Enterasys Networks XSR-1805, XSR-1850 Introduction, Purpose, References, Document Organization

Models: XSR-3250 XSR-1850 XSR-1805

1 25
Download 25 pages 10.71 Kb
Page 3
Image 3

Introduction

Purpose

This document is a nonproprietary Cryptographic Module Security Policy for the Enterasys Networks XSR-1805, XSR-1850, and XSR-3250 appliances. This security policy describes how the XSR-1805, XSR-1850, and XSR-3250 meet the security requirements of FIPS 140-2 and how to run the modules in a secure FIPS 140-2 mode. This policy was prepared as part of the Level 2 FIPS 140-2 validation of the module.

FIPS 140-2 (Federal Information Processing Standards Publication 140-2

Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules. More information about the FIPS 140-2 standard and validation program is available on the NIST Web site at http://csrc.nist.gov/cryptval/.

The Enterasys Networks XSR-1805, XSR-1850, and XSR-3250 appliances are referenced in this document as X-Pedition Security Routers, XSR modules, and the modules. The XSR-1805 and XSR-1850 modules are also referenced as the XSR-18xx modules. The differences between the three modules are cited where appropriate.

References

This document deals only with operations and capabilities of the module in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is available on the module from the following sources:

The Enterasys Networks Web site (http://www.enterasys.com/) contains information on all Enterasys Networks products.

The NIST Validated Modules Web site (http://csrc.ncsl.nist.gov/cryptval/) contains contact information for answers to technical or sales-related questions for the module.

Document Organization

The Security Policy document is one document in a FIPS 140-2 Submission Package. In addition to this document, the Submission Package contains:

Vendor Evidence document

Finite State Machine

Other supporting documentation as additional references

© Copyright 2003 Enterasys Networks Page 3 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Page 3
Image 3
Enterasys Networks XSR-1805, XSR-1850, XSR-3250 manual Introduction, Purpose, References, Document Organization