Motorola S2500 manual The definition of all supported roles is shown in below

Models: S2500

1 18
Download 18 pages 22.72 Kb
Page 9
Image 9
The definition of all supported roles is shown in Table 5 below.

MNR S2500 Security Policy

Version 1.3, Revision Date: 1/13/2009

strings consisting of 7 to 15 characters chosen from the 94 standard keyboard characters. Upon correct authentication, the role is selected based on the username of the operator. At the end of a session, the operator must log-out.

When a router power cycles, sessions are terminated. A user must reauthenticate to access the router.

Multiple concurrent operators. Each operator has an independent session with the router, either though Telnet, SSH, or via the console. Once authenticated to a role, each operator can access only those services for that role. In this way, separation is maintained between the role and services allowed for each operator.

The definition of all supported roles is shown in Table 5 below.

 

Role

 

Type of

 

Authentication Data

 

 

Description

 

 

 

Authentication

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Crypto Officer

Role-based operator

 

Username and Password. The

 

The owner of the cryptographic

 

(Super User)

authentication.

 

module stores user identity

 

module with full access to services of

 

 

 

 

 

information internally or if

 

the module.

 

 

 

 

 

configured,

 

 

 

 

 

 

 

 

 

 

 

Network

Role-based operator

 

Username and Password. The

 

A user of the cryptographic module

 

Manager

authentication.

 

module stores user identity

 

with almost full access to services of

 

 

 

 

 

information internally.

 

the module.

 

 

 

 

 

 

 

 

Admin

Role-based operator

 

Username and Password. The

 

An assistant to the Crypto Officer

 

 

 

authentication

 

module stores user identity

 

that has read only access to a subset

 

 

 

 

 

information internally.

 

of module configuration and status

 

 

 

 

 

 

 

 

indications.

 

 

 

 

 

 

 

 

User

Role-based operator

 

Username and Password. The

 

A user of the cryptographic module

 

 

 

authentication

 

module stores user identity

 

that has read only access to a subset

 

 

 

 

 

information internally.

 

of module configuration and status

 

 

 

 

 

 

 

 

indications.

 

 

 

 

 

 

 

Maintenance

None (see comment)

 

N/A

Maintenance role can be entered via

 

 

 

 

 

 

 

 

the external console port

 

 

 

 

 

 

 

 

(unauthenticated) or via EOS

 

 

 

 

 

 

 

 

software command (requires

 

 

 

 

 

 

 

 

Network Manager authentication)

 

 

 

 

 

 

 

 

 

 

Table 5 – Roles and Required Identification and Authentication

Authentication Mechanism

 

Strength of Mechanism

 

 

 

Username and Password

 

The probability that a random attempt will succeed or

 

 

a false acceptance will occur is 1/94^7 which is less

 

 

than 1/1,000,000.

 

 

 

 

Table 6 – Strengths of Authentication Mechanisms

Page 9

Page 9
Image 9
Motorola S2500 manual The definition of all supported roles is shown in below