Polycom VSX 7000s Conference Phone User Manual


 
Non-Proprietary Security Policy, Version 1.0 June 15, 2007
Polycom VSX 3000, VSX 5000, and VSX 7000s
Page 3 of 23
© 2007 Polycom, Inc. -
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Table of Contents
0 INTRODUCTION ...............................................................................................................................................5
0.1 P
URPOSE
.........................................................................................................................................................5
0.2 R
EFERENCES
...................................................................................................................................................5
0.3 D
OCUMENT
O
RGANIZATION
...........................................................................................................................5
1 VSX 3000, VSX 5000, AND VSX 7000S.............................................................................................................6
1.1 O
VERVIEW
......................................................................................................................................................6
1.2 M
ODULE
S
PECIFICATIONS
..............................................................................................................................6
1.3 M
ODULE
I
NTERFACES
....................................................................................................................................8
1.4 R
OLES AND
S
ERVICES
...................................................................................................................................16
1.4.1 Crypto-Officer Role .............................................................................................................................16
1.4.2 User Role .............................................................................................................................................16
1.4.3 Authentication......................................................................................................................................17
1.5 P
HYSICAL
S
ECURITY
....................................................................................................................................17
1.6 O
PERATIONAL
E
NVIRONMENT
......................................................................................................................17
1.7 C
RYPTOGRAPHIC
K
EY
M
ANAGEMENT
..........................................................................................................17
1.7.1 Key Generation....................................................................................................................................18
1.7.2 Key Input/Output .................................................................................................................................18
1.7.3 Key Storage..........................................................................................................................................19
1.7.4 Key Zeroization....................................................................................................................................19
1.8 S
ELF
-T
ESTS
..................................................................................................................................................19
1.9 D
ESIGN
A
SSURANCE
.....................................................................................................................................19
2 SECURE OPERATION....................................................................................................................................20
2.1 C
RYPTO
-O
FFICER
G
UIDANCE
.......................................................................................................................20
2.1.1 Initialization.........................................................................................................................................20
2.1.2 Management ........................................................................................................................................20
2.2 U
SER
G
UIDANCE
..........................................................................................................................................21
3 ACRONYMS......................................................................................................................................................23
Table of Figures
F
IGURE
1
-
VSX
3000.....................................................................................................................................................6
F
IGURE
2
-
VSX
5000.....................................................................................................................................................7
F
IGURE
3
-
VSX
7000
S
...................................................................................................................................................7
F
IGURE
4
-
VSX
7000
E
...................................................................................................................................................7
F
IGURE
5
-
VSX
8000.....................................................................................................................................................8
F
IGURE
6
-
VSX
3000
C
ONNECTOR
P
ANEL
....................................................................................................................9
F
IGURE
7
-
VSX
5000
B
ACK
P
ANEL
.............................................................................................................................10
F
IGURE
8
-
VSX
7000
E
B
ACK
P
ANEL
...........................................................................................................................12
F
IGURE
9
-
VSX
7000
S
B
ACK
P
ANEL
...........................................................................................................................13
F
IGURE
10
-
VSX
8000
B
ACK
P
ANEL
...........................................................................................................................15
Table of Tables
T
ABLE
1
-
S
ECURITY
L
EVEL
P
ER
FIPS
140-2
S
ECTION
...................................................................................................8
T
ABLE
2
-
M
APPING OF
FIPS
140-2
L
OGICAL
I
NTERFACES TO
VSX
3000,
VSX
5000,
AND
VSX
7000
S
I
NTERFACES
...9
T
ABLE
3
-
M
APPING OF
FIPS
140-2
L
OGICAL
I
NTERFACES TO
VSX
5000
I
NTERFACES
................................................10