Motorola S2500 用户手册

下载
页码 18
 
MNR S2500 Security Policy  
 
Version 1.3, Revision Date: 1/13/2009 
 Page 
2
TABLE OF CONTENTS 
1. MODULE OVERVIEW .........................................................................................................................................3
 
2. SECURITY LEVEL ................................................................................................................................................4
 
3. MODES OF OPERATION.....................................................................................................................................4
 
4. PORTS AND INTERFACES .................................................................................................................................8
 
5. IDENTIFICATION AND AUTHENTICATION POLICY.................................................................................8
 
6. ACCESS CONTROL POLICY............................................................................................................................10
 
A
UTHENTICATED 
S
ERVICES
.....................................................................................................................................10
 
U
NAUTHENTICATED 
S
ERVICES
: ...............................................................................................................................10
 
R
OLES AND 
S
ERVICES
..............................................................................................................................................11
 
D
EFINITION OF 
C
RITICAL 
S
ECURITY 
P
ARAMETERS 
(CSP
S
)......................................................................................12
 
D
EFINITION OF 
CSP
M
ODES OF 
A
CCESS
................................................................................................................13
 
7. OPERATIONAL ENVIRONMENT....................................................................................................................15
 
8. SECURITY RULES ..............................................................................................................................................15
 
9. CRYPTO OFFICER GUIDANCE.......................................................................................................................16
 
10. PHYSICAL SECURITY POLICY ....................................................................................................................17
 
P
HYSICAL 
S
ECURITY 
M
ECHANISMS
.........................................................................................................................17
 
11. MITIGATION OF OTHER ATTACKS POLICY...........................................................................................17
 
12. DEFINITIONS AND ACRONYMS...................................................................................................................17