 2
TableofContents
1Introduction .............................................................................................................. 3
1.1 Purpose................................................................................................................. 3
1.2 References............................................................................................................ 3
1.3 DocumentOrganization....................................................................................... 3
2TheContivityExtranet4600Switch....................................................................... 5
2.1 CryptographicModule......................................................................................... 5
2.2 ModuleInterfaces................................................................................................ 5
2.3 PhysicalSecurity.................................................................................................. 7
2.4 RolesandServices............................................................................................. 10
2.4.1CryptoOfficerServices............................................................................... 11
2.4.2UserServices............................................................................................... 12
2.5 KeyManagement............................................................................................... 13
2.6 Self-tests............................................................................................................. 14
3SecureOperationoftheContivitySwitch............................................................ 15