Enterasys Networks XSR-3250, XSR-1805, XSR-1850 manual User Role, Authentication Mechanisms

Models: XSR-3250 XSR-1850 XSR-1805

1 25
Download 25 pages 10.71 Kb
Page 14
Image 14

Firewall

 

authorization

configuration data.

commands and

 

 

 

information for

 

configuration data.

 

 

 

network traffic that

 

 

 

 

 

flows through the

 

 

 

 

 

box.

 

 

 

 

Table 4 – Crypto Officer Services, Descriptions, Inputs and Outputs, and CSPs

User Role

The User role accesses the module’s IPSec and IKE services. Service descriptions, inputs and outputs, and CSPs are listed in the following table:

Service

Description

Input

Output

CSP

IKE

Access the module IKE

IKE inputs and data

IKE outputs,

RSA key pair for

 

functionality to

 

status, and data

IKE (read

 

authenticate to the

 

 

access); Diffie-

 

module and negotiate IKE

 

 

Hellman key

 

and IPSec session keys

 

 

pair for IKE

 

 

 

 

(read and write

 

 

 

 

access); pre-

 

 

 

 

shared keys for

 

 

 

 

IKE (read

 

 

 

 

access)

IPSec

Access the module’s

IPSec inputs,

IPSec outputs,

Session keys for

 

IPSec services in order to

commands, and

status, and data

IPSec (read and

 

secure network traffic

data

 

write access)

Table 5 – User Services, Descriptions, Inputs and Outputs

Authentication Mechanisms

The module supports role-based and identity-based authentication. Role- based authentication is performed before the Super Crypto Officer enters Bootrom monitor mode and authenticates with just a password (and no user ID). Identity-based authentication is performed for all other types of Crypto Officer and User authentication. These include password-based authentication, RSA-based authentication, and HMAC-based authentication mechanisms.

The estimated strength of each authentication mechanism is described below.

Authentication Type

Role

Strength

Password-based

Crypto Officer

Passwords are required to be at least six

authentication (CLI, SNMP,

 

characters long. Numeric, alphabetic (upper

and Bootrom monitor mode)

 

and lowercase), and keyboard and

 

 

extended characters can be used, which

 

 

gives a total of 95 characters to choose

 

 

from. Considering only the case-insensitive

 

 

alphabet using a password with repetition,

 

 

the number of potential passwords is 26^6.

RSA-based authentication

User

RSA signing and verification is used to

(IKE)

 

authenticate to the module during IKE. This

© Copyright 2003 Enterasys Networks Page 14 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Page 14
Image 14
Enterasys Networks XSR-3250 manual User Role, Authentication Mechanisms, User Services, Descriptions, Inputs and Outputs