SafeNet Encryptor Security Policy
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
................................
..........................
................................
................................
................................
................................
................................
................................
................................
.........................
................................
................................
................................
...........................
Enclosure Indicators, Connectors and Controls
................................
................................
Front Panel Physical Interfaces
................................
................................
................................
Rear Panel Physical Interfaces
................................
................................
................................
................................
................................
................................
............................
FIPS Approved Mode of Operation
................................
................................
................................
................................
................................
................................
................................
................................
................................
fication and Authentication
................................
................................
................................
Cryptographic Keys and CSPs
................................
................................
................................
................................
................................
................................
................................
................................
................................
.........................
................................
................................
................................
............................
................................
................................
................................
................................
Glossary of Acronyms, Terms and Abbreviations
................................
................................
1.4-1-Cryptographic Module
................................
................................
................................
................................
................................
................................
................................
2.2-3–Mapping of Logical Interfaces to Physical Ports
................................
................................
2.3-1–Approved Module Algor
................................
................................
................................
2.3-2–Module Security Functions
................................
................................
................................
2.5-1–Roles with Required Identification and Authentication
................................
..........................
2.5-2–Strength of Authentication
................................
................................
................................
2.5-3–Cryptographic Keys and CSPs
................................
................................
..............................
................................
................................
................................
................................
................................
................................
2.6-1–Security Mechanism In
................................
................................
................................
................................
................................
..............................
SafeNet Encryptor Security Policy
................................
................................
................................
2.1-2-Encryptor Usage in Path Encryption Mode
................................
................................
2.1-3–Encryptor Usage in Line Encryption
................................
................................
2.2-1–Front View of Model 600 Encryptor
................................
................................
2.2-2–Rear View of Model 600 Encryptor
................................
................................
SafeNet Encryptor Security Policy
This document is the Security Policy for the
manufactured by SafeNet, Inc.
This Security Policy specifies the security rules under which the module shall operate to meet the
describes how the encryptor functions in order to meet the
FIPS requirements, and the actions that operators must take to maintain the security of the encryptor.
This Security Policy describes the features and design of the
using the terminology contained in
2, Security Requirements for Cryptographic Modules
security requirements that will be satisfied by a cryptographic module utilized within a securitysystem
otecting sensitive but unclassified information. The NIST
Cryptographic Module Validation
Program (CMVP) validates cryptographic modules to FIPS 140
Validated products are accepted by the
Federal agencies of both the USA and Canada for the protecti
on of sensitive or designated information.
2 standard, and information on the CMVP, can be found at
http://csrc.nist.gov/groups/STM/cmvp/index.html
. More information describing t
This Security Policy defines the
for multiple interface variants from 155
GB. These variants are functionally identical.
is Security Policy contains only non
proprietary information. All other documentation submitted for FIPS
140-2 conformance testing and validation is “SafeNet
Proprietary” and is releasable only under
2: Security Requirements for Cryptographic Modules
2 Annex A: Approved Security Functions
2 Annex B: Approved Protection Pro
2 Annex C: Approved Random Number Generators
2 Annex D: Approved Key Establishment Techniques
Derived Test Requirements (DTR) for FIPS PUB 140
Requirements for Cryptographic Modules
Data Encryption Standard (DES)
Digital Signature Standard (DSS)
Secure Hash Standard (SHS)
above references are available at URL:
http://csrc.nist.gov/groups/STM/cmvp/index.html
is also referred to as “the module” or “the encryptor”.
SafeNet Encryptor Security Policy
meets the overall requirements applicable
1.4-1-Cryptographic Module
Security Requirements Section
Cryptographic Module Specification
Cryptographic Module Ports and Interfaces
Finite State Machine Model
Cryptographic Key Management
Mitigation of Other Attacks
Cryptographic Module Security Policy
SafeNet Encryptor Security Policy
provides data privacy and access control for connections between vulnerable
public and private networks. It employs
DES algorithms and, with the
flexibility to choose the d
esired interface module, can be deployed in
OC-48)networks. The encryptor can be centrally controlled or managed across multiple remote
stations using SafeNet's Security Management Center (SMC), a SNMPv3
The role of the encryptor is illustrated in
. The encryptor is installed between
network. An encryptor communicates with other encryptors in the network,
establishing secured connections between itself and the other modules. The encryptors selectively
, or pass in the clear, data flowing from the switch to the network. Conversely the
encryptors selectively decrypt, reject, or pass information flowing from the network to the switch.
2.1-1–Encryptor Operation
Secured connections are established between the cryptographic module
using the RSA key exchange
ATM Forum Security Specification version 1.1)
. This results in a separate
and does not require any secret
keys to ever be displayed or manually transported
2.1-2-Encryptor Usage in Path Encryption Mode
shows an example of three secured paths and one unsecured path between sites.
SafeNet Encryptor Security Policy
2.1-3–Encryptor Usage in Line Encryption Mode
* ADM = Add/Drop Multiplexer
shows an example using encryptors in line encryption mode.
le-chip standalone cryptographic module consisting of production
components contained in a physically protected enclosure in accordance with FIPS 140
module outer casing defines the cryptographic boundary. The steel case completely enc
to protect it from tampering. Any attempt to remove the cover will automatically erase all
sensitive information stored internally in the encryptor.
The’x’ in the model numbers represents the
Power cords are accessory kit items that are
separate from the physical systems.
cord4 European power cord
SafeNet Encryptor Security Policy
’ in the model numbers represents the
licensed interface speed variants.
Licensing is a logical Right to Use that is
separate from the physical systems.
For SONET Encryptors (904
For Ethernet Encryptors (943
The models differ only in the enclosed line interface card containing the protocol specific cryptographic
interface card itself is not meant to be field serviceable. Any attempt to remove the
interface will tamper the encryptor, erasing all sensitive information stored internally. While the line
interface cards are not field serviceable, the pluggable transcei
vers are. The pluggable transceivers are
outside the cryptographic boundary and may be changed as needed for the specific requirements of the
Module management is provided in
band management uses management
hannels on the module’s interface ports. Out
band management is provided using the dedicated
Ethernet port or a console port.
models share a common enclosure.
shows the front view, which is the same
models. The front panel provides a network management port, a console port, a USB
port, an LCD display and LEDs for status, and a keypad for control input.
2.2-1–Front View of Model 600 Encryptor
2.2-2–Rear View of Model 6