Crypto Officer GuidanceCopyright 2003 Enterasys Networks Page 23 Enter copy running-config startup-configCopyright 2003 Enterasys Networks Page 24 User GuidanceCopyright 2003 Enterasys Networks Page 25 XSR