Enterasys-networks XSR-1805 Uživatelský manuál Strana 2

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 25
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 1
Table of Contents
INTRODUCTION............................................................................................................. 3
P
URPOSE....................................................................................................................... 3
R
EFERENCES ................................................................................................................. 3
D
OCUMENT ORGANIZATION ............................................................................................. 3
ENTERASYS NETWORKS XSR-1805, XSR-1850, AND XSR-3250 ............................. 5
O
VERVIEW ..................................................................................................................... 5
C
RYPTOGRAPHIC MODULE .............................................................................................. 6
MODULE INTERFACES ..................................................................................................... 8
R
OLES AND SERVICES................................................................................................... 11
Crypto Officer Role.................................................................................................. 11
User Role ................................................................................................................ 14
Authentication Mechanisms .................................................................................... 14
P
HYSICAL SECURITY ..................................................................................................... 14
O
PERATIONAL ENVIRONMENT ........................................................................................ 14
C
RYPTOGRAPHIC KEY MANAGEMENT ............................................................................. 16
Key Generation ....................................................................................................... 18
Key Establishment................................................................................................... 18
Key Entry and Output .............................................................................................. 18
Key Storage ............................................................................................................ 19
Key Zeroization ....................................................................................................... 19
S
ELF-TESTS................................................................................................................. 20
D
ESIGN ASSURANCE ..................................................................................................... 21
M
ITIGATION OF OTHER ATTACKS.................................................................................... 21
SECURE OPERATION ................................................................................................. 22
CRYPTO OFFICER GUIDANCE......................................................................................... 22
Initial Setup ............................................................................................................. 22
Management ........................................................................................................... 23
USER GUIDANCE .......................................................................................................... 24
ACRONYMS ................................................................................................................. 25
© Copyright 2003 Enterasys Networks Page 2 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Zobrazit stránku 1
1 2 3 4 5 6 7 ... 24 25

Komentáře k této Příručce

Žádné komentáře