INTRODUCTION............................................................................................................. 3
....................................................................................................................... 3
................................................................................................................. 3
..................................................................................................................... 5
Crypto Officer Role.................................................................................................. 11
User Role ................................................................................................................ 14
Key Generation ....................................................................................................... 18
Key Establishment................................................................................................... 18
Key Entry and Output .............................................................................................. 18
Key Storage ............................................................................................................ 19
Key Zeroization ....................................................................................................... 19
................................................................................................................. 20
SECURE OPERATION ................................................................................................. 22
Initial Setup ............................................................................................................. 22
Management ........................................................................................................... 23
.......................................................................................................... 24
ACRONYMS ................................................................................................................. 25
Enterasys Networks
© Copyright 2003
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Table of Contents
............................................................................................. 3
.............................................................................................. 6
..................................................................................................... 8
................................................................................................... 11
..................................................................................................... 14
........................................................................................ 14
............................................................................. 16
..................................................................................................... 21
.................................................................................... 21
......................................................................................... 22
Page 2 of 25