Enterasys Networks XSR-3250, XSR-1805, XSR-1850 Overview, Copyright 2003 Enterasys Networks Page 5

Page 5

ENTERASYS NETWORKS XSR-1805, XSR-1850, AND XSR-3250

Overview

Part of the Enterasys Networks X-Pedition Security Router (XSR) series, the XSR-1805, XSR-1850, and XSR-3250 modules are networking devices that combine a broad range of IP routing features, a broad range of WAN interfaces and a rich suite of network security functions, including site-to-site and remote access VPN connectivity and policy managed, stateful-inspection firewall functionality.

The XSR-18xx modules were designed to meet the requirements of the branch office, while the XSR-3250 was specifically designed for the regional office. A typical deployment of the modules is shown in Figure 1 below.

Figure 1 – Typical Deployment of the XSR Modules

The XSR-1805 is an entry-level, modular router in a desktop form factor delivering powerful performance and features to address the WAN, VPN, and firewall needs of remote offices.

The XSR-1850 varies mainly in its performance and type of enclosure, when compared to the XSR-1805. Delivering faster performance; a rack- mount form factor; and the option for redundant power, the XSR-1850 is

© Copyright 2003 Enterasys Networks Page 5 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 5
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents References PurposeDocument Organization Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Copyright 2003 Enterasys Networks Page 5 OverviewCryptographic Module Copyright 2003 Enterasys Networks Page 7 EMI/EMC Module InterfacesSelf-tests Design Assurance Mitigation of Other Attacks Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Copyright 2003 Enterasys Networks Page 10 Module Physical Ports Fips 140-2 Logical InterfaceCopyright 2003 Enterasys Networks Page 11 Roles and ServicesSnmp SSHVPN Copyright 2003 Enterasys Networks Page 14 Authenticate to the module during IKE. ThisIKE Physical Security Algorithm using a 1024 bit key pairOperational Environment Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Copyright 2003 Enterasys Networks Page 20 Self-TestsCopyright 2003 Enterasys Networks Page 21 Design AssuranceMitigation of Other Attacks Copyright 2003 Enterasys Networks Page 22 Crypto Officer GuidanceCopyright 2003 Enterasys Networks Page 23 Enter copy running-config startup-configCopyright 2003 Enterasys Networks Page 24 User GuidanceCopyright 2003 Enterasys Networks Page 25 XSR