The software image is contained in a single file with the
The modules are intended to meet overall FIPS
Section | Section Title | Level |
1 | Cryptographic Module Specification | 2 |
2 | Cryptographic Module Ports and Interfaces | 2 |
3 | Roles, Services, and Authentication | 2 |
4 | Finite State Model | 2 |
5 | Physical Security | 2 |
6 | Operational Environment | N/A |
7 | Cryptographic Key Management | 2 |
8 | EMI/EMC | 2 |
9 |
| 2 |
10 | Design Assurance | 2 |
11 | Mitigation of Other Attacks | N/A |
Table 2 – Intended Level Per FIPS
Module Interfaces
The
•Two 10/100BaseT FastEthernet LAN ports
•One console port
•Two PCM slots
•One PCMCIA slot for the optional CompactFlash card
© Copyright 2003 Enterasys Networks Page 8 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.