beautypg.com

Enterasys Networks XSR-1805 User Manual

Page 2

background image

Table of Contents


INTRODUCTION............................................................................................................. 3

P

URPOSE

....................................................................................................................... 3

R

EFERENCES

................................................................................................................. 3

D

OCUMENT

O

RGANIZATION

............................................................................................. 3

ENTERASYS NETWORKS XSR-1805, XSR-1850, AND XSR-3250 ............................. 5

O

VERVIEW

..................................................................................................................... 5

C

RYPTOGRAPHIC

M

ODULE

.............................................................................................. 6

M

ODULE

I

NTERFACES

..................................................................................................... 8

R

OLES AND

S

ERVICES

................................................................................................... 11

Crypto Officer Role.................................................................................................. 11
User Role ................................................................................................................ 14
Authentication Mechanisms .................................................................................... 14

P

HYSICAL

S

ECURITY

..................................................................................................... 14

O

PERATIONAL

E

NVIRONMENT

........................................................................................ 14

C

RYPTOGRAPHIC

K

EY

M

ANAGEMENT

............................................................................. 16

Key Generation ....................................................................................................... 18
Key Establishment................................................................................................... 18
Key Entry and Output .............................................................................................. 18
Key Storage ............................................................................................................ 19
Key Zeroization ....................................................................................................... 19

S

ELF

-T

ESTS

................................................................................................................. 20

D

ESIGN

A

SSURANCE

..................................................................................................... 21

M

ITIGATION OF

O

THER

A

TTACKS

.................................................................................... 21

SECURE OPERATION ................................................................................................. 22

C

RYPTO

O

FFICER

G

UIDANCE

......................................................................................... 22

Initial Setup ............................................................................................................. 22
Management ........................................................................................................... 23

U

SER

G

UIDANCE

.......................................................................................................... 24

ACRONYMS ................................................................................................................. 25

© Copyright 2003

Enterasys Networks

Page 2 of 25

This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

This manual is related to the following products: