Enterasys Networks XSR-1805 User Manual
Table of Contents
Crypto Officer Role.................................................................................................. 11
User Role ................................................................................................................ 14
Authentication Mechanisms .................................................................................... 14
User Role ................................................................................................................ 14
Authentication Mechanisms .................................................................................... 14
Key Generation ....................................................................................................... 18
Key Establishment................................................................................................... 18
Key Entry and Output .............................................................................................. 18
Key Storage ............................................................................................................ 19
Key Zeroization ....................................................................................................... 19
Key Establishment................................................................................................... 18
Key Entry and Output .............................................................................................. 18
Key Storage ............................................................................................................ 19
Key Zeroization ....................................................................................................... 19
Initial Setup ............................................................................................................. 22
Management ........................................................................................................... 23
Management ........................................................................................................... 23
© Copyright 2003
Enterasys Networks
Page 2 of 25
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.