EasyManua.ls Logo

Motorola S2500 - Table of Contents

Motorola S2500
18 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
Page 2
TABLE OF CONTENTS
1. MODULE OVERVIEW .........................................................................................................................................3
2. SECURITY LEVEL................................................................................................................................................4
3. MODES OF OPERATION.....................................................................................................................................4
4. PORTS AND INTERFACES .................................................................................................................................8
5. IDENTIFICATION AND AUTHENTICATION POLICY.................................................................................8
6. ACCESS CONTROL POLICY............................................................................................................................10
AUTHENTICATED SERVICES.....................................................................................................................................10
UNAUTHENTICATED SERVICES: ...............................................................................................................................10
ROLES AND SERVICES..............................................................................................................................................11
DEFINITION OF CRITICAL SECURITY PARAMETERS (CSPS)......................................................................................12
DEFINITION OF CSPS MODES OF ACCESS ................................................................................................................13
7. OPERATIONAL ENVIRONMENT....................................................................................................................15
8. SECURITY RULES..............................................................................................................................................15
9. CRYPTO OFFICER GUIDANCE.......................................................................................................................16
10. PHYSICAL SECURITY POLICY ....................................................................................................................17
PHYSICAL SECURITY MECHANISMS.........................................................................................................................17
11. MITIGATION OF OTHER ATTACKS POLICY...........................................................................................17
12. DEFINITIONS AND ACRONYMS...................................................................................................................17

Related product manuals