beautypg.com

1 introduction – Nortel Networks 4500 FIPS User Manual

Page 3

background image

© Copyright 2000 Nortel Networks.

3

1 Introduction

1.1 Purpose

This is a non-proprietary Cryptographic Module Security Policy for the Contivity™ Extranet
Switch 4500. This security policy describes how the Contivity™ Extranet Switch 4500 meets
the security requirements of FIPS 140-1, and how to operate the Contivity™ Extranet Switch
4500 in a secure FIPS 140-1 mode. This policy was prepared as part of the level 2 FIPS 140-
1 certification of the Contivity™ Extranet Switch 4500.

FIPS 140-1 (Federal Information Processing Standards Publication 140-1 -- Security
Requirements for Cryptographic Modules
) details the U.S. Government requirements for
cryptographic modules. More information about the FIPS 140-1 standard and validation
program is available on the NIST web site at

http://csrc.nist.gov/cryptval/

.

1.2 References

This document deals only with operations and capabilities of the Contivity™ Extranet Switch
4500 in the technical terms of a FIPS 140-1 cryptographic module security policy. More
information is available on the Contivity™ Extranet Switch 4500 and the entire line of
Contivity™ products from the following sources:

The Nortel Networks web site contains information on the full line of Contivity

products at

www.nortelnetworks.com

.

For answers to technical or sales related questions please refer to the contacts listed

on the Nortel Networks web site at

www.nortelnetworks.com

.

1.3 Terminology

In this document the Nortel Contivity™ Extranet Switch 4500 is referred to as the switch, the
Contivity™ Switch, module, or system.

1.4 Document Organization

The Security Policy document is part of the complete FIPS 140-1 Submission Package. In
addition to this document, the complete Submission Package contains:

Vendor Evidence document

Finite State Machine

Module Software Listing

Other supporting documentation as additional references