2.5Key Management
The switch securely administers both cryptographic keys and other critical security parameters such as User passwords. Ephemeral sessions keys are created during the negotiation of secure tunnels on behalf of Users who have successfully authenticated themselves to the switch with their user ID and password. These keys are created for protocols like
Keys are destroyed when the appropriate tunnel, SA, or session is terminated and are never archived or released from the device. User passwords can be destroyed by Crypto Officers, or by users overwriting their own passwords. All passwords are stored in the LDAP database in an encrypted format, and never released. They are used only for authentication in key exchange protocols, which each protect CSPs according to their protocol. (Crypto Officers should be aware that PAP transmits password information in the clear and should not be enabled before deciding local policy. See notes on PAP in the Managing the Contivity Extranet Switch (page
2.6Self Tests
In order to prevent any secure data being released, it is important to test the cryptographic components of a security module to insure all components are functioning correctly. The Contivity Switch includes an array of
If any of these
3 Secure Operation of the Contivity Switch
The Contivity Switch is a versatile machine; it can be run in a Normal Operating Mode or a FIPS Operating Mode. In FIPS operating mode, the switch meets all the Level 2 requirements for FIPS
1 requirements. These include the following:
© Copyright 2000 Nortel Networks. | 13 |