beautypg.com

Motorola S2500 User Manual

Page 13

background image

MNR S2500 Security Policy

Version 1.2, Revision Date: 8/8/2008

Page

13

Definition of Public Keys:

The following public keys are contained within the module:

Key

Description/Usage

RSA Firmware Load Key

Distributed to module, for firmware authentication

SSH-RSA Key

Distributed to peer, used for SSH authentication

SSH-DSA Key

Distributed to peer, used for SSH authentication

SSH Known Host Keys

Distributed to module, used to authenticate peer

IKE DH public key (g^a)

Generated for IKE Phase 1 key establishment

IKE DH phase-2 public (g^a)
key

Phase 2 Diffie Hellman public keys used in PFS for key renewal (if
configured)

SSH DH Key

Generated for SSH key establishment

Table 9 – Public Keys

Definition of CSPs Modes of Access

Table 10 defines the relationship between access to CSPs and the different module services. The
modes of access shown in the table are defined as follows:

• Read: the data item is read from memory.
• Write: the data item is written into memory.
• Zeroize: the data item is actively overwritten.