G250-BRI contains additional ISDN-B circuitry with 2 ISDN-BRI trunks plus 1 Analog trunk versus 4 Analog trunks in G250. The rules in this policy generally apply to all the above devices. Exceptions are explicitly rendered by device name, otherwise general cryptographic module notation is used.
The FIPS 140-2 Area 6 Operational Environment requirements are not applicable because the device does not support the loading and execution of un-trusted code. Avaya digitally signs firmware images of the crypto module using RSA. Through this signature, the crypto module verifies the authenticity of any update to its firmware image.
5. The module shall support concurrent operators and shall maintain separation of roles and services. 6. The users of the system can plug-in and use any Avaya Media Module that does not support cryptographic functionality without restriction. 7. Media modules with cryptographic functionality must be tested and validated separately against the requirements FIPS 140-2.