Nokia IP265 Security Guide - Page 3

Purpose, References - configuring

Page 3 highlights

1 INTRODUCTION 1.1 Purpose This document is a nonproprietary Cryptographic Module Security Policy supporting the Nokia VPN Appliance family. This security policy describes the Nokia VPN Appliance and describes how it meets the security requirements of FIPS 140-2. It also describes how to run the module in an Approved FIPS 140-2 mode of operation. This document was prepared as part of the FIPS 140-2 Level 2 validation of the module. Previous versions of the Nokia VPN Appliance (including hardware versions IP350, IP355, IP380 and IP385) running IPSO version 3.9 and the identical Check Point VPN firmware version as the modules presented in this document (see Section 2.2) are separately validated under FIPS 140-2 (FIPS 140-2 Certificate numbers 450 and 834). This Security Policy adds additional hardware versions to the family of Nokia FIPS 140-2 tested cryptographic modules. The additional hardware platforms included in this document simply support different numbers of network interfaces and different processor performance characteristics than the previously validated modules and introduce different physical housings that require retesting under FIPS 140-2. This Security Policy supports the addition of Nokia's IPSO firmware version 4.1. There are no FIPS security relevant changes introduced between IPSO firmware version 3.9 and 4.1. The Nokia VPN Appliances are referenced collectively in this document as IP security platforms, security platforms, platforms, and the module(s). Specific differences between module hardware versions are pointed out where relevant. 1.2 References This document deals only with operations and capabilities of the module in the technical terms of a FIPS 140-2 cryptographic module security policy. The Nokia Web site (http://www.nokia.com/) contains information on the full line of products from Nokia. Additional information regarding the Check Point VPN-1 firmware that is used inside the Nokia VPN Appliances, including specific configuration instructions for the firmware can be found by referencing the Check Point VPN-1 FIPS 140-2 security policy, available at the following URL: http://csrc.nist.gov/cryptval/140-1/140sp/140sp722.pdf © Copyright 2005, 2006, 2007 Nokia Page 3 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43

1 I
NTRODUCTION
1.1
Purpose
This document is a nonproprietary Cryptographic Module Security Policy
supporting the Nokia VPN Appliance family.
This security policy describes
the Nokia VPN Appliance and describes how it meets the security
requirements of FIPS 140-2. It also describes how to run the module in an
Approved FIPS 140-2 mode of operation.
This document was prepared
as part of the FIPS 140-2 Level 2 validation of the module.
Previous versions of the Nokia VPN Appliance (including hardware
versions IP350, IP355, IP380 and IP385) running IPSO version 3.9 and
the identical Check Point VPN firmware version as the modules presented
in this document (see Section 2.2) are separately validated under FIPS
140-2 (FIPS 140-2 Certificate numbers 450 and 834).
This Security Policy adds additional hardware versions to the family of
Nokia FIPS 140-2 tested cryptographic modules. The additional hardware
platforms included in this document simply support different numbers of
network interfaces and different processor performance characteristics
than the previously validated modules and introduce different physical
housings that require retesting under FIPS 140-2.
This Security Policy supports the addition of Nokia’s IPSO firmware
version 4.1. There are no FIPS security relevant changes introduced
between IPSO firmware version 3.9 and 4.1.
The Nokia VPN Appliances are referenced collectively in this document as
IP security platforms
,
security platforms
,
platforms
, and
the module(s)
.
Specific differences between module hardware versions are pointed out
where relevant.
1.2
References
This document deals only with operations and capabilities of the module in
the technical terms of a FIPS 140-2 cryptographic module security policy.
The Nokia Web site (
) contains information on the
full line of products from Nokia.
Additional information regarding the Check Point VPN-1 firmware that is
used inside the Nokia VPN Appliances, including specific configuration
instructions for the firmware can be found by referencing the Check Point
VPN-1 FIPS 140-2 security policy, available at the following URL:
© Copyright 2005, 2006, 2007
Nokia
Page 3 of 43
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.