Enterasys-networks XSR-1805 User Manual Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 25
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
Table of Contents
INTRODUCTION............................................................................................................. 3
P
URPOSE....................................................................................................................... 3
R
EFERENCES ................................................................................................................. 3
D
OCUMENT ORGANIZATION ............................................................................................. 3
ENTERASYS NETWORKS XSR-1805, XSR-1850, AND XSR-3250 ............................. 5
O
VERVIEW ..................................................................................................................... 5
C
RYPTOGRAPHIC MODULE .............................................................................................. 6
MODULE INTERFACES ..................................................................................................... 8
R
OLES AND SERVICES................................................................................................... 11
Crypto Officer Role.................................................................................................. 11
User Role ................................................................................................................ 14
Authentication Mechanisms .................................................................................... 14
P
HYSICAL SECURITY ..................................................................................................... 14
O
PERATIONAL ENVIRONMENT ........................................................................................ 14
C
RYPTOGRAPHIC KEY MANAGEMENT ............................................................................. 16
Key Generation ....................................................................................................... 18
Key Establishment................................................................................................... 18
Key Entry and Output .............................................................................................. 18
Key Storage ............................................................................................................ 19
Key Zeroization ....................................................................................................... 19
S
ELF-TESTS................................................................................................................. 20
D
ESIGN ASSURANCE ..................................................................................................... 21
M
ITIGATION OF OTHER ATTACKS.................................................................................... 21
SECURE OPERATION ................................................................................................. 22
CRYPTO OFFICER GUIDANCE......................................................................................... 22
Initial Setup ............................................................................................................. 22
Management ........................................................................................................... 23
USER GUIDANCE .......................................................................................................... 24
ACRONYMS ................................................................................................................. 25
© Copyright 2003 Enterasys Networks Page 2 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Page view 1
1 2 3 4 5 6 7 ... 24 25

Comments to this Manuals

No comments