Polycom VSX 5000 Table of Contents, Table of Figures, Table of Tables, Introduction, Acronyms

Models: VSX 5000

1 23
Download 23 pages 1.71 Kb
Page 3
Image 3
Table of Contents

Non-Proprietary Security Policy, Version 1.0June 15, 2007

Table of Contents

0 INTRODUCTION

5

0.1

PURPOSE

5

0.2

REFERENCES

5

0.3

DOCUMENT ORGANIZATION

5

1 VSX 3000, VSX 5000, AND VSX 7000S

.............................................................................................................6

1.1

OVERVIEW

6

1.2

MODULE SPECIFICATIONS

6

1.3

MODULE INTERFACES

8

1.4

ROLES AND SERVICES

16

 

1.4.1

Crypto-Officer Role

16

 

1.4.2

User Role

16

 

1.4.3

Authentication

17

 

1.5

PHYSICAL SECURITY

17

 

1.6

OPERATIONAL ENVIRONMENT

17

 

1.7

CRYPTOGRAPHIC KEY MANAGEMENT

17

 

1.7.1

Key Generation

18

 

1.7.2

Key Input/Output

18

 

1.7.3

Key Storage

19

 

1.7.4

Key Zeroization

19

 

1.8

SELF-TESTS

19

 

1.9

DESIGN ASSURANCE

19

2

SECURE OPERATION

20

 

2.1

CRYPTO-OFFICERGUIDANCE

20

 

2.1.1

Initialization

20

 

2.1.2

Management

20

 

2.2

USER GUIDANCE

21

3

ACRONYMS

23

Table of Figures

FIGURE 1 - VSX 3000

6

FIGURE 2 - VSX 5000

7

FIGURE 3 - VSX 7000S

7

FIGURE 4 - VSX 7000E

7

FIGURE 5 - VSX 8000

8

FIGURE 6

- VSX 3000 CONNECTOR PANEL

9

FIGURE 7

- VSX 5000 BACK PANEL

10

FIGURE 8

- VSX 7000E BACK PANEL

12

FIGURE 9

- VSX 7000S BACK PANEL

13

FIGURE 10 - VSX 8000 BACK PANEL

15

Table of Tables

TABLE 1

- SECURITY LEVEL PER FIPS 140-2 SECTION

8

TABLE 2

- MAPPING OF FIPS 140-2 LOGICAL INTERFACES TO VSX 3000, VSX 5000, AND VSX 7000S INTERFACES ...9

TABLE 3

- MAPPING OF FIPS 140-2 LOGICAL INTERFACES TO VSX 5000 INTERFACES

10

Polycom VSX 3000, VSX 5000, and VSX 7000s

Page 3 of 23

© 2007 Polycom, Inc. - This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Page 3
Image 3
Polycom Table of Contents, Table of Figures, Table of Tables, Introduction, VSX 3000, VSX 5000, AND VSX 7000S, Acronyms