Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support Administration of the Avaya G350 Media Gateway - Avaya Support

downloads.avaya.com
from downloads.avaya.com More from this publisher
13.07.2015 Views

FIPSSecurity levelThe cryptographic module meets the overall requirements applicable to Level 1 security ofFIPS 140-2.Table 1: Module security level specificationSecurity Requirements SectionLevelCryptographic Module Specification 1Module Port and Interfaces 1Roles, Services and Authentication 2Finite State Model 1Physical Security 1Operational EnvironmentN/ACryptographic Key Management 1EMI/EMC 1Self-Tests 1Design Assurance 3Mitigation of Other AttacksN/AOperational environmentThe FIPS 140-2 Area 6 Operational Environment requirements are not applicable because thedevice does not support the loading and execution of un-trusted code. Avaya digitally signsfirmware images of the crypto module using RSA SHA1 digital signature. Through thissignature, the crypto module verifies the authenticity of any update to its firmware image.Assumptions of rolesThe cryptographic module supports eight distinct operator roles: Cryptographic-Officer, Read/Write User, Read-only User, RADIUS Server, OSPF Router Peer, PPPoE Client, IKE Peer, andSerial Number Peer.The cryptographic module enforces the separation of roles using operator authentication. Referto Table 14 for further information.294 Administration of the Avaya G350 Media Gateway

OverviewTable 14: Roles and required identification and authentication 1 of 2RoleType ofauthenticationAuthentication dataDescriptionCryptographic-Officer(Admin User)Identity-based operatorauthenticationUsername andPassword. The modulestores user identityinformation internallythrough the use of anexternal Radius Serverdatabase.The owner of thecryptographic modulewho has full access to themodule’s servicesUser(Read/Write User)Identity-based operatorauthenticationUsername andPassword. The modulestores user identityinformation internallythrough the use of anexternal Radius Serverdatabase.An assistant to the AdminUser who has read/writeaccess to a subset ofconfiguration and statusindicationsRead-only UserIdentity-based operatorauthenticationUsername andPassword. The modulestores user identityinformation internallythrough the use of anexternal Radius Serverdatabase.An assistant to the AdminUser who has read-onlyaccess to a subset ofmodule configuration andstatus indicationsRADIUS ServerRole-based operatorauthenticationShared Radius secret.Gateway authenticatesRadius serverresponse by examiningthe MD5 hash of theshared secret, therequest Authenticator,and other responsevalues in a responsemessage.An entity authenticates tothe module for thepurpose of permitting/denying access toservicesOSPF Router PeerRole-based operatorauthenticationRouter peer Secret.Authentication ofOSPF protocolexecuted by examiningthe authentication fieldin OSPF packetcarrying MD5 hash ofthe packet and thesecret.An entity authenticates tothe module for thepurpose of permitting/denying access toservices1 of 2Issue 3 January 2005 295

FIPSSecurity levelThe cryptographic module meets <strong>the</strong> overall requirements applicable to Level 1 security <strong>of</strong>FIPS 140-2.Table 1: Module security level specificationSecurity Requirements SectionLevelCryptographic Module Specification 1Module Port and Interfaces 1Roles, Services and Au<strong>the</strong>ntication 2Finite State Model 1Physical Security 1Operational EnvironmentN/ACryptographic Key Management 1EMI/EMC 1Self-Tests 1Design Assurance 3Mitigation <strong>of</strong> O<strong>the</strong>r AttacksN/AOperational environmentThe FIPS 140-2 Area 6 Operational Environment requirements are not applicable because <strong>the</strong>device does not support <strong>the</strong> loading and execution <strong>of</strong> un-trusted code. <strong>Avaya</strong> digitally signsfirmware images <strong>of</strong> <strong>the</strong> crypto module using RSA SHA1 digital signature. Through thissignature, <strong>the</strong> crypto module verifies <strong>the</strong> au<strong>the</strong>nticity <strong>of</strong> any update to its firmware image.Assumptions <strong>of</strong> rolesThe cryptographic module supports eight distinct operator roles: Cryptographic-Officer, Read/Write User, Read-only User, RADIUS Server, OSPF Router Peer, PPPoE Client, IKE Peer, andSerial Number Peer.The cryptographic module enforces <strong>the</strong> separation <strong>of</strong> roles using operator au<strong>the</strong>ntication. Referto Table 14 for fur<strong>the</strong>r information.294 <strong>Administration</strong> <strong>of</strong> <strong>the</strong> <strong>Avaya</strong> <strong>G350</strong> <strong>Media</strong> <strong>Gateway</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!