Non-Approved Algorithms In Fips Mode; Setting The Cryptographic Module Run Mode; Non-Fips Mode Of Operation - Avaya G250 Administration

Media gateways
Hide thumbs Also See for G250:
Table of Contents

Advertisement

Non-Approved Algorithms in FIPS mode

Diffie-Hellman for IKE key exchanges - groups 2, 5, and 14
MD5 for Radius Client role and peer OSPF router authentication
HMAC-MD5-96 for SNMPv3 authentication
The cryptographic module relies on the implemented deterministic random number generator
(DRNG) that is compliant with X9.31 with 128-bit Key, 64-bit Seed for generation of all
cryptographic keys. The non-deterministic random seed generator is used for the periodic
re-seeding of the PRNG.

Setting the cryptographic module run mode

The user can determine if the cryptographic module is running in FIPS vs. non-FIPS mode via:
Execution of the show running-config command.
Verification that the configuration meets the requirements specified in
Procedures
Verification that the HW version and the firmware version of the module firmware code in
banks A and B are FIPS-approved versions.

Non-FIPS mode of operation

In non-FIPS mode, the cryptographic module provides non-FIPS-approved algorithms and uses
FIPS-approved algorithms in non-compliant ways, as shown in
Table 83: Non-FIPS-approved operations and algorithms
IKE
IPSEC
SNMPv3
SSH2
VoIP Bearer (Media)
Encryption
on page 605.
MD5
HMAC
PTLS
-SHA1
X
X
X
X
TDES
DES
AES
X
X
X
X
Administration
Table
83:
AEA
DH
RSA
decryption
Group 1
Group
786-
2048 bit
X
Issue 3 February 2007
DSS
1 of 2
591

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents