Security Rules - Avaya G250 Administration

Media gateways
Hide thumbs Also See for G250:
Table of Contents

Advertisement

FIPS
Table 89: Role and service access to CSPs (continued)
Ephemeral
Serial Number
secret
IKE Ephemeral
DH public keys
IKE Ephemeral
DH phase-2
public keys
Avaya root CA
RW
RSA public key
License RSA
R
RW
public key

Security rules

The following are security rules enforced by the cryptographic module to implement the security
requirements of this FIPS 140-2 Level 1 module.
1. Set the crypto module to FIPS-140-2 mode through the procedure outlined in
on page 605.
2. When exiting FIPS-140-2 mode, the crypto-officer should zeroize the CSP.
3. When the module has not been placed in a valid role, the operator does not have access
to any cryptographic services.
4. Use DES to encrypt message traffic only for communications with legacy products that do
not support AES or TDES.
602 Administration for the Avaya G250 and Avaya G350 Media Gateways
Z
Z
Z
Z
Z
Z
RW
RW
3 of 3
Limitations

Advertisement

Table of Contents
loading

This manual is also suitable for:

G350

Table of Contents