Physical Security Policy; Physical Security Mechanisms; Operator Required Actions; Mitigation Of Other Attacks Policy - Avaya G250 User Manual

Office media gateways w/fips non-proprietary security policy
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Avaya G250 and G250-BRI Branch Office Media Gateways w/FIPS Non-Proprietary Security Policy
Version 1.2

8. Physical Security Policy

8.1. Physical Security Mechanisms

The multi-chip standalone cryptographic module includes the following physical security
mechanisms:
• Production-grade components and production-grade enclosure.

8.2. Operator Required Actions

There are no operator-required actions to maintain physical security.
Physical Security Mechanisms
Production-grade components and
production-grade enclosure
Table 8 – Inspection/Testing of Physical Security Mechanisms

9. Mitigation of Other Attacks Policy

The FIPS 140-2 Area 11 requirements are not applicable because the cryptographic
module has not been designed to mitigate specific attacks outside of the scope of FIPS 140-
2.
Other Attacks
N/A

10. References

• For more information on the FIPS 140-2 standard and validation program please see the
NIST website at
• For more information about Avaya ask your Avaya representative or see
http://www.avaya.com/
• For more information about Avaya G250 Media Gateway ask your Avaya representative
or see
http://www.avaya.com/gcm/master-usa/en-
us/products/offers/g250_media_gateway.htm
© 2005 Avaya Inc. May be reproduced only in its original entirety [without revision].
Recommended Frequency of
Inspection/Test
N/A
Mitigation Mechanism
N/A
Table 9 – Mitigation of Other Attacks
http://csrc.nist.gov/cryptval/
Wednesday, 14 December, 2005
Inspection/Test Guidance Details
N/A
Specific Limitations
N/A
Page 21 of 23
CID 106595

Advertisement

Table of Contents
loading

This manual is also suitable for:

G250-bri

Table of Contents