Table 40: Role and service access to CSPs (continued)
Ephemeral
Serial Number
secret
IKE Ephemeral
DH public keys
IKE Ephemeral
DH phase-2
public keys
Avaya root CA
RW
RSA public key
License RSA
R
RW
public key
Security rules
The following are security rules enforced by the cryptographic module to implement the security
requirements of this FIPS 140-2 Level 1 module.
1. Set the crypto module to FIPS-140-2 mode through the procedure outlined in
page 510.
2. When exiting FIPS-140-2 mode, the crypto-officer should zeroize the CSP.
3. When the module has not been placed in a valid role, the operator does not have access to
any cryptographic services.
4. Use DES to encrypt message traffic only for communications with legacy products that do
not support AES or TDES.
Z
Z
Z
Z
Z
Z
RW
RW
Issue 1.1 June 2005
Security rules
3 of 3
Limitations
on
507