Operational Environment - Avaya G250 User Manual

Office media gateways w/fips non-proprietary security policy
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Avaya G250 and G250-BRI Branch Office Media Gateways w/FIPS Non-Proprietary Security Policy
Version 1.2
Ephemeral DH Phase-2
private key
Ephemeral DH Phase 2
shared secret
User password
WZ
Root password
RW
OSPF Secret
WZ
Radius Secret
WZ
PPPoE Chap/PAP
WZ
Secret
SNMPv3
authentication
WZ
password
Fixed Serial Number
secret
Ephemeral Serial
Number secret
IKE Ephemeral DH
public keys
IKE Ephemeral DH
Phase 2 public keys
Avaya root CA RSA
public key
License RSA public
R
key
(*) – The root password is set back to a factory default value during zeroization.

6. Operational Environment

The FIPS 140-2 Area 6 Operational Environment requirements are not applicable because the
device does not support the loading and execution of un-trusted code. Avaya digitally signs
firmware images of the crypto module using RSA. Through this signature, the crypto module
verifies the authenticity of any update to its firmware image.
© 2005 Avaya Inc. May be reproduced only in its original entirety [without revision].
Z
Z
R
R
WZ
R
R
RW
R
W
R
R
WZ
Z
WZ
W
Z
R
R
WZ
R
R
W
Z
Z
Z
RW
RW
Table 10– CSP Access Rights within Roles & Services
Wednesday, 14 December, 2005
Z
RW
Z
RW
R
R
R
Z
R
R
R
W*
Z
Z
Z
R
R
R
Z
Z
Z
Z
RW
Z
RW
R
R
R
R
R
RW
Page 19 of 23
CID 106595
R

Advertisement

Table of Contents
loading

This manual is also suitable for:

G250-bri

Table of Contents