
Issue 5 June 2008
709
Operational environment
The FIPS 140-2 Area 6 Operational Environment requirements are not applicable because the
device does not support the loading and execution of un-trusted code. Avaya digitally signs
firmware images of the crypto module using RSA SHA1 digital signature. Through this
signature, the crypto module verifies the authenticity of any update to its firmware image.
Assumptions of roles
The cryptographic module supports eight distinct operator roles: Cryptographic-Officer, Read/
Write User, Read-only User, RADIUS Server, OSPF Router Peer, PPPoE Client, IKE Peer, and
Serial Number Peer.
The cryptographic module enforces the separation of roles using operator authentication. Refer
to
Table 170
for further information.
Table 170: Roles and required identification and authentication
Role
Type of
authentication
Authentication data
Description
Cryptographic-
Officer
(Admin User)
Identity-based operator
authentication
Username and
Password. The module
stores user identity
information internally
through the use of an
external Radius Server
database.
The owner of the
cryptographic module
who has full access to the
module’s services
User
(Read/Write User)
Identity-based operator
authentication
Username and
Password. The module
stores user identity
information internally
through the use of an
external Radius Server
database.
An assistant to the Admin
User who has read/write
access to a subset of
configuration and status
indications
Read-only User
Identity-based operator
authentication
Username and
Password. The module
stores user identity
information internally
through the use of an
external Radius Server
database.
An assistant to the Admin
User who has read-only
access to a subset of
module configuration and
status indications
1 of 2
Содержание Media Gateway G250
Страница 1: ...Administration for the Avaya G250 and Avaya G350 Media Gateways 03 300436 Issue 5 June 2008 ...
Страница 24: ...Contents 24 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 32: ...Introduction 32 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 38: ...Configuration overview 38 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 128: ...Basic device configuration 128 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 210: ...Configuring Standard Local Survivability SLS 210 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 244: ...Configuring logging 244 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 258: ...Configuring VoIP QoS 258 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 354: ...Configuring Emergency Transfer Relay ETR 354 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 370: ...Configuring SNMP 370 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 402: ...Configuring advanced switching 402 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 486: ...Configuring monitoring applications 486 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 548: ...Configuring the router 548 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 664: ...Configuring policy 664 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 682: ...Configuring policy based routing 682 Administration for the Avaya G250 and Avaya G350 Media Gateways ...
Страница 686: ...Setting synchronization 686 Administration for the Avaya G250 and Avaya G350 Media Gateways ...