MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
strings consisting of 7 to 15 characters chosen from the 94 standard keyboard characters. Upon correct authentication, the role is selected based on the username of the operator. At the end of a session, the operator must
When a router power cycles, sessions are terminated. A user must reauthenticate to access the router.
Multiple concurrent operators. Each operator has an independent session with the router, either though Telnet, SSH, or via the console. Once authenticated to a role, each operator can access only those services for that role. In this way, separation is maintained between the role and services allowed for each operator.
The definition of all supported roles is shown in Table 5 below.
| Role |
| Type of |
| Authentication Data |
|
| Description |
|
|
| Authentication |
|
|
|
| |||
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| Crypto Officer |
| Username and Password. The |
| The owner of the cryptographic | ||||
| (Super User) | authentication. |
| module stores user identity |
| module with full access to services of | |||
|
|
|
|
| information internally or if |
| the module. | ||
|
|
|
|
| configured, |
|
|
| |
|
|
|
|
|
|
| |||
| Network |
| Username and Password. The |
| A user of the cryptographic module | ||||
| Manager | authentication. |
| module stores user identity |
| with almost full access to services of | |||
|
|
|
|
| information internally. |
| the module. | ||
|
|
|
|
|
|
| |||
| Admin |
| Username and Password. The |
| An assistant to the Crypto Officer | ||||
|
|
| authentication |
| module stores user identity |
| that has read only access to a subset | ||
|
|
|
|
| information internally. |
| of module configuration and status | ||
|
|
|
|
|
|
|
| indications. | |
|
|
|
|
|
|
| |||
| User |
| Username and Password. The |
| A user of the cryptographic module | ||||
|
|
| authentication |
| module stores user identity |
| that has read only access to a subset | ||
|
|
|
|
| information internally. |
| of module configuration and status | ||
|
|
|
|
|
|
|
| indications. | |
|
|
|
|
|
| ||||
| Maintenance | None (see comment) |
| N/A | Maintenance role can be entered via | ||||
|
|
|
|
|
|
|
| the external console port | |
|
|
|
|
|
|
|
| (unauthenticated) or via EOS | |
|
|
|
|
|
|
|
| software command (requires | |
|
|
|
|
|
|
|
| Network Manager authentication) | |
|
|
|
|
|
|
|
|
|
|
Table 5 – Roles and Required Identification and Authentication
Authentication Mechanism |
| Strength of Mechanism |
|
|
|
Username and Password |
| The probability that a random attempt will succeed or |
|
| a false acceptance will occur is 1/94^7 which is less |
|
| than 1/1,000,000. |
|
|
|
| Table 6 – Strengths of Authentication Mechanisms |
Page 9