June 15, 2007 |
Service
Secured call on IP network
Secured call on ISDN
Description
Placing secured call on IP network via LAN port
Placing secured call on ISDN via BRI/PRI port
Input
Command and calling information
Command and calling information
Output
Connection established
Connection established
CSP and Access Control
IP Encryption Key – Read/Write
ISDN Encryption Key
– Read/Write
1.4.3Authentication
The modules were not tested for
1.5 Physical Security
The VSX 3000, VSX 5000, and VSX 7000s are
The VSX systems were tested and found conformant to the Electromagnetic Interference/Electromagnetic Compatibility (EMI/EMC) requirements specified by 47 Code of Federal Regulations, Part 15, Subpart B, Unintentional Radiators, Digital Devices, Class A (i.e., for business use).
1.6 Operational Environment
The operational environment requirements do not apply to the VSX 3000, VSX 5000, and VSX 7000s. The modules do not provide a general purpose Operating System (OS) and only allow the updating of image components after checking a Digital Signature Algorithm (DSA) signature on new software images.
1.7 Cryptographic Key Management
The VSX modules implement the following
∙AES (CBC, OFB) - key sizes 128, 192, 256 (Cert #431)
∙FIPS
∙Secure Hashing Algorithm
∙TDES (CBC) 1, 2, 3 keying options (Cert #460)
∙DSA (verify) 1024 bits (Cert #178)
Additionally, the module utilizes the following
∙
∙RSA (key wrapping, key establishment methodology provides
∙Hardware Random Number Generator (RNG) – for seeding the FI
The module supports the following critical security parameters:
Table 9 - List of Cryptographic Keys, Cryptographic Key Components, and CSPs
Key | Key Type | Generation / |
|
| Input |
|
|
|
Polycom VSX 3000, VSX 5000, and VSX 7000s
Output
Storage
Zeroization
Use
Page 17 of 23
© 2007 Polycom, Inc. - This document may be freely reproduced and distributed whole and intact including this Copyright Notice.