Nokia IP265 Security Guide - Page 3
Purpose, References - configuring
View all Nokia IP265 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 3 highlights
1 INTRODUCTION 1.1 Purpose This document is a nonproprietary Cryptographic Module Security Policy supporting the Nokia VPN Appliance family. This security policy describes the Nokia VPN Appliance and describes how it meets the security requirements of FIPS 140-2. It also describes how to run the module in an Approved FIPS 140-2 mode of operation. This document was prepared as part of the FIPS 140-2 Level 2 validation of the module. Previous versions of the Nokia VPN Appliance (including hardware versions IP350, IP355, IP380 and IP385) running IPSO version 3.9 and the identical Check Point VPN firmware version as the modules presented in this document (see Section 2.2) are separately validated under FIPS 140-2 (FIPS 140-2 Certificate numbers 450 and 834). This Security Policy adds additional hardware versions to the family of Nokia FIPS 140-2 tested cryptographic modules. The additional hardware platforms included in this document simply support different numbers of network interfaces and different processor performance characteristics than the previously validated modules and introduce different physical housings that require retesting under FIPS 140-2. This Security Policy supports the addition of Nokia's IPSO firmware version 4.1. There are no FIPS security relevant changes introduced between IPSO firmware version 3.9 and 4.1. The Nokia VPN Appliances are referenced collectively in this document as IP security platforms, security platforms, platforms, and the module(s). Specific differences between module hardware versions are pointed out where relevant. 1.2 References This document deals only with operations and capabilities of the module in the technical terms of a FIPS 140-2 cryptographic module security policy. The Nokia Web site (http://www.nokia.com/) contains information on the full line of products from Nokia. Additional information regarding the Check Point VPN-1 firmware that is used inside the Nokia VPN Appliances, including specific configuration instructions for the firmware can be found by referencing the Check Point VPN-1 FIPS 140-2 security policy, available at the following URL: http://csrc.nist.gov/cryptval/140-1/140sp/140sp722.pdf © Copyright 2005, 2006, 2007 Nokia Page 3 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.