Enterasys Networks XSR-1850, XSR-1805, XSR-3250 manual Copyright 2003 Enterasys Networks Page 7

Page 7

The hardware components for the XSR-18xx modules vary slightly to meet the performance level for each module. The XSR-1850 is an enhancement of the XSR-1805 consisting of the following additional features:

Two fans

External power source connector

One PMC slot for PPMC card

19” 1.5 U rack-mount chassis

64 MB of DRAM

Due to the large difference in performance levels, the XSR-3250 hardware components vary quite significantly, when compared to the XSR-18xx modules. The main differences include the following:

Different processor with two CPU cores

Different hardware encryption accelerator

Two extra NIM Carrier Cards (NCC) slots with two NIM slots on each card

One extra Ethernet port connected to both a miniGBIC module and a RJ45 connector

Dual load-sharing power supplies

Redundant fans

256 MB of DRAM

XSR NIMs will operate on all three XSR modules.

All three modules use the software version XSR Release 6.3. The modules software components consists of three separate executables linked individually:

Bootrom

Power-up Diagnostics

Software image

© Copyright 2003 Enterasys Networks Page 7 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 7
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents Copyright 2003 Enterasys Networks Page 3 PurposeReferences Document OrganizationCopyright 2003 Enterasys Networks Page 4 Copyright 2003 Enterasys Networks Page 5 OverviewCryptographic Module Copyright 2003 Enterasys Networks Page 7 Copyright 2003 Enterasys Networks Page 8 Module InterfacesEMI/EMC Self-tests Design Assurance Mitigation of Other AttacksCopyright 2003 Enterasys Networks Page 9 Copyright 2003 Enterasys Networks Page 10 Module Physical Ports Fips 140-2 Logical InterfaceCopyright 2003 Enterasys Networks Page 11 Roles and ServicesSnmp SSHVPN IKE Authenticate to the module during IKE. ThisCopyright 2003 Enterasys Networks Page 14 Mechanism is as strong as the RSA Algorithm using a 1024 bit key pairPhysical Security Operational EnvironmentCryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Copyright 2003 Enterasys Networks Page 20 Self-TestsMitigation of Other Attacks Design AssuranceCopyright 2003 Enterasys Networks Page 21 Copyright 2003 Enterasys Networks Page 22 Crypto Officer GuidanceCopyright 2003 Enterasys Networks Page 23 Enter copy running-config startup-configCopyright 2003 Enterasys Networks Page 24 User GuidanceCopyright 2003 Enterasys Networks Page 25 XSR