Enterasys Networks XSR-3250 Module Interfaces, Emi/Emc, Copyright 2003 Enterasys Networks Page 8

Page 8

The software image is contained in a single file with the power-up diagnostics. It is based on the Nortel Open IP design model and runs on top of the VxWorks operating system.

The modules are intended to meet overall FIPS 140-2 Level 2 requirements (see Table 2).

Section

Section Title

Level

1

Cryptographic Module Specification

2

2

Cryptographic Module Ports and Interfaces

2

3

Roles, Services, and Authentication

2

4

Finite State Model

2

5

Physical Security

2

6

Operational Environment

N/A

7

Cryptographic Key Management

2

8

EMI/EMC

2

9

Self-tests

2

10

Design Assurance

2

11

Mitigation of Other Attacks

N/A

Table 2 – Intended Level Per FIPS 140-2 Section

Module Interfaces

The XSR-1805 provides a number of physical ports:

Two 10/100BaseT FastEthernet LAN ports

One console port

Two PCM slots

One PCMCIA slot for the optional CompactFlash card

© Copyright 2003 Enterasys Networks Page 8 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Image 8
Contents Fips 140-2 Non-Proprietary Security Policy Table of Contents Purpose ReferencesDocument Organization Copyright 2003 Enterasys Networks Page 3Copyright 2003 Enterasys Networks Page 4 Overview Copyright 2003 Enterasys Networks Page 5Cryptographic Module Copyright 2003 Enterasys Networks Page 7 Module Interfaces EMI/EMCSelf-tests Design Assurance Mitigation of Other Attacks Copyright 2003 Enterasys Networks Page 8Copyright 2003 Enterasys Networks Page 9 Module Physical Ports Fips 140-2 Logical Interface Copyright 2003 Enterasys Networks Page 10Roles and Services Copyright 2003 Enterasys Networks Page 11SSH SnmpVPN Copyright 2003 Enterasys Networks Page 14 Authenticate to the module during IKE. ThisIKE Algorithm using a 1024 bit key pair Physical SecurityOperational Environment Mechanism is as strong as the RSACryptographic Key Management Fips 186-2 Prng Copyright 2003 Enterasys Networks Page 18 Copyright 2003 Enterasys Networks Page 19 Self-Tests Copyright 2003 Enterasys Networks Page 20Copyright 2003 Enterasys Networks Page 21 Design AssuranceMitigation of Other Attacks Crypto Officer Guidance Copyright 2003 Enterasys Networks Page 22Enter copy running-config startup-config Copyright 2003 Enterasys Networks Page 23User Guidance Copyright 2003 Enterasys Networks Page 24XSR Copyright 2003 Enterasys Networks Page 25