Enterasys Networks XSR-1805, XSR-1850, XSR-3250 manual Cryptographic Module

Page 6

ideal to support mission- critical applications extending to the branch office.

The XSR-3250 offers nearly ten times the performance speed of the XSR- 1850 and approximately 15 times more VPN tunnels. Coupling these features with the six network interface module (NIM) slots makes the XSR- 3250 ideally suited to a regional office required to terminate up to six T3/E3 or 24 T1/E1 connections. A redundant power supply is included.

The features of each XSR module are summarized in Table 1.

XSR Model

XSR-1805

XSR-1850

XSR-3250

NIM Slots

2

2

6

Fixed 10/100/1000 LAN

2 10/100

2 10/100

3

Ports

 

 

 

Optional Gigabit

N/A

N/A

Mini-GBIC

Ethernet

 

 

 

Redundant Power

No

Option

Standard

Supplies

 

 

 

VPN Accelerator

Embedded

Embedded

Embedded

Flash Memory

8 MB

8 MB

8 MB

 

(upgradeable)

(upgradeable)

 

DRAM

32 MB

64 MB

256 MB

 

(upgradeable)

(upgradeable)

(upgradeable)

External Compact Flash

Yes

Yes

Yes

Table 1 - Features At-a-Glance

Some highlighted security features of the XSR modules are:

Telnet over IPSec or SSHv2-secured remote management of the modules

Site-to-Site application VPN using IPSec

Remote access VPN using L2TP over IPSec

Access control through assigned privilege level

User, certificate, and host key database files encrypted with a master encryption key

Cryptographic Module

The XSR modules were evaluated as multi-chip standalone cryptographic modules. The metal enclosure physically encloses the complete set of hardware and software components, and represents the cryptographic boundary of each module.

© Copyright 2003 Enterasys Networks Page 6 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 6
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents Document Organization PurposeReferences Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Overview Copyright 2003 Enterasys Networks Page 5Cryptographic Module Copyright 2003 Enterasys Networks Page 7 Self-tests Design Assurance Mitigation of Other Attacks Module InterfacesEMI/EMC Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Module Physical Ports Fips 140-2 Logical Interface Copyright 2003 Enterasys Networks Page 10Roles and Services Copyright 2003 Enterasys Networks Page 11SSH SnmpVPN Authenticate to the module during IKE. This IKECopyright 2003 Enterasys Networks Page 14 Operational Environment Algorithm using a 1024 bit key pairPhysical Security Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Self-Tests Copyright 2003 Enterasys Networks Page 20Design Assurance Mitigation of Other AttacksCopyright 2003 Enterasys Networks Page 21 Crypto Officer Guidance Copyright 2003 Enterasys Networks Page 22Enter copy running-config startup-config Copyright 2003 Enterasys Networks Page 23User Guidance Copyright 2003 Enterasys Networks Page 24XSR Copyright 2003 Enterasys Networks Page 25