7.7 Programmable Logic Device (PLD)
This component embodies all additional logic necessary to interface components contained
within the security envelope.
7.8 USB (Universal Serial Bus) Controller
This component allows the board to communicate with an iKey. The iKey is used to store a
Personal Identification Number PIN that allows for user authentication, or to store key parts for
moving keys from one HSM to another HSM.
7.9 Universal Asynchronous Receiver Transmitter (UART)
This component is disabled in the production version of the HSM board.
7.10 33MHz Clock
This circuitry generates a square wave to provide the primary system clock and to synchronize
the various components of the HSM with the operation of the FastMap chip.
8.0 Definition of Security Relevant Data Items
The following are the security relevant data items in this module: Master Key (MK) = The
3DES3KEY key which encrypts all non-volatile critical security parameters that are stored
within the module (in the flash). The master key is stored in the BBRAM, and is destroyed when
power is removed from both the PCI interface and the battery, and by the tamper detection
circuitry whenever tampering is detected. The master key is randomly generated when the
board is initialized (the Security Officer role is created). Security Officer role PIN (SOPIN) =
The SO role PIN is generated randomly when the board is initialized. It is written to an iKey
token through the trusted USB interface. Refer to following section 9.2 for a description of how
this PIN is used for authentication. User Role PIN (UserPIN) = The User Role PIN is generated
randomly when the SO invokes the Create User service. It is written to an iKey token through
the trusted USB interface. Refer to following section 9.2 for a description of how this PIN is
used for authentication. Key-Wrapping-Key (KWK) = A 3DES3KEY key created by either the
SO or User role for the purpose of wrapping private RSA keys. The Key-Wrapping-Key may
be randomly generated using the Generate Key service, or may be entered into the module
using the Combine Key service, which combines two key shares entered through the trusted
USB interface. In the non-FIPS 140-1 mode, the Key-Wrapping-Key may also be created
HSM Security Policy
226 User Guide
April 2013
Comments? infodev@avaya.com
Summary of Contents for 3050-VM
Page 1: ...User Guide Avaya VPN Gateway Release 9 0 NN46120 104 Issue 04 04 April 2013 ...
Page 4: ...4 User Guide April 2013 Comments infodev avaya com ...
Page 12: ...12 User Guide April 2013 ...
Page 20: ...New in this release 20 User Guide April 2013 Comments infodev avaya com ...
Page 30: ...Introducing the VPN Gateway 30 User Guide April 2013 Comments infodev avaya com ...
Page 36: ...Introducing the ASA 310 FIPS 36 User Guide April 2013 Comments infodev avaya com ...
Page 74: ...Upgrading the AVG Software 74 User Guide April 2013 Comments infodev avaya com ...
Page 86: ...Managing Users and Groups 86 User Guide April 2013 Comments infodev avaya com ...
Page 130: ...The Command Line Interface 130 User Guide April 2013 Comments infodev avaya com ...
Page 162: ...Supported Ciphers 162 User Guide April 2013 Comments infodev avaya com ...
Page 212: ...Syslog Messages 212 User Guide April 2013 Comments infodev avaya com ...
Page 242: ...Definition of Key Codes 242 User Guide April 2013 Comments infodev avaya com ...
Page 259: ...Creating a Port Forwarder Authenticator User Guide April 2013 259 ...
Page 266: ...Using the Port Forwarder API 266 User Guide April 2013 Comments infodev avaya com ...
Page 274: ...X 509 274 User Guide April 2013 Comments infodev avaya com ...