Polycom VSX 3000 Conference Phone User Manual


 
Non-Proprietary Security Policy, Version 1.0 June 15, 2007
Polycom VSX 3000, VSX 5000, and VSX 7000s
Page 4 of 23
© 2007 Polycom, Inc. -
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
T
ABLE
4
-
M
APPING OF
FIPS
140-2
L
OGICAL
I
NTERFACES TO
VSX
7000
E
I
NTERFACES
..............................................12
T
ABLE
5
-
M
APPING OF
FIPS
140-2
L
OGICAL
I
NTERFACES TO
VSX
7000
S
I
NTERFACES
..............................................13
T
ABLE
6
-
M
APPING OF
FIPS
140-2
L
OGICAL
I
NTERFACES TO
VSX
8000
I
NTERFACES
................................................15
T
ABLE
7
-
M
APPING OF
C
RYPTO
-O
FFICER
S
S
ERVICES TO
I
NPUTS
,
O
UTPUTS
,
C
RITICAL
S
ECURITY
P
ARAMETERS
(CSP
S
),
AND
A
CCESS
C
ONTROL
...........................................................................................................................16
T
ABLE
8
-
M
APPING OF
U
SER
S
S
ERVICES TO
I
NPUTS
,
O
UTPUTS
,
CSP
S
,
AND
A
CCESS
C
ONTROL
.................................16
T
ABLE
9
-
L
IST OF
C
RYPTOGRAPHIC
K
EYS
,
C
RYPTOGRAPHIC
K
EY
C
OMPONENTS
,
AND
CSP
S
.....................................17
T
ABLE
10
-
LED/P
OWER
B
UTTON
L
IGHT
D
ESCRIPTION
...............................................................................................21
T
ABLE
11
-
BRI
N
ETWORK
I
NTERFACE
LED
S
..............................................................................................................22
T
ABLE
12
-
PRI
N
ETWORK
I
NTERFACE
LED
S
..............................................................................................................22
T
ABLE
13
-
V.35/RS-449/RS-530
N
ETWORK
I
NTERFACE
LED
S
..................................................................................22
T
ABLE
14
-
A
CRONYMS
................................................................................................................................................23