Nortel Networks Contivity Secure IP Services Gateway 4600 Bedienungsanleitung Seite 3

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 16
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 2
3
1 Introduction
1.1 Purpose
Thisisanon-proprietarycryptographicmodulesecuritypolicyfortheContivity™
ExtranetSwitch4600.ThissecuritypolicydescribeshowtheContivity™Extranet
Switch4600meetsthesecurityrequirementsofFIPS140-1,andhowtooperatethe
Contivity™ExtranetSwitch4600inasecureFIPS140-1compliantmodeofoperation.
ThispolicywaspreparedaspartoftheFIPS140-1Level2multi-chipstandalone
certificationoftheContivity™ExtranetSwitch4600.
FIPS140-1(“FederalInformationProcessingStandardsPublication140-1--Security
RequirementsforCryptographicModules”)detailstheU.S.Governmentrequirements
forcryptographicmodules.MoreinformationabouttheFIPS140-1standardand
validationprogramisavailableontheNISTwebsiteat
http://csrc.nist.gov/cryptval/.
1.2 References
ThisdocumentdealsonlywithoperationsandcapabilitiesoftheContivity™Extranet
Switch4600inthetechnicaltermsofaFIPS140-1cryptographicmodulesecuritypolicy.
MoreinformationisavailableontheContivity™ExtranetSwitch4600andtheentireline
ofContivity™productsfromthefollowingsources:
TheNortelNetworkswebsitecontainsinformationonthefulllineof
Contivityproductsat
www.nortelnetworks.com.
Foranswerstotechnicalorsalesrelatedquestionspleaserefertothecontacts
listedontheNortelNetworkswebsiteat
www.nortelnetworks.com.
1.3 DocumentOrganization
ThisdocumentispartofthecompleteFIPS140-1submissionpackage.Inadditiontothis
document,thecompletesubmissionpackagecontainsthefollowing:
Vendorevidencedocument
Finitestatemachine
Sourcecodelisting
Othersupportingdocumentation
ThisdocumentprovidesanoverviewoftheContivity™Switchandexplainsthesecure
configurationandoperationofthemodule.Section1providesintroductorymaterial,
section2detailsthegeneralfeaturesandfunctionalityoftheContivity™Switchand
section3addressesconfigurationoftheswitchforFIPS-compliantmodeofoperation,
henceforthreferredtoasFIPSmode.
CorsecSecurity,Inc.producedthissecuritypolicyandothercertificationsubmission
documentationundercontracttoNortelNetworks.Withtheexceptionofthisnon-
Seitenansicht 2
1 2 3 4 5 6 7 8 ... 15 16

Kommentare zu diesen Handbüchern

Keine Kommentare