Enterasys Networks XSR-1805 User Manual

Page of 25
Introduction 
Purpose 
This document is a nonproprietary Cryptographic Module Security Policy 
for the Enterasys Networks XSR-1805, XSR-1850, and XSR-3250 
appliances.  This security policy describes how the XSR-1805, XSR-1850, 
and XSR-3250
 
meet the security requirements of FIPS 140-2 and how to 
run the modules in a secure FIPS 140-2 mode.  This policy was prepared 
as part of the Level 2 FIPS 140-2 validation of the module.   
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 
— Security Requirements for Cryptographic Modules) details the U.S. 
Government requirements for cryptographic modules.  More information 
about the FIPS 140-2 standard and validation program is available on the 
NIST Web site at 
The Enterasys Networks XSR-1805, XSR-1850, and XSR-3250 
appliances are referenced in this document as X-Pedition Security 
Routers, XSR modules, and the modules. The XSR-1805 and XSR-1850 
modules are also referenced as the XSR-18xx modules. The differences 
between the three modules are cited where appropriate.   
References 
This document deals only with operations and capabilities of the module in 
the technical terms of a FIPS 140-2 cryptographic module security policy.  
More information is available on the module from the following sources: 
The Enterasys Networks Web site (
http://www.enterasys.com/
) contains 
information on all Enterasys Networks products. 
contains contact information for answers to technical or sales-related 
questions for the module. 
 
Document Organization 
The Security Policy document is one document in a FIPS 140-2 
Submission Package. In addition to this document, the Submission 
Package contains:  
 
Vendor Evidence document 
 
Finite State Machine 
 
Other supporting documentation as additional references 
 
© Copyright 2003 
Enterasys Networks
  Page 3 of 25 
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.