13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Security rulesNote:5. The cryptographic module performs <strong>the</strong> following tests:●Power up Self-Tests:Cryptographic algorithm tests:● TDES Known Answer Test (tests DES performance as well)● AES Known Answer Test● SHA-1 Known Answer Test● HMAC-SHA-1 Known Answer Test● DRNG Known Answer Test● RSA Known Answer TestNote:FIPS 140-2 does not require execution <strong>of</strong> <strong>the</strong> Diffie-Hellman Known Answerself-test. A letter <strong>of</strong> conformance to <strong>the</strong> corresponding standard will be providedto NIST instead.<strong>Gateway</strong> S<strong>of</strong>tware Integrity Test (32 bit CRC verification) and Booter Integrity Test (32bit CRC verification)Critical Functions Tests:● NVRAM Integrity test● EEPROM Integrity Test● Conditional Self-Tests:● Continuous Random Number Generator (RNG) test - performed on all RNGs involvedin crypto activities in FIPS-approved mode. Performed for PRNG x9.31 and RandomSeed Generator.●Bypass Test● Firmware load test6. You can instruct <strong>the</strong> module to perform <strong>the</strong> power-up self-tests via power cycle.7. Prior to each use, <strong>the</strong> internal RNG is tested using <strong>the</strong> conditional test specified inFIPS 140-2 §4.9.2.8. Data output is inhibited during key generation, self-tests, zeroization, and error states.9. The module supports concurrent operators and maintains separation <strong>of</strong> roles and services.10. Users can plug-in and use any <strong>Avaya</strong> <strong>Media</strong> Module that does not support cryptographicfunctionality without restriction.11. <strong>Media</strong> modules with cryptographic functionality must be evaluated separately against <strong>the</strong>FIPS 140-2 requirements.Issue 3 January 2005 305

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!