Network Router Owner Manual
MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
Page 2
TABLE OF CONTENTS
1. MODULE OVERVIEW .........................................................................................................................................3
2. SECURITY LEVEL................................................................................................................................................4
3. MODES OF OPERATION.....................................................................................................................................4
4. PORTS AND INTERFACES .................................................................................................................................8
5. IDENTIFICATION AND AUTHENTICATION POLICY.................................................................................8
6. ACCESS CONTROL POLICY............................................................................................................................10
AUTHENTICATED SERVICES.....................................................................................................................................10
UNAUTHENTICATED SERVICES: ...............................................................................................................................10
ROLES AND SERVICES..............................................................................................................................................11
DEFINITION OF CRITICAL SECURITY PARAMETERS (CSPS)......................................................................................12
DEFINITION OF CSPS MODES OF ACCESS ................................................................................................................13
7. OPERATIONAL ENVIRONMENT....................................................................................................................15
8. SECURITY RULES..............................................................................................................................................15
9. CRYPTO OFFICER GUIDANCE.......................................................................................................................16
10. PHYSICAL SECURITY POLICY ....................................................................................................................17
PHYSICAL SECURITY MECHANISMS.........................................................................................................................17
11. MITIGATION OF OTHER ATTACKS POLICY...........................................................................................17
12. DEFINITIONS AND ACRONYMS...................................................................................................................17