Security Policy, version 1.0
January 31, 2008
HP StorageWorks Secure Key Manager
Page
4
of 26
© 2008 Hewlett-Packard Company
This document may be freely reproduced in its original entirety.
Table of Tables
T
ABLE
1
–
S
ECURITY
L
EVEL PER
FIPS
140-2
S
ECTION
...................................................................................................6
T
ABLE
2
–
L
OGICAL
I
NTERFACE AND
P
HYSICAL
P
ORTS
M
APPING
..................................................................................8
T
ABLE
3
–
F
RONT
P
ANEL
LED
D
EFINITIONS
..................................................................................................................9
T
ABLE
4
–
R
EAR
P
ANEL
C
OMPONENTS
D
ESCRIPTIONS
.................................................................................................10
T
ABLE
5
–
R
EAR
P
ANEL
LED
D
EFINITIONS
..................................................................................................................11
T
ABLE
6
–
C
RYPTO
O
FFICER
S
ERVICES
........................................................................................................................11
T
ABLE
7
–
U
SER
S
ERVICES
...........................................................................................................................................13
T
ABLE
8
–
HP
U
SER
S
ERVICES
.....................................................................................................................................13
T
ABLE
9
–
C
LUSTER
M
EMBER
S
ERVICES
......................................................................................................................14
T
ABLE
10
–
R
OLES AND
A
UTHENTICATIONS
................................................................................................................14
T
ABLE
11
–
L
IST OF
C
RYPTOGRAPHIC
K
EYS
,
C
RYPTOGRAPHIC
K
EY
C
OMPONENTS
,
AND
CSP
S FOR
SSH....................15
T
ABLE
12
–
L
IST OF
C
RYPTOGRAPHIC
K
EYS
,
C
RYPTOGRAPHIC
K
EY
C
OMPONENTS
,
AND
CSP
S FOR
TLS....................16
T
ABLE
13
–
C
IPHER
S
UITES
S
UPPORTED BY THE
M
ODULE
’
S
TLS
I
MPLEMENTATION IN
FIPS
M
ODE
...........................17
T
ABLE
14
–
O
THER
C
RYPTOGRAPHIC
K
EYS
,
C
RYPTOGRAPHIC
K
EY
C
OMPONENTS
,
AND
CSP
S
...................................17
T
ABLE
15
–
A
CRONYMS
...............................................................................................................................................25