1 introduction – Nortel Networks 4500 FIPS User Manual
Page 3
© Copyright 2000 Nortel Networks.
3
1 Introduction
1.1 Purpose
This is a non-proprietary Cryptographic Module Security Policy for the Contivity™ Extranet
Switch 4500. This security policy describes how the Contivity™ Extranet Switch 4500 meets
the security requirements of FIPS 140-1, and how to operate the Contivity™ Extranet Switch
4500 in a secure FIPS 140-1 mode. This policy was prepared as part of the level 2 FIPS 140-
1 certification of the Contivity™ Extranet Switch 4500.
FIPS 140-1 (Federal Information Processing Standards Publication 140-1 -- Security
Requirements for Cryptographic Modules) details the U.S. Government requirements for
cryptographic modules. More information about the FIPS 140-1 standard and validation
program is available on the NIST web site at
http://csrc.nist.gov/cryptval/
.
1.2 References
This document deals only with operations and capabilities of the Contivity™ Extranet Switch
4500 in the technical terms of a FIPS 140-1 cryptographic module security policy. More
information is available on the Contivity™ Extranet Switch 4500 and the entire line of
Contivity™ products from the following sources:
•
The Nortel Networks web site contains information on the full line of Contivity
products at
www.nortelnetworks.com
.
•
For answers to technical or sales related questions please refer to the contacts listed
on the Nortel Networks web site at
www.nortelnetworks.com
.
1.3 Terminology
In this document the Nortel Contivity™ Extranet Switch 4500 is referred to as the switch, the
Contivity™ Switch, module, or system.
1.4 Document Organization
The Security Policy document is part of the complete FIPS 140-1 Submission Package. In
addition to this document, the complete Submission Package contains:
♦
Vendor Evidence document
♦
Finite State Machine
♦
Module Software Listing
♦
Other supporting documentation as additional references