beautypg.com

Polycom VSX 3000 User Manual

Page 3

background image

Non-Proprietary Security Policy, Version 1.0

June 15, 2007

Polycom VSX 3000, VSX 5000, and VSX 7000s

Page 3 of 23

© 2007 Polycom, Inc. -

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

Table of Contents

0

INTRODUCTION ...............................................................................................................................................5

0.1

P

URPOSE

.........................................................................................................................................................5

0.2

R

EFERENCES

...................................................................................................................................................5

0.3

D

OCUMENT

O

RGANIZATION

...........................................................................................................................5

1

VSX 3000, VSX 5000, AND VSX 7000S.............................................................................................................6

1.1

O

VERVIEW

......................................................................................................................................................6

1.2

M

ODULE

S

PECIFICATIONS

..............................................................................................................................6

1.3

M

ODULE

I

NTERFACES

....................................................................................................................................8

1.4

R

OLES AND

S

ERVICES

...................................................................................................................................16

1.4.1

Crypto-Officer Role .............................................................................................................................16

1.4.2

User Role .............................................................................................................................................16

1.4.3

Authentication......................................................................................................................................17

1.5

P

HYSICAL

S

ECURITY

....................................................................................................................................17

1.6

O

PERATIONAL

E

NVIRONMENT

......................................................................................................................17

1.7

C

RYPTOGRAPHIC

K

EY

M

ANAGEMENT

..........................................................................................................17

1.7.1

Key Generation ....................................................................................................................................18

1.7.2

Key Input/Output .................................................................................................................................18

1.7.3

Key Storage..........................................................................................................................................19

1.7.4

Key Zeroization....................................................................................................................................19

1.8

S

ELF

-T

ESTS

..................................................................................................................................................19

1.9

D

ESIGN

A

SSURANCE

.....................................................................................................................................19

2

SECURE OPERATION ....................................................................................................................................20

2.1

C

RYPTO

-O

FFICER

G

UIDANCE

.......................................................................................................................20

2.1.1

Initialization.........................................................................................................................................20

2.1.2

Management ........................................................................................................................................20

2.2

U

SER

G

UIDANCE

..........................................................................................................................................21

3

ACRONYMS......................................................................................................................................................23

Table of Figures

F

IGURE

1

-

VSX

3000.....................................................................................................................................................6

F

IGURE

2

-

VSX

5000.....................................................................................................................................................7

F

IGURE

3

-

VSX

7000

S

...................................................................................................................................................7

F

IGURE

4

-

VSX

7000

E

...................................................................................................................................................7

F

IGURE

5

-

VSX

8000.....................................................................................................................................................8

F

IGURE

6

-

VSX

3000

C

ONNECTOR

P

ANEL

....................................................................................................................9

F

IGURE

7

-

VSX

5000

B

ACK

P

ANEL

.............................................................................................................................10

F

IGURE

8

-

VSX

7000

E

B

ACK

P

ANEL

...........................................................................................................................12

F

IGURE

9

-

VSX

7000

S

B

ACK

P

ANEL

...........................................................................................................................13

F

IGURE

10

-

VSX

8000

B

ACK

P

ANEL

...........................................................................................................................15

Table of Tables

T

ABLE

1

-

S

ECURITY

L

EVEL

P

ER

FIPS

140-2

S

ECTION

...................................................................................................8

T

ABLE

2

-

M

APPING OF

FIPS

140-2

L

OGICAL

I

NTERFACES TO

VSX

3000,

VSX

5000,

AND

VSX

7000

S

I

NTERFACES

...9

T

ABLE

3

-

M

APPING OF

FIPS

140-2

L

OGICAL

I

NTERFACES TO

VSX

5000

I

NTERFACES

................................................10

This manual is related to the following products: