Nortel Networks Contivity Secure IP Services Gateway 4600 Bedienungsanleitung Seite 1

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Netzwerk-Switches Nortel Networks Contivity Secure IP Services Gateway 4600 herunter. Nortel Networks Contivity Secure IP Services Gateway 4600 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 16
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 0
©Copyright2001NortelNetworks.
ThisdocumentmaybefreelyreproducedanddistributedwholeandintactincludingthisCopyrightNotice.
Contivity™ExtranetSwitch4600
FIPS140-1Non-Proprietary
CryptographicModuleSecurityPolicy
Level2Validation
June2001
Seitenansicht 0
1 2 3 4 5 6 ... 15 16

Inhaltsverzeichnis

Seite 1

©Copyright2001NortelNetworks.ThisdocumentmaybefreelyreproducedanddistributedwholeandintactincludingthisCopyrightNotice.Contiv

Seite 2

 102.4 RolesandServicesTheswitchsupportsupto5000simultaneoususersessionsusingInternetProtocolSecurity(IPSec),Point-to-PointTunnel

Seite 3 - 1 Introduction

 11• IPSecProtocolTunnels• PPTPProtocolTunnels• L2TPProtocolTunnels• L2FProtocolTunnels• ChangePassword2.4.1 CryptoOfficerSer

Seite 4

 12direction.Theadministratormayuseanyofthepre-definedRulesorcreatecustomRulestobeincludedineachFilter.• StatusFunctions:to

Seite 5

 13AuthenticationProtocol(PAP).MS-CHAPcanusenoencryption,40-bitRC4,128-bitRC4encryption.WhenoperatedinaFIPS140-1compliantmanne

Seite 6

 14containedonthefloppydiskviathemodule’smanagementinterface.Theformatutilitythencausesthefirmwareofthemoduletobeerased• RS

Seite 7

 153 SecureOperationoftheContivitySwitchTheContivitySwitchisaversatilemachine;itcanberuninaNormalOperatingModeoraFIPSOper

Seite 8

 16hasthecapabilitytosubmitshellcommands)thentheCryptoOfficershouldreinstalltheNortelfirmwarefromatrustedmediasuchastheinstal

Seite 9 - ContivityExtranetSwitch

 2TableofContents1 Introduction ...

Seite 10 - Table2–MatrixofServices

 31 Introduction1.1 PurposeThisisanon-proprietarycryptographicmodulesecuritypolicyfortheContivity™ExtranetSwitch4600.Thissecuri

Seite 11

 4proprietarysecuritypolicy,theFIPS140-1certificationsubmissiondocumentationisNortel-proprietaryandisreleasableonlyunderappropriate

Seite 12 - 2.4.2 UserServices

 52 TheContivityExtranet4600SwitchTheNortelNetworksContivityExtranetSwitch4600(referredtoasthemodule,orSwitchinthisdocument)

Seite 13

 6Figure2–PhysicalInterfacesThephysicalinterfacesincludeapowerplug,powerandresetswitches,aserialport,aLANPortRJ-45connector

Seite 14

 72.3 PhysicalSecurityAthicksteelcaseprotectstheContivity™ExtranetSwitch4600.TheswitchmeetsFCCrequirementsin47CFRPart15forp

Seite 15

 8Figure4–FrontviewwithoutfrontbezelOncetheExtranetSwitchhasbeenconfiguredinitsFIPS140-1level2mode,thecovermaynotberemov

Seite 16

 9Figure5–Tamper-EvidentLabelsAppliedtoSwitchThetamper-evidentsealsareproducedfromaspecialthingaugewhitevinylwithself-adhesiv

Kommentare zu diesen Handbüchern

Keine Kommentare