Access Control Policy; Services - Avaya G250 User Manual

Office media gateways w/fips non-proprietary security policy
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Avaya G250 and G250-BRI Branch Office Media Gateways w/FIPS Non-Proprietary Security Policy
Version 1.2
Serial Number
32 bit challenge
Peer
IKE peer
13 characters

5. Access Control Policy

5.1. Services

• Enable FIPS mode: configure the module for the Approved mode of operation.
• Firmware Update: load firmware images digitally signed by RSA-SHA1 (1024 bit)
algorithm.
• CSPs management: edit IKE pre-shared keys, OSPF secrets, PPPoE secrets.
• Users Management: add and delete users Admin, Read/Write Users, Read Only Users.
Radius Servers.
• Module configuration: configure networking capabilities including bypass capability.
• Reset: force the module to power cycle via a remote command.
• Read all status indications: obtain all statuses securely via IPSEC, console port and LEDs
on the front panel of a Gateway. This service also reports about the status of the bypass
capability. Bypass status is reported by CLI commands show ip active lists crypto, show
ip crypto list #, show crypto ipsec transform-set #, available from the console and
remote telnet.
• Read subset of status indications: obtain subset of statuses securely via IPSEC, console
port and LEDs on the front panel of a Gateway. Bypass status is reported by CLI
commands show ip active lists crypto, show ip crypto list #, show crypto ipsec
transform-set # available from the console and remote telnet.
• Module configuration backup: backup non-CSP related configuration data via IPSEC.
• Restore configuration: restore configuration data.
• Zeroization: actively destroy all plaintext CSPs and keys.
• IKE negotiation: use DH, DES, TDES, AES, HMAC-SHA1, PRNG X9.31.
• IPSec traffic processing: use AES, DES, TDES, and HMAC-SHA1.
• Serial number exchange service: use encryption to prevent fraud of Avaya license
activation.
© 2005 Avaya Inc. May be reproduced only in its original entirety [without revision].
1 / 4,294,967,296
1/ 44,736,509,592,539,817,388,662,784
Table 6 – Authentication strength
Wednesday, 14 December, 2005
1 / 357,913
1/13,556,518,058,345,399,207
Page 13 of 23
CID 106595

Advertisement

Table of Contents
loading

This manual is also suitable for:

G250-bri

Table of Contents