Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
HP (Hewlett-Packard) FIPS 140-2 manuale d’uso - BKManuals

HP (Hewlett-Packard) FIPS 140-2 manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso HP (Hewlett-Packard) FIPS 140-2. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica HP (Hewlett-Packard) FIPS 140-2 o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso HP (Hewlett-Packard) FIPS 140-2 descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso HP (Hewlett-Packard) FIPS 140-2 dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo HP (Hewlett-Packard) FIPS 140-2
- nome del fabbricante e anno di fabbricazione HP (Hewlett-Packard) FIPS 140-2
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature HP (Hewlett-Packard) FIPS 140-2
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio HP (Hewlett-Packard) FIPS 140-2 non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti HP (Hewlett-Packard) FIPS 140-2 e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio HP (Hewlett-Packard) in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche HP (Hewlett-Packard) FIPS 140-2, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo HP (Hewlett-Packard) FIPS 140-2, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso HP (Hewlett-Packard) FIPS 140-2. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. HP StorageWorks Secure Key Manager (Hardware P/N AJ087B, Version 1.1; Firmware Version:1.1) FIPS 140-2 Security Policy Level 2 Validation Document Version 0.7 December 4, 2008[...]

  • Pagina 2

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 2 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Table of Contents 1 INTRODUCTION ................................................................................................................... ......[...]

  • Pagina 3

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 3 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Table of Figures F IGURE 1 – D EPLOYMENT A RCHITEC TURE OF TH E HP S TORAGE W ORKS S ECURE K EY M ANAGER ................................ 6 F IGURE 2 –[...]

  • Pagina 4

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 4 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Table of Tables T ABLE 1 – S ECURITY L EVEL PER FIPS 140-2 S ECTION .....................................................................................[...]

  • Pagina 5

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 5 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. 1 Introduction 1.1 Purpose This document is a no n-proprietary Cryptographic Mo dule Security Policy for the HP StorageWorks Secur e Key Manager (SK M) fro[...]

  • Pagina 6

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 6 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. 2 HP S torageW orks Secure Key Manager 2.1 Overview HP provides a ra nge of security produ cts for banking, th e Internet, and enterprise s ecurity applica[...]

  • Pagina 7

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 7 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Section Section Title Level 10 Design Assurance 2 11 Mitigation of Other Attacks N/A The block dia gram of the m odule is gi ven in Figure 2 – Block Diag[...]

  • Pagina 8

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 8 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. • Digital Sig nature Al gorithm ( DSA) PQG generatio n, ke y ge neration, s ignature ge neration, and sign ature verification: 10 24 bit s (cert i fi c a[...]

  • Pagina 9

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 9 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Figure 3 – Front Panel LEDs Descriptions of the LEDs are given in Table 3 – Front Panel LED Definitions. Table 3 – Front Panel LED Definition s Item [...]

  • Pagina 10

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 10 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Figure 4 – Rear Panel Components Descriptions of compone nts on the rear pane l are given i n Table 4 – Rear Panel C omponents Description s. Table 4 [...]

  • Pagina 11

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 11 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Descriptions of LEDs on the r ear panel a re gi ven in Table 5 – Rear Panel LED Defi nitions. Table 5 – Rear Panel LED Definitions Item Description St[...]

  • Pagina 12

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 12 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Service Description Keys/CSPs Perform first-time initialization Configure the module when it is used for the first time Crypto Officer (admin) password ?[...]

  • Pagina 13

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 13 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Table 7 – User Services Service Description Keys/CSPs Authenticate to SKM Authenticate to SKM with a username an d the associated password User password[...]

  • Pagina 14

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 14 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Service Description Keys/CSPs Zeroize all keys/CSPs Zeroize all keys/CSPs in the module All keys/CSPs – delete 2.4.4 Cluster Member Role The Cluster Mem[...]

  • Pagina 15

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 15 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. in 60 seconds. Since 10 -5 » 6×60 -8 , the probability of a successf ul password attem pt in 60 seconds is considerably less than 10 -5 . 2.4.6 Unauthen[...]

  • Pagina 16

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 16 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Key Key Type Generation / Input Output Storage Zeroization Use DH public param 1024-bit Diffie- Hellman public parameters Generated by ANSI X9.31 DRNG dur[...]

  • Pagina 17

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 17 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Key Key Type Generation / Input Output Storage Zeroization Use KRsaPub Server RSA public key (1024- or 2048- bit) Generated by ANSI X9.31 DRNG during firs[...]

  • Pagina 18

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 18 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Key Key Type Generation / Input Output Storage Zeroization Use Client AES key 128, 192 or 256-bit AES key Generated by ANSI X9.31 DRNG Via TLS in encrypte[...]

  • Pagina 19

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 19 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Key Key Type Generation / Input Output Storage Zeroization Use Log signing keys 1024-bit RSA public and private keys Generated by ANSI X9.31 DRNG at first[...]

  • Pagina 20

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 20 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. • Pairwise consi stency test f or new DSA keys • Pairwise consistency test for new RSA keys • Continuous random num ber generator test o n AN SI X 9[...]

  • Pagina 21

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 21 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. 3 Secure Operation The HP Storage Works Secure Key Manager m eets Level 2 re quirements for FIPS 140-2. T he sections belo w describe how to place and kee[...]

  • Pagina 22

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 22 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Figure 6 – FIPS Compliance in CLI In the web administration interface, the Crypto Officer s hould use the “High Secu rity Configuration” page to ena[...]

  • Pagina 23

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 23 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Figure 8 – Tamper-Evidence Lab els Figure 9 pr ovides a bette r view of t he posit ioning of t he tam per-evidence l abels ove r the powe r supplie s. F[...]

  • Pagina 24

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 24 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. 3.4 Key and CSP Zeroization To zeroize all keys and CSPs in the m o dule, the Crypto Officer sh ould execute reset factory settings zeroize command in the[...]

  • Pagina 25

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 25 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Acronyms Table 15 – Acronyms Acr on ym Definition 3DES Triple Data Encryption Standard AES Advanced Encryption Standard ANSI American National Standard [...]

  • Pagina 26

    Security Policy, version 1.0 January 31, 2008 HP StorageWorks Secure Key Manager Page 26 of 26 © 2008 Hewlett-Packard Com pany This document may be freely repro duced in its original entir et y. Acr on ym Definition NIC Network Interface Card NIST National Institute of Standards and Technolo g y NTP Network Time Protocol PCI Peripheral Component I[...]