
6.6 PCI Power Interface...................................................................................................................
224
7.1 Components........................................................................................................................................
224
7.1 Bulk Crypto.................................................................................................................................
224
7.2 Power Management and Tamper Detect...................................................................................
225
7.3 FastMap Processor....................................................................................................................
225
7.4 Flash...........................................................................................................................................
225
7.5 SRAM.........................................................................................................................................
225
7.6 Real Time Clock/Battery Powered RAM (RTC/BBRAM)............................................................
225
7.7 Programmable Logic Device (PLD)............................................................................................
226
7.8 USB (Universal Serial Bus) Controller........................................................................................
226
7.9 Universal Asynchronous Receiver Transmitter (UART).............................................................
226
7.10 33MHz Clock............................................................................................................................
226
8.0 Definition of Security Relevant Data Items.........................................................................................
226
9.0 Roles and Services.............................................................................................................................
227
9.1 Roles..........................................................................................................................................
227
9.2 Authentication.............................................................................................................................
228
9.3 Initialization.................................................................................................................................
228
9.4 User Creation.............................................................................................................................
228
9.5 Services......................................................................................................................................
229
10.0 Key Management..............................................................................................................................
234
10.1 Key Generation........................................................................................................................
234
10.2 Key Storage..............................................................................................................................
234
10.3 Key Entry and Output...............................................................................................................
234
10.4 Key Distribution........................................................................................................................
234
10.5 Key Destruction........................................................................................................................
235
10.6 Key Archiving...........................................................................................................................
235
11.0 Modes...............................................................................................................................................
236
11.1 FIPS 140-1 Mode.....................................................................................................................
236
11.2 Non-FIPS 140-1 Mode.............................................................................................................
236
12.0 Self-Tests..........................................................................................................................................
236
13.0 Conclusion........................................................................................................................................
237
Appendix F: Definition of Key Codes................................................................................
239
Syntax Description....................................................................................................................................
239
Allowed Special Characters.............................................................................................................
239
Redefinable Keys.............................................................................................................................
240
Example of a Key Code Definition File.............................................................................................
241
Appendix G: SSH host keys...............................................................................................
243
Methods for Protection..............................................................................................................................
243
The VPN Gateway....................................................................................................................................
243
Appendix H: Adding User Preferences Attribute to Active Directory............................
245
Install All Administrative Tools (Windows 2000 Server)............................................................................
245
Register the Schema Management dll (Windows Server 2003)...............................................................
245
Add the Active Directory Schema Snap-in (Windows 2000 Server and Windows Server 2003)..............
246
Create a Shortcut to the Console Window.......................................................................................
248
Permit Write Operations to the Schema (Windows 2000 Server).............................................................
249
Create a New Attribute (Windows 2000 Server and Windows Server 2003)............................................
249
Create New Class.....................................................................................................................................
250
10 User Guide
April 2013
Summary of Contents for 3050-VM
Page 1: ...User Guide Avaya VPN Gateway Release 9 0 NN46120 104 Issue 04 04 April 2013 ...
Page 4: ...4 User Guide April 2013 Comments infodev avaya com ...
Page 12: ...12 User Guide April 2013 ...
Page 20: ...New in this release 20 User Guide April 2013 Comments infodev avaya com ...
Page 30: ...Introducing the VPN Gateway 30 User Guide April 2013 Comments infodev avaya com ...
Page 36: ...Introducing the ASA 310 FIPS 36 User Guide April 2013 Comments infodev avaya com ...
Page 74: ...Upgrading the AVG Software 74 User Guide April 2013 Comments infodev avaya com ...
Page 86: ...Managing Users and Groups 86 User Guide April 2013 Comments infodev avaya com ...
Page 130: ...The Command Line Interface 130 User Guide April 2013 Comments infodev avaya com ...
Page 162: ...Supported Ciphers 162 User Guide April 2013 Comments infodev avaya com ...
Page 212: ...Syslog Messages 212 User Guide April 2013 Comments infodev avaya com ...
Page 242: ...Definition of Key Codes 242 User Guide April 2013 Comments infodev avaya com ...
Page 259: ...Creating a Port Forwarder Authenticator User Guide April 2013 259 ...
Page 266: ...Using the Port Forwarder API 266 User Guide April 2013 Comments infodev avaya com ...
Page 274: ...X 509 274 User Guide April 2013 Comments infodev avaya com ...