Security Rules - Avaya G250 Administration

Media gateway
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Table 40: Role and service access to CSPs (continued)
Ephemeral
Serial Number
secret
IKE Ephemeral
DH public keys
IKE Ephemeral
DH phase-2
public keys
Avaya root CA
RW
RSA public key
License RSA
R
RW
public key

Security rules

The following are security rules enforced by the cryptographic module to implement the security
requirements of this FIPS 140-2 Level 1 module.
1. Set the crypto module to FIPS-140-2 mode through the procedure outlined in
page 510.
2. When exiting FIPS-140-2 mode, the crypto-officer should zeroize the CSP.
3. When the module has not been placed in a valid role, the operator does not have access to
any cryptographic services.
4. Use DES to encrypt message traffic only for communications with legacy products that do
not support AES or TDES.
Z
Z
Z
Z
Z
Z
RW
RW
Issue 1.1 June 2005
Security rules
3 of 3
Limitations
on
507

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents