User role, Authentication mechanisms, Physical security – Enterasys Networks XSR-1805 User Manual
Page 14: User role authentication mechanisms

Firewall authorization
information for
network traffic that
flows through the
box.
configuration data.
commands and
configuration data.
Table 4 – Crypto Officer Services, Descriptions, Inputs and Outputs, and CSPs
User Role
The User role accesses the module’s IPSec and IKE services. Service
descriptions, inputs and outputs, and CSPs are listed in the following
table:
Service
Description
Input
Output
CSP
IKE
Access the module IKE
functionality to
authenticate to the
module and negotiate IKE
and IPSec session keys
IKE inputs and data IKE outputs,
status, and data
RSA key pair for
IKE (read
access); Diffie-
Hellman key
pair for IKE
(read and write
access); pre-
shared keys for
IKE (read
access)
IPSec
Access the module’s
IPSec services in order to
secure network traffic
IPSec inputs,
commands, and
data
IPSec outputs,
status, and data
Session keys for
IPSec (read and
write access)
Table 5 – User Services, Descriptions, Inputs and Outputs
Authentication Mechanisms
The module supports role-based and identity-based authentication. Role-
based authentication is performed before the Super Crypto Officer enters
Bootrom monitor mode and authenticates with just a password (and no
user ID). Identity-based authentication is performed for all other types of
Crypto Officer and User authentication. These include password-based
authentication, RSA-based authentication, and HMAC-based
authentication mechanisms.
The estimated strength of each authentication mechanism is described
below.
Authentication Type
Role
Strength
Password-based
authentication (CLI, SNMP,
and Bootrom monitor mode)
Crypto Officer
Passwords are required to be at least six
characters long. Numeric, alphabetic (upper
and lowercase), and keyboard and
extended characters can be used, which
gives a total of 95 characters to choose
from.
Considering only the case-insensitive
alphabet using a password with repetition,
the number of potential passwords is 26^6.
RSA-based authentication
(IKE)
User
RSA signing and verification is used to
authenticate to the module during IKE. This
© Copyright 2003
Enterasys Networks
Page 14 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.