Enterasys Networks XSR-3250, XSR-1805 Table of Contents, Introduction, Secure Operation, Acronyms

Models: XSR-3250 XSR-1850 XSR-1805

1 25
Download 25 pages 10.71 Kb
Page 2
Image 2

Table of Contents

 

INTRODUCTION

3

PURPOSE

3

REFERENCES

3

DOCUMENT ORGANIZATION

3

ENTERASYS NETWORKS XSR-1805,XSR-1850, AND XSR-3250

5

OVERVIEW

5

CRYPTOGRAPHIC MODULE

6

MODULE INTERFACES

8

ROLES AND SERVICES

11

Crypto Officer Role

11

User Role

14

Authentication Mechanisms

14

PHYSICAL SECURITY

14

OPERATIONAL ENVIRONMENT

14

CRYPTOGRAPHIC KEY MANAGEMENT

16

Key Generation

18

Key Establishment

18

Key Entry and Output

18

Key Storage

19

Key Zeroization

19

SELF-TESTS

20

DESIGN ASSURANCE

21

MITIGATION OF OTHER ATTACKS

21

SECURE OPERATION

22

CRYPTO OFFICER GUIDANCE

22

Initial Setup

22

Management

23

USER GUIDANCE

24

ACRONYMS

25

© Copyright 2003 Enterasys Networks Page 2 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Page 2
Image 2
Enterasys Networks manual Table of Contents, Introduction, ENTERASYS NETWORKS XSR-1805, XSR-1850, AND XSR-3250, Acronyms