beautypg.com

Table of tables – HP FIPS 140-2 User Manual

Page 4

background image

Security Policy, version 1.0

January 31, 2008

HP StorageWorks Secure Key Manager

Page 4 of 26

© 2008 Hewlett-Packard Company

This document may be freely reproduced in its original entirety.

Table of Tables

T

ABLE

1

S

ECURITY

L

EVEL PER

FIPS

140-2

S

ECTION

...................................................................................................6

T

ABLE

2

L

OGICAL

I

NTERFACE AND

P

HYSICAL

P

ORTS

M

APPING

..................................................................................8

T

ABLE

3

F

RONT

P

ANEL

LED

D

EFINITIONS

..................................................................................................................9

T

ABLE

4

R

EAR

P

ANEL

C

OMPONENTS

D

ESCRIPTIONS

.................................................................................................10

T

ABLE

5

R

EAR

P

ANEL

LED

D

EFINITIONS

..................................................................................................................11

T

ABLE

6

C

RYPTO

O

FFICER

S

ERVICES

........................................................................................................................11

T

ABLE

7

U

SER

S

ERVICES

...........................................................................................................................................13

T

ABLE

8

HP

U

SER

S

ERVICES

.....................................................................................................................................13

T

ABLE

9

C

LUSTER

M

EMBER

S

ERVICES

......................................................................................................................14

T

ABLE

10

R

OLES AND

A

UTHENTICATIONS

................................................................................................................14

T

ABLE

11

L

IST OF

C

RYPTOGRAPHIC

K

EYS

,

C

RYPTOGRAPHIC

K

EY

C

OMPONENTS

,

AND

CSP

S FOR

SSH....................15

T

ABLE

12

L

IST OF

C

RYPTOGRAPHIC

K

EYS

,

C

RYPTOGRAPHIC

K

EY

C

OMPONENTS

,

AND

CSP

S FOR

TLS....................16

T

ABLE

13

C

IPHER

S

UITES

S

UPPORTED BY THE

M

ODULE

S

TLS

I

MPLEMENTATION IN

FIPS

M

ODE

...........................17

T

ABLE

14

O

THER

C

RYPTOGRAPHIC

K

EYS

,

C

RYPTOGRAPHIC

K

EY

C

OMPONENTS

,

AND

CSP

S

...................................17

T

ABLE

15

A

CRONYMS

...............................................................................................................................................25