Nokia IP265 Security Guide - Page 39
User Guidance
View all Nokia IP265 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 39 highlights
Figure 8 - Only FIPS-Approved Algorithms Can Be Used with IPSec or IKE Note: This applies equally for either star or meshed VPN community properties 3.2 User Guidance The User accesses the module VPN functionality as an IPSec client. Although outside the boundary of the module, the User should be careful not to provide authentication information and session keys to other parties. The User should also make certain that no keys or CSPs are shared between the non-Approved mode and the Approved mode of operation when switching between modes of operation. To ensure that no sharing occurs, a User must zeroize all keys while in one mode of operation before switching to another mode of operation. © Copyright 2005, 2006, 2007 Nokia Page 39 of 43 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.