Nortel Networks 4500 FIPS manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Nortel Networks 4500 FIPS, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Nortel Networks 4500 FIPS one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Nortel Networks 4500 FIPS. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Nortel Networks 4500 FIPS should contain:
- informations concerning technical data of Nortel Networks 4500 FIPS
- name of the manufacturer and a year of construction of the Nortel Networks 4500 FIPS item
- rules of operation, control and maintenance of the Nortel Networks 4500 FIPS item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Nortel Networks 4500 FIPS alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Nortel Networks 4500 FIPS, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Nortel Networks service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Nortel Networks 4500 FIPS.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Nortel Networks 4500 FIPS item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    © Copyright 2000 Nortel Networks. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Contivity™ Extranet Switch 4500 FIPS 140-1 Non-Proprietary Cryptographic Module Security Policy Level 2 Validation February 2000[...]

  • Page 2

    © Copyright 2000 Nortel Networks. 2 Table of Contents 1 Introduction .................................................................................................................. 3 1.1 Purpose ................................................................................................................... 3 1.2 References ..................[...]

  • Page 3

    © Copyright 2000 Nortel Networks. 3 1 Introduction 1.1 Purpose This is a non-proprietary Cryptographic Module Security Policy for the Contivity™ Extranet Switch 4500. This security policy describes how the Contivity™ Extranet Switch 4500 meets the security requirements of FIPS 140-1, and how to operate the Contivity™ Extranet Switch 4500 in [...]

  • Page 4

    © Copyright 2000 Nortel Networks. 4 This document provides an overview of the Contivity™ Switch and explains the secure configuration and operation of the module. This introduction section is followed by Section 2, which details the general features and functionality of the Contivity™ Switch. Section 3 specifically addresses the required confi[...]

  • Page 5

    © Copyright 2000 Nortel Networks. 5 2 The Contivity Extranet 4500 Switch The Nortel Networks Contivity Extranet Switch 4500 provides a scalable, secure, manageable remote access server that meets FIPS 140-1 level 2 requirements. This section will describe the general features and functionality provided by the Contivity Extranet Switch. Section 3 w[...]

  • Page 6

    © Copyright 2000 Nortel Networks. 6 . Figure 2 – Physical Interfaces The physical interfaces include the dual power plugs for the redundant power supplies, the power and reset buttons, the serial port, the LAN Port RJ-45 connector, and up to six slots containing additional network connectors. The power and reset buttons light up to indicate powe[...]

  • Page 7

    © Copyright 2000 Nortel Networks. 7 Figure 4 – 10/100BASE-TX LAN LEDs These physical interfaces are separated into the logical interfaces from FIPS as described in the following table: Switch physical interface FIPS 140-1 Logical Interface 10/100BASE-TX LAN Port, LAN Port, Serial Port Data Input Interface 10/100BASE-TX LAN Port, LAN Port, Serial[...]

  • Page 8

    © Copyright 2000 Nortel Networks. 8 front bezel allows access to the dual power supplies, hard drives, and floppy drive. Removing the top cover or the I/O panel allows access to the motherboard, memory, and expansion slots. Figure 5 – The Steel Cover of the Extranet Switch 4500 Once the Extranet Switch 4500 has been configured in its FIPS 140-1 [...]

  • Page 9

    © Copyright 2000 Nortel Networks. 9 (2) Top Cover Labels (2) Front Bezel Labels Figure 6 – Tamper-Evident Labels Applied to Switch Front Bezel and Top Cover (2) AC Filter Input Labels (1) Air Hole Label (1) I/O Panel Label (1) Keyboard Connector Label Figure 7 – Tamper Evident Labels Applied to Rear Panel The tamper-evident seals are produced [...]

  • Page 10

    © Copyright 2000 Nortel Networks. 10 Attempting to remove a label breaks it or continually tears off small fragments as depicted in Figure 9 . Other signs of tamper-evidence include a strong smell of organic solvents, warped or bent cover metal, and scratches in the paint on the module. FIPS 140-1 Level 2 Tamper Evident Label Serial Number: 567342[...]

  • Page 11

    © Copyright 2000 Nortel Networks. 11 • IPSec Protocol Tunnels • PPTP Protocol Tunnels • L2TP Protocol Tunnels • L2F Protocol Tunnels • Change Password 2.4.1 Crypto Officer Services There is a factory default login ID and password, which allows access to the Crypto Officer role. This initial account is the primary administrator's acc[...]

  • Page 12

    © Copyright 2000 Nortel Networks. 12 • Status Functions : to view the switch configuration, routing tables, active sessions, use Gets to view SNMP { XE "SNMP" } MIB II { XE "SNMP:MIB II" } statistics, usage graphs, health, temperature, memory status, voltage, packet statistics, and review accounting logs. • Manage the Switc[...]

  • Page 13

    © Copyright 2000 Nortel Networks. 13 2.5 Key Management The switch securely administers both cryptographic keys and other critical security parameters such as User passwords. Ephemeral sessions keys are created during the negotiation of secure tunnels on behalf of Users who have successfully authenticated themselves to the switch with their user I[...]

  • Page 14

    © Copyright 2000 Nortel Networks. 14 Recommended • Change the default administrator password on the switch. • Disable all management protocols over private non- tunnelled interfaces Required • Select the “FIPS Enabled” button on the Service Available Management screens and restart the module. • Apply the tamper evident labels as descri[...]