EasyManua.ls Logo

Avaya G250 - User Manual

Avaya G250
23 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
© 2005 Avaya Inc. May be reproduced only in its original entirety [without revision]. Page 1 of 23
CID 108398
Avaya G250 and G250-BRI Branch
Office Media Gateways w/FIPS
Non-Proprietary Security
Policy
Avaya Inc.
Revision Date: 14 December 2005
Version 1.2

Other manuals for Avaya G250

Question and Answer IconNeed help?

Do you have a question about the Avaya G250 and is the answer not in the manual?

Summary

G250;G250-BRI Module Overview

Security Level

Modes of Operation

Approved mode of operation

Lists the cryptographic algorithms supported in FIPS approved mode.

Non-FIPS mode of operation

Lists the non-FIPS approved algorithms implemented by the module.

Entering FIPS Mode

Outlines the procedure for configuring the module into FIPS mode.

Ports and Interfaces

G250 Ports and Interfaces

Lists and describes the physical ports on the G250 faceplate.

G250-BRI Ports and Interfaces

Lists and describes the physical ports on the G250-BRI faceplate.

Identification and Authentication Policy

Assumption of roles

Defines the supported roles within the module and their authentication methods.

Strengths of Authentication Mechanisms

Details the password length and strength for various authentication roles.

Access Control Policy

Services

Lists the services provided by the module and their access requirements.

Roles and Services

Maps specific services to the roles that can access them.

Definition of Critical Security Parameters (CSPs)

Identifies and defines the Critical Security Parameters (CSPs) used by the module.

Definition of CSPs Modes of Access

Defines the allowed access modes (Read, Write, Zeroize) for CSPs.

Operational Environment

Security Rules

Physical Security Policy

Physical Security Mechanisms

Lists the physical security mechanisms, like enclosure and components.

Operator Required Actions

States if there are any required actions from operators for physical security.

Mitigation of Other Attacks Policy

References

Definitions and Acronyms

Summary

G250;G250-BRI Module Overview

Security Level

Modes of Operation

Approved mode of operation

Lists the cryptographic algorithms supported in FIPS approved mode.

Non-FIPS mode of operation

Lists the non-FIPS approved algorithms implemented by the module.

Entering FIPS Mode

Outlines the procedure for configuring the module into FIPS mode.

Ports and Interfaces

G250 Ports and Interfaces

Lists and describes the physical ports on the G250 faceplate.

G250-BRI Ports and Interfaces

Lists and describes the physical ports on the G250-BRI faceplate.

Identification and Authentication Policy

Assumption of roles

Defines the supported roles within the module and their authentication methods.

Strengths of Authentication Mechanisms

Details the password length and strength for various authentication roles.

Access Control Policy

Services

Lists the services provided by the module and their access requirements.

Roles and Services

Maps specific services to the roles that can access them.

Definition of Critical Security Parameters (CSPs)

Identifies and defines the Critical Security Parameters (CSPs) used by the module.

Definition of CSPs Modes of Access

Defines the allowed access modes (Read, Write, Zeroize) for CSPs.

Operational Environment

Security Rules

Physical Security Policy

Physical Security Mechanisms

Lists the physical security mechanisms, like enclosure and components.

Operator Required Actions

States if there are any required actions from operators for physical security.

Mitigation of Other Attacks Policy

References

Definitions and Acronyms

Avaya G250 Specifications

General IconGeneral
BrandAvaya
ModelG250
CategoryGateway
LanguageEnglish

Related product manuals