Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs)

Size: px
Start display at page:

Download "Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs)"

Transcription

1 Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) Haae vesions: 1905[1][2], 1921[1][2], 1941[1][2], 2901[1][3], 2911[1][4], 2921[1][5], FIPS Kit (CISCO-FIPS- KIT=), Revision -B0[1], ISR: FIPS-SHIELD-1900=[2], FIPS- SHIELD-2901=[3], FIPS-SHIELD-2911=[4] an FIPS- SHIELD-2921=[5] Fimae vesions: 15.1(2)T2A an 15.1(2)T3 FIPS Non-Popietay Secuity Policy Oveall Level 2 (Sections 3 an 10 Level 3) Valiation Vesion 0.12 July 2011

2 Intouction... 3 Refeences... 3 FIPS Submission Package... 3 Moule Desciption... 4 Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs)... 4 Moule Valiation Level... 4 Cyptogaphic Bounay... 6 Cyptogaphic Moule Pots an Intefaces... 6 Roles, Sevices, an Authentication Use Sevices Cyptogaphic Office Sevices Unauthenticate Use Sevices Cyptogaphic Key/CSP Management Cyptogaphic Algoithms Appove Cyptogaphic Algoithms Non-Appove Algoithms Self-Tests Physical Secuity Moule Opacity an Tampe Evience Secue Opeation Initial Setup System Initialization an Configuation IPSec Requiements an Cyptogaphic Algoithms Potocols Remote Access Wieless Sevices Cisco Unifie Boe Element (CUBE) TLS Configuation Relate Documentation Obtaining Documentation Cisco.com Pouct Documentation DVD Oeing Documentation Documentation Feeback Cisco Pouct Secuity Ovevie Repoting Secuity Poblems in Cisco Poucts Obtaining Technical Assistance Cisco Technical Suppot & Documentation Website Submitting a Sevice Request Definitions of Sevice Request Seveity Obtaining Aitional Publications an Infomation Definition List

3 Intouction This is a non-popietay Cyptogaphic Moule Secuity Policy fo the Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) fom Cisco Systems, Inc. (Haae Vesions: 1905[1][2], 1921[1][2], 1941[1][2], 2901[1][3], 2911[1][4], 2921[1][5], FIPS Kit (CISCO-FIPS-KIT=), Revision -B0[1], ISR: FIPS-SHIELD-1900=[2], FIPS-SHIELD-2901=[3], FIPS-SHIELD- 2911=[4] an FIPS-SHIELD-2921=[5]; Fimae Vesions: IOS 15.1(2)T2A an 15.1(2)T3), efee to in this ocument as the moules, outes, o by thei specific moel name. This secuity policy escibes ho moules meet the secuity equiements of FIPS an ho to un the moules in a FIPS moe of opeation. FIPS (Feeal Infomation Pocessing Stanas Publication Secuity Requiements fo Cyptogaphic Moules) etails the U.S. Govenment equiements fo cyptogaphic moules. Moe infomation about the FIPS stana an valiation pogam is available on the NIST ebsite at Refeences This ocument eals only ith opeations an capabilities of the moule in the technical tems of a FIPS cyptogaphic moule secuity policy. Moe infomation is available on the moule fom the folloing souces: The Cisco Systems ebsite ( contains infomation on the full line of poucts fom Cisco Systems. The NIST Cyptogaphic Moule Valiation Pogam ebsite ( contains contact infomation fo anses to technical o sales-elate questions fo the moule. FIPS Submission Package The secuity policy ocument is one ocument in a FIPS Submission Package. In aition to this ocument, the submission package inclues: Veno Evience Finite State Machine Othe suppoting ocumentation as aitional efeences With the exception of this non-popietay secuity policy, the FIPS valiation ocumentation is popietay to Cisco Systems, Inc. an is eleasable only une appopiate non-isclosue ageements. Fo access to these ocuments, please contact Cisco Systems, Inc. See Obtaining Technical Assistance section fo moe infomation. 3

4 Moule Desciption Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) The Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) ae outing platfoms that povies VPN functionality, as ell as, SIP Gateay Signaling Ove TLS Tanspot. The Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) povie connectivity an secuity sevices in a single, secue evice. These outes offe boaban spees an simplifie management to small businesses, an entepise small banch an teleokes. In suppot of the outing capabilities, the Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) povie IPSec, GetVPN (GDOI), an SSL v3.1 connection capabilities fo VPN enable clients connecting though the Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs). The teste platfoms consist of the folloing components: Cisco 1905 ISR Cisco 1921 ISR Cisco 1941 ISR Cisco 2901 ISR Cisco 2911 ISR Cisco 2921 ISR Moule Valiation Level Moel Fimae Cisco 1905 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 1921 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 1941 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 2901 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 2911 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 2921 ISR 15.1(2)T2A an 15.1(2)T3 Table 1: Moule Haae Configuations The folloing table lists the level of valiation fo each aea in the FIPS PUB No. Aea Title Level 1 Cyptogaphic Moule Specification 2 2 Cyptogaphic Moule Pots an Intefaces 2 3 Roles, Sevices, an Authentication 3 4 Finite State Moel 2 5 Physical Secuity 2 4

5 6 Opeational Envionment N/A 7 Cyptogaphic Key management 2 8 Electomagnetic Inteface/Electomagnetic Compatibility 2 9 Self-Tests 2 10 Design Assuance 3 11 Mitigation of Othe Attacks N/A Oveall Oveall moule valiation level 2 Table 2: Moule Valiation Level 5

6 Cyptogaphic Bounay The cyptogaphic bounay fo the Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) is efine as the moules chassis along ith the opacity shiels. Cyptogaphic Moule Pots an Intefaces Each moule povies a numbe of physical an logical intefaces to the evice, an the physical intefaces povie by the moule ae mappe to fou FIPS efine logical intefaces: ata input, ata output, contol input, an status output. The logical intefaces an thei mapping ae escibe in the folloing tables: Physical Intefaces FIPS Logical Intefaces EHWIC Slot Data Input Inteface 10/100/1000 Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots Data Output Inteface 10/100/1000 Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots Contol Input Inteface 10/100/1000 Pots (2) Console Pot USB Console Pot Auxiliay Pot Reset Button Seial Pot Activity LED Status Output Inteface System LED Compact Flash LED (2) RPS Boost LED Poe LED (2) Console Pot Auxiliay Pot USB Console Pot Seial Pot Poe Plug Poe inteface PoE Pot Table 3: Cisco 1905 ISR Intefaces Physical Intefaces EHWIC Slots (2) 10/100/1000 Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (2) 10/100/1000 Pots (2) FIPS Logical Intefaces Data Input Inteface Data Output Inteface 6

7 Physical Intefaces FIPS Logical Intefaces Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (2) Contol Input Inteface 10/100/1000 Pots (2) Console Pot USB Console Pot Auxiliay Pot Reset Button Activity LED Status Output Inteface System LED Compact Flash LED (2) RPS Boost LED Poe LED (2) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface PoE Pot Table 4: Cisco 1921 ISR Intefaces Physical Intefaces FIPS Logical Intefaces EHWIC Slots (2) Data Input Inteface GigE Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (2) Data Output Inteface GigE Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (2) Contol Input Inteface GigE Pots (2) Console Pot USB Console Pot Auxiliay Pot Activity LED Status Output Inteface System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) Compact Flash LED (2) WLAN LED RPS Boost LED Poe LED (2) GigE pots (2) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface PoE Pot Table 5: Cisco 1941 ISR Intefaces Physical Intefaces FIPS Logical Intefaces 7

8 Physical Intefaces FIPS Logical Intefaces EHWIC Slots (4) Data Input Inteface GigE Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Data Output Inteface GigE Pots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Contol Input Inteface GigE Pots (2) Console Pot USB Console Pot Auxiliay Pot Activity LED Status Output Inteface System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) Compact Flash LED (2) RPS Boost LED Poe LED (2) GigE pots (2) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface PoE Pot Table 6: Cisco 2901 ISR Intefaces Physical Intefaces EHWIC Slots (4) SM Slot (1) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) SM Slot (1) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) SM Slot (1) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot Activity LED System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) SM LED FIPS Logical Intefaces Data Input Inteface Data Output Inteface Contol Input Inteface Status Output Inteface 8

9 Physical Intefaces FIPS Logical Intefaces Compact Flash LED (2) RPS Boost LED Poe LED (2) GigE pots (3) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface PoE Pot Table 7: Cisco 2911 ISR Intefaces Physical Intefaces FIPS Logical Intefaces EHWIC Slots (4) Data Input Inteface SM Slot (1) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Data Output Inteface SM Slot (1) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Contol Input Inteface SM Slot (1) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot Activity LED Status Output Inteface System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) SM LED Compact Flash LED (2) RPS Boost LED Poe LED (2) GigE pots (3) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface PoE Pot Table 8: Cisco 2921 ISR Intefaces NOTE: The 1941 ISR moule inclues thee Antenna Connectos. These connectos ae isable by coveing ith Tampe Evient Labels (TELs) hile opeating in FIPS-moe. NOTE: Each moule inclues to USB pots an to compact flash slots. These pots an slots ae isable by coveing ith TELs hile opeating in FIPS-moe. 9

10 Roles, Sevices, an Authentication Authentication is ientity-base. Each use is authenticate upon initial access to the moule. Thee ae to oles in the oute that opeatos may assume: the Cypto Office ole an the Use ole. The aministato of the oute assumes the Cypto Office ole in oe to configue an maintain the oute using Cypto Office sevices, hile the Uses execise only the basic Use sevices. The moule suppots RADIUS an TACACS+ fo authentication. A complete esciption of all the management an configuation capabilities of the moules can be foun in the IOS vesion 12.4T Configuation Guie Manual an in the online help fo the moules. The Use an Cypto Office passos an all shae secets must each be at least eight (8) chaactes long, incluing at least one lette an at least one numbe chaacte, in length (enfoce poceually). The maximum length of passos is 25 chaactes. See the Secue Opeation section fo moe infomation. If six (6) integes, one (1) special chaacte an one (1) alphabet ae use ithout epetition fo an eight (8) igit PIN, the pobability of anomly guessing the coect sequence is one (1) in 832,000,000. In oe to successfully guess the sequence in one minute oul equie the ability to make ove 13,000,000 guesses pe secon, hich fa excees the opeational capabilities of the moule. Incluing the est of the alphanumeic chaactes astically eceases the os of guessing the coect sequence. Aitionally, hen using RSA base authentication, RSA key pai has moulus size of 1024 bit to 2048 bit, thus poviing beteen 80 bits an 112 bits of stength. Assuming the lo en of that ange, an attacke oul have a 1 in 2 80 chance of anomly obtaining the key, hich is much stonge than the one in a million chance equie by FIPS To excee a one in 100,000 pobability of a successful anom key guess in one minute, an attacke oul have to be capable of appoximately 1.8x10 21 attempts pe minute, hich fa excees the opeational capabilities of the moules to suppot. Use Sevices A Use entes the system by accessing the console/auxiliay pot ith a teminal pogam o SSH v2 session to a LAN pot. The moule pompts the Use fo thei usename/passo combination. If the usename/passo combination is coect, the Use is alloe enty to the moule management functionality. The sevices available to the Use ole consist of the folloing: Status Functions - Vie state of intefaces an potocols, fimae vesion Netok Functions - Connect to othe netok evices an initiate iagnostic netok sevices (i.e., ping, mtace). Teminal Functions - Ajust the teminal session (e.g., lock the teminal, ajust flo contol) Diectoy Sevices - Display iectoy of files kept in memoy Pefom Self-Tests Pefom the FIPS 140 stat-up tests on eman 10

11 VPN functions - Negotiation an encypte ata tanspot via VPN Cyptogaphic Office Sevices A Cypto Office entes the system by accessing the console/auxiliay pot ith a teminal pogam o SSH v2 session to a LAN pot. The Cypto Office authenticates as a Use an then authenticates as the Cypto Office ole. Duing initial configuation of the oute, the Cypto Office passo (the enable passo) is efine. A Cypto Office may assign pemission to access the Cypto Office ole to aitional accounts, theeby ceating aitional Cypto Offices. The Cypto Office ole is esponsible fo the configuation an maintenance of the oute. The Cypto Office sevices consist of the folloing: Configue the moule - Define netok intefaces an settings, ceate comman aliases, set the potocols the oute ill suppot, enable intefaces an netok sevices, set system ate an time, an loa authentication infomation. Define Rules an Filtes - Ceate packet Filtes that ae applie to Use ata steams on each inteface. Each Filte consists of a set of Rules, hich efine a set of packets to pemit o eny base chaacteistics such as potocol ID, aesses, pots, TCP connection establishment, o packet iection. Status Functions - Vie the moule configuation, outing tables, active sessions, use get commans to vie SNMP MIB statistics, health, tempeatue, memoy status, voltage, packet statistics, evie accounting logs, an vie physical inteface status. Manage the moule - Log off uses, shuton o eloa the oute, manually back up oute configuations, vie complete configuations, manage use ights, initiate poe-on self tests on eman an estoe oute configuations. Set Encyption/Bypass - Set up the configuation tables fo IP tunneling. Set keys an algoithms to be use fo each IP ange o allo plaintext packets to be set fom specifie IP aess. Pefom Self-Tests Pefom the FIPS 140 stat-up tests on eman The Cypto Office also has access to all Use sevices. Unauthenticate Use Sevices The sevices fo someone ithout an authoize ole ae to vie the status output fom the moule s LED, pefom bypass sevices an cycle poe. 11

12 Cyptogaphic Key/CSP Management The moule secuely aministes both cyptogaphic keys an othe citical secuity paametes such as passos. The tampe evience seals povie physical potection fo all keys. All keys ae also potecte by the passo-potection on the Cypto Office ole login, an can be zeoize by the Cypto Office. All zeoization consists of oveiting the memoy that stoe the key. Keys ae exchange an entee electonically o via Intenet Key Exchange (IKE)/Goup Domain of Intepetation (GDOI). The moule oes not output keys o key components in plaintext fom. The moule suppots the folloing citical secuity paametes (CSPs): ID Algoithm Size Desciption Stoage Zeoization Metho RNG See X bits This is the see fo X9.31 RNG. This CSP is stoe in DRAM an upate peioically afte the geneation of 400 bytes afte this it is eseee ith oute-eive entopy; hence, it is zeoize peioically. Also, the opeato can tun off the oute to zeoize this CSP. DRAM (plaintext) RNG See Key X bits This is the see key fo the RNG. DRAM (plaintext) Diffie Hellman pivate exponent Diffie Hellman Shae Secet DH bits DH bits/2048- bits The pivate exponent use in Diffie-Hellman (DH) exchange. Zeoize afte DH shae secet has been geneate. Shae secet geneate by the Diffie-Hellman Key exchange Skeyi Keye SHA bits Value eive fom the shae secet ithin IKE exchange. Zeoize hen IKE session is teminate. skeyi_ Keye SHA bits The IKE key eivation key fo non ISAKMP secuity associations. IKE session encypt key IKE session authentication key Tiple-DES/AES 168- bits/256- bits The IKE session encypt key. DRAM (plaintext) DRAM (plaintext) DRAM (plaintext) DRAM (plaintext) DRAM (plaintext) SHA-1 HMAC 160-bits The IKE session authentication key. DRAM (plaintext) ISAKMP peshae Secet At least eight chaacte s IKE RSA Authentication pivate Key RSA bits The key use to geneate IKE skeyi uing peshae-key authentication. no cypto isakmp key comman zeoizes it. This key can have to foms base on hethe the key is elate to the hostname o the IP aess. RSA pivate key fo IKE authentication. Geneate o entee like any RSA key, set as IKE RSA Authentication Key ith the cypto keying o ca tust- NVRAM (plaintext o encypte) NVRAM (plaintext) Automatically evey 400 bytes, o tun off the oute. Tun off the oute Automatically afte shae secet geneate. Automatically afte session is teminate Automatically afte IKE session teminate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. # no cypto isakmp key # cypto key zeoize sa" 12

13 IPSec encyption key IPSec authentication key GDOI Key encyption Key (KEK) GDOI Taffic Encyption Key (TEK) GDOI TEK Integity key TLS Seve RSA pivate key TLS pe-maste secet SSL Taffic Keys Configuation encyption key SSH RSA pivate key SSH session key Use passo Enable passo Tiple-DES/AES 168- bits/256- bits point comman. The IPSec encyption key. Zeoize hen IPSec session is teminate. SHA-1 HMAC 160-bits The IPSec authentication key. The zeoization is the same as above. AES (128, 192 an 256 bits) 168- bits/256- bits Tiple-DES/AES 168- bits/256- bits This key is ceate using the GROUPKEY- PULL egistation potocol ith GDOI. It is use potect GDOI ekeying ata. This key is ceate using the GROUPKEY- PULL egistation potocol an upate using the GROUPKEY-PUSH egistation potocol ith GDOI. It is use to encypt ata taffic beteen Get VPN pees HMAC SHA bits This key is ceate using the GROUPKEY- PULL egistation potocol an upate using the GROUPKEY-PUSH egistation potocol ith GDOI. It is use to ensue ata taffic integity beteen Get VPN pees. RSA 1024/153 6/2048 Ientity cetificates fo moule itself an also use in TLS negotiations. This CSP is use fo both SSL VPN an SIP Gateay Signaling Ove TLS Tanspot. Shae Secet 384-bits Shae secet ceate using asymmetic cyptogaphy fom hich ne HTTPS session keys can be ceate. This CSP is use fo both SSL VPN an SIP Gateay Signaling Ove TLS Tanspot. Tiple-DES/AES HMAC SHA-1 keys 160- bits/168- bits/256- bits Geneate using the TLS potocol (X9.31RNG + HMAC-SHA1 + eithe Diffie- Hellman o RSA). This CSP is use fo both SSL VPN an SIP Gateay Signaling Ove TLS Tanspot. AES 256-bits The key use to encypt values of the configuation file. This key is zeoize hen the no key config-key is issue. Note that this comman oes not ecypt the configuation file, so zeoize ith cae. DH 168- bits/256- bits Tiple-DES/AES HMAC SHA-1 keys Shae Secet Shae Secet 160- bits/168- bits/256- bits At least eight chaacte s At least eight Shae secet geneate by the Diffie- Hellman Key exchange This is the SSH session key. It is zeoize hen the SSH session is teminate. The passo of the Use ole. This passo is zeoize by oveiting it ith a ne passo. The plaintext passo of the CO ole. This passo is zeoize by oveiting it ith a DRAM (plaintext) DRAM (plaintext) DRAM (plaintext) DRAM (plaintext) DRAM (plaintext) NVRAM (plaintext o encypte) DRAM (plaintext) DRAM (plaintext) NVRAM (plaintext o encypte) DRAM (plaintext) DRAM (plaintext) NVRAM (plaintext o encypte) NVRAM (plaintext o Automatically hen IPSec session teminate. Automatically hen IPSec session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. # no key configkey Automatically afte session is teminate Automatically hen SSH session teminate Oveite ith ne passo Oveite ith ne passo 13

14 chaacte s ne passo. encypte) Enable secet Shae Secet At least eight chaacte s The ciphetext passo of the CO ole. Hoeve, the algoithm use to encypt this passo is not FIPS appove. Theefoe, this passo is consiee plaintext fo FIPS puposes. This passo is zeoize by oveiting it ith a ne passo. NVRAM (plaintext o encypte) Oveite ith ne passo RADIUS secet Shae Secet At least eight chaacte s The RADIUS shae secet. This shae secet is zeoize by executing the no aius-seve key comman. NVRAM (plaintext o encypte), DRAM (plaintext) # no aius-seve key TACACS+ secet Shae Secet At least eight chaacte s The TACACS+ shae secet. This shae secet is zeoize by executing the no tacacs-seve key comman. NVRAM (plaintext o encypte), DRAM (plaintext) # no tacacs-seve key Table 9: CSP Table The sevices accessing the CSPs, the type of access an hich ole accesses the CSPs ae liste belo. Role/Sevice Use Role Status Function Netok Function Teminal Function Diectoy Sevices Pefom Selftests VPN Function CO Role Configue the moule Define Rules CSP RNG See RNG See Key Diffie Hellman pivate exponent Diffie Hellman Shae Secet Skeyi skeyi_ IKE session encypt key IKE session authentication key ISAKMP peshae IKE RSA Authentication pivate Key IPSec encyption key IPSec authentication key GDOI Key encyption Key (KEK) GDOI Taffic Encyption Key (TEK) GDOI TEK Integity Key Configuation encyption key TLS Seve RSA Pivate Key TLS pe-maste Secet SSL Taffic Key SSH RSA Pivate Key SSH session key Use passo Enable passo Enable secet RADIUS secet TACACS+ secet 14

15 15 an Filtes Status Functions Manage the moule Set Encyption/ Bypass Pefom Selftests = ea = ite = elete Table 10: Role CSP Access

16 Cyptogaphic Algoithms Appove Cyptogaphic Algoithms The Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) suppot many iffeent cyptogaphic algoithms. Hoeve, only FIPS appove algoithms may be use hile in the FIPS moe of opeation. The folloing table ientifies the appove algoithms inclue in the Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) fo use in the FIPS moe of opeation. Algoithm IOS Cet. # OCTEON Plus CN5200 Seies Die Acceleato Cet. # AES #1527 #1115 SHS (SHA-1, SHA256 an SHA 512) #1359 #1038 HMAC SHA-1 #891 #627 RNG (ANSI X9.31) #823 N/A Tiple-DES #1010 #812 RSA #743 N/A Table 11: FIPS-Appove Algoithms fo use in FIPS Moe Non-Appove Algoithms The Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) cyptogaphic moule implements the folloing non- Appove algoithms: MD5 DES, HMAC-MD5 RC4 The moules suppot the folloing key establishment schemes: Diffie-Hellman (key establishment methoology povies beteen 80 an 112 bits of encyption stength) RSA key tanspot (key establishment methoology povies beteen 80 an 112 bits of encyption stength) Intenet Key Exchange Key Establishment (IKEv1/IKEv2) Goup Domain of Intepetation (GDOI) 16

17 Self-Tests The moules inclue an aay of self-tests that ae un uing statup an peioically uing opeations to pevent any secue ata fom being elease an to insue all components ae functioning coectly. The moules implement the folloing poe-on self-tests: IOS Knon Anse Tests: AES KAT, SHS KAT, HMAC KAT, Tiple-DES KAT, RNG KAT, RSA KAT OCTEON Plus CN5200 Seies Die Acceleato Knon Anse Tests: AES KAT, HMAC KAT, Tiple-DES KAT Fimae Integity Test (32-bit CRC) The moules pefom all poe-on self-tests automatically at boot. All poe-on selftests must be passe befoe any opeato can pefom cyptogaphic sevices. The poeon self-tests ae pefome afte the cyptogaphic systems ae initialize but pio any othe opeations; this pevents the moule fom passing any ata uing a poe-on selftest failue. In aition, the moules also povie the folloing conitional self-tests: CRNG test fo the FIPS-appove RNG CRNG tests fo the non-appove RNG RSA PWCT Bypass Test 17

18 Physical Secuity This moule is a multi-chip stanalone cyptogaphic moule. The FIPS level 2 physical secuity equiements fo the moules ae met by the use of opacity shiels coveing the font panels of moules to povie the equie opacity an tampe evient seals to povie the equie tampe evience. The tampe evient labels an opacity shiels shall be installe fo the moule to opeate in a FIPS Appove moe of opeation. The folloing sections illustate the physical secuity povie by the moule. Moule Opacity an Tampe Evience All Citical Secuity Paametes ae stoe an potecte ithin each moule's tampe evient enclosue. The Cypto Office is esponsible fo popely placing all tampe evient labels. The secuity labels ecommene fo FIPS compliance ae povie in the FIPS Kit (Pat Numbe CISCO-FIPS-KIT=), Revision -B0. The FIPS kit inclues 15 of the seals, as ell as a ocument etailing the numbe of seals equie pe platfom an placement infomation. Please be aae that the exta tampe evient labels/seals shall be secuely stoe by the Cypto Office. These secuity labels ae vey fagile an cannot be emove ithout clea signs of amage to the labels. The outes also equie that a special opacity shiel be installe ove the sie ai vents in oe to opeate in FIPS-appove moe. The shiel eceases the suface aea of the vent holes, eucing visibility ithin the cyptogaphic bounay to FIPS-appove specifications. These ae obtaine by oeing the appopiate FIPS shiel, as follos: Cisco 1905 ISR: FIPS-SHIELD-1900= Cisco 1921 ISR: FIPS-SHIELD-1900= Cisco 1941 ISR: FIPS-SHIELD-1900= Cisco 2921 ISR: FIPS-SHIELD-2921= Cisco 2911 ISR: FIPS-SHIELD-2911= Cisco 2901 ISR: FIPS-SHIELD-2901= Once the moule has been configue to meet oveall FIPS Level 2 equiements, the moule cannot be accesse ithout signs of tampeing. The Cypto Office shoul inspect the tampe evient labels peioically to veify they ae intact an the seial numbes on the applie tampe evient labels match the ecos in the secuity log. The Tampe evient labels shall be applie as shon in the pictues belo, fo the moule to opeate in FIPS moe. Moule Cisco 1905 ISR 10 Cisco 1921 ISR 10 Numbe of Tampe Seals 18

19 Cisco 1941 ISR 13 Cisco 2901 ISR 13 Cisco 2911 ISR 23 (to FIPS Kits (CISCO-FIPS-KIT=) equie) Cisco 2921 ISR 31 (thee FIPS Kits (CISCO-FIPS-KIT=) equie) Install the opacity plates an apply seialize tampe-evience labels as specifie in the pictues belo: Figue 1: Cisco 1905 ISR Font Figue 2: Cisco 1905 ISR Back 19

20 Figue 3: Cisco 1905 ISR Top Figue 4: Cisco 1905 ISR Bottom 20

21 Figue 5: Cisco 1905 ISR Right Sie Figue 6: Cisco 1905 ISR Left Sie Figue 7: Cisco 1921 ISR Font 21

22 Figue 8: Cisco 1921 ISR Back Figue 9: Cisco 1921 ISR Top 22

23 Figue 10: Cisco 1921 ISR Bottom Figue 11: Cisco 1921 ISR Right Sie 23

24 Figue 12: Cisco 1921 ISR Left Sie Figue 13: Cisco 1941 ISR Font 24

25 Figue 14: Cisco 1941 ISR Back Figue 15: Cisco 1941 ISR Top 25

26 Figue 16: Cisco 1941 ISR Bottom Figue 17: Cisco 1941 ISR Right Sie 26

27 Figue 18: Cisco 1941 ISR Left Sie Figue 19: Cisco 2901 ISR Font 27

28 Figue 20: Cisco 2901 ISR Back Figue 21: Cisco 2901 ISR Top 28

29 Figue 22: Cisco 2901 ISR Bottom Figue 23: Cisco 2901 ISR Right Sie 29

30 Figue 24: Cisco 2901 ISR Left Sie Figue 25: Cisco 2911 ISR Font Figue 26: Cisco 2911 ISR Back 30

31 Figue 27: Cisco 2911 ISR Top Figue 28: Cisco 2911 ISR Bottom 31

32 Figue 29: Cisco 2911 ISR Right Sie Figue 30: Cisco 2911 ISR Left Sie 32

33 Figue 31: Cisco 2921 ISR Font Figue 32: Cisco 2921 ISR Back Figue 33: Cisco 2921 ISR Top 33

34 Figue 34: Cisco 2921 ISR Bottom Figue 35: Cisco 2921 ISR Right Sie 34

35 Figue 36: Cisco 2921 ISR Left Sie 35

36 Secue Opeation The Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) meet all the oveall Level 2 equiements fo FIPS Follo the setting instuctions povie belo to place the moule in FIPSappove moe. Opeating this oute ithout maintaining the folloing settings ill emove the moule fom the FIPS appove moe of opeation. Initial Setup 1. The Cypto Office must install the FIPS opacity shiels as escibe in this ocument. 2. The Cypto Office must apply tampe evience labels as escibe in this ocument. 3. The Cypto Office must isable IOS Passo Recovey by executing the folloing commans: configue teminal no sevice passo-ecovey en sho vesion NOTE: Once Passo Recovey is isable, aministative access to the moule ithout the passo ill not be possible. System Initialization an Configuation 1. The value of the boot fiel must be 0x0102. This setting isables beak fom the console to the ROM monito an automatically boots. Fom the configue teminal comman line, the Cypto Office entes the folloing syntax: config-egiste 0x The Cypto Office must ceate the enable passo fo the Cypto Office ole. Poceually, the passo must be at least 8 chaactes, incluing at least one lette an at least one numbe, an is entee hen the Cypto Office fist engages the enable comman. The Cypto Office entes the folloing syntax at the # pompt: enable secet [PASSWORD] 3. The Cypto Office must alays assign passos (of at least 8 chaactes, incluing at least one lette an at least one numbe) to uses. Ientification an authentication on the console/auxiliay pot is equie 36

37 fo Uses. Fom the configue teminal comman line, the Cypto Office entes the folloing syntax: line con 0 passo [PASSWORD] login local 4. The Cypto Office may configue the moule to use RADIUS o TACACS+ fo authentication. Configuing the moule to use RADIUS o TACACS+ fo authentication is optional. If the moule is configue to use RADIUS o TACACS+, the Cypto-Office must efine RADIUS o TACACS+ shae secet keys that ae at least 8 chaactes long, incluing at least one lette an at least one numbe. 5. Fimae upate is not alloe in FIPS moe. IPSec Requiements an Cyptogaphic Algoithms 1. The only types of IPSec key management that ae alloe in FIPS moe is Intenet Key Exchange (IKE) an Goup Domain of Intepetation (GDOI). 2. Although the IOS implementation of IKE allos a numbe of algoithms, only the folloing algoithms ae alloe in a FIPS configuation: ah-sha-hmac esp-sha-hmac esp-3es esp-aes esp-aes-192 esp-aes The folloing algoithms shall not be use: MD-5 fo signing MD-5 HMAC DES Potocols 1. SNMP v3 ove a secue IPSec tunnel may be employe fo authenticate, secue SNMP gets an sets. Since SNMP v2c uses community stings fo authentication, only gets ae alloe une SNMP v2c. 37

38 Remote Access 1. SSH access to the moule is alloe in FIPS appove moe of opeation, using SSH v2 an a FIPS appove algoithm. 2. Telnet access to the moule is only alloe via a secue IPSec tunnel beteen the emote system an the moule. The Cypto office must configue the moule so that any emote connections via telnet ae secue though IPSec, using FIPS-appove algoithms. Note that all uses must still authenticate afte emote access is gante. 3. HTTPS/TLS management is not alloe in FIPS moe Wieless Sevices 1. Wieless communication ith the moule is alloe not in FIPS appove moe of opeation. 2. Be efault, the aio intefaces fo the moule ae isable. These intefaces shoul not be enable. Cisco Unifie Boe Element (CUBE) TLS Configuation 1. When configuing CUBE TLS connections, the folloing configuation comman option must be execute to limit the TLS session options to FIPS-appove algoithms. cypto signaling [stict-ciphe] 38

39 Relate Documentation This ocument eals only ith opeations an capabilities of the secuity appliances in the technical tems of a FIPS cyptogaphic evice secuity policy. Moe infomation is available on the secuity appliances fom the souces liste in this section an fom the folloing souce: The NIST Cyptogaphic Moule Valiation Pogam ebsite ( contains contact infomation fo anses to technical o sales-elate questions fo the secuity appliances. Obtaining Documentation Cisco ocumentation an aitional liteatue ae available on Cisco.com. Cisco also povies seveal ays to obtain technical assistance an othe technical esouces. These sections explain ho to obtain technical infomation fom Cisco Systems. Cisco.com You can access the most cuent Cisco ocumentation at this URL: You can access the Cisco ebsite at this URL: You can access intenational Cisco ebsites at this URL: Pouct Documentation DVD Cisco ocumentation an aitional liteatue ae available in the Pouct Documentation DVD package, hich may have shippe ith you pouct. The Pouct Documentation DVD is upate egulaly an may be moe cuent than pinte ocumentation. The Pouct Documentation DVD is a compehensive libay of technical pouct ocumentation on potable meia. The DVD enables you to access multiple vesions of haae an softae installation, configuation, an comman guies fo Cisco poucts an to vie technical ocumentation in HTML. With the DVD, you have access to the same ocumentation that is foun on the Cisco ebsite ithout being connecte to the Intenet. Cetain poucts also have.pf vesions of the ocumentation available. The Pouct Documentation DVD is available as a single unit o as a subsciption. Registee Cisco.com uses (Cisco iect customes) can oe a Pouct Documentation DVD (pouct numbe DOC-DOCDVD=) fom Cisco Maketplace at this URL: 39

40 Oeing Documentation Beginning June 30, 2005, egistee Cisco.com uses may oe Cisco ocumentation at the Pouct Documentation Stoe in the Cisco Maketplace at this URL: Nonegistee Cisco.com uses can oe technical ocumentation fom 8:00 a.m. to 5:00 p.m. (0800 to 1700) PDT by calling in the Unite States an Canaa, o elsehee by calling You can also oe ocumentation by at tech-oc-stoe-mkpl@extenal.cisco.com o by fax at in the Unite States an Canaa, o elsehee at Documentation Feeback You can ate an povie feeback about Cisco technical ocuments by completing the online feeback fom that appeas ith the technical ocuments on Cisco.com. You can sen comments about Cisco ocumentation to bug-oc@cisco.com. You can submit comments by using the esponse ca (if pesent) behin the font cove of you ocument o by iting to the folloing aess: Cisco Systems Attn: Custome Document Oeing 170 West Tasman Dive San Jose, CA We appeciate you comments. Cisco Pouct Secuity Ovevie Cisco povies a fee online Secuity Vulneability Policy potal at this URL: Fom this site, you can pefom these tasks: Repot secuity vulneabilities in Cisco poucts. Obtain assistance ith secuity incients that involve Cisco poucts. Registe to eceive secuity infomation fom Cisco. A cuent list of secuity avisoies an notices fo Cisco poucts is available at this URL: If you pefe to see avisoies an notices as they ae upate in eal time, you can access a Pouct Secuity Incient Response Team Really Simple Synication (PSIRT RSS) fee fom this URL: 40

41 Repoting Secuity Poblems in Cisco Poucts Cisco is committe to eliveing secue poucts. We test ou poucts intenally befoe e elease them, an e stive to coect all vulneabilities quickly. If you think that you might have ientifie a vulneability in a Cisco pouct, contact PSIRT: Emegencies secuity-alet@cisco.com An emegency is eithe a conition in hich a system is une active attack o a conition fo hich a sevee an ugent secuity vulneability shoul be epote. All othe conitions ae consiee nonemegencies. Nonemegencies psit@cisco.com In an emegency, you can also each PSIRT by telephone: Tip We encouage you to use Petty Goo Pivacy (PGP) o a compatible pouct to encypt any sensitive infomation that you sen to Cisco. PSIRT can ok fom encypte infomation that is compatible ith PGP vesions 2.x though 8.x. Neve use a evoke o an expie encyption key. The coect public key to use in you coesponence ith PSIRT is the one linke in the Contact Summay section of the Secuity Vulneability Policy page at this URL: The link on this page has the cuent PGP key ID in use. Obtaining Technical Assistance Cisco Technical Suppot povies 24-hou-a-ay aa-inning technical assistance. The Cisco Technical Suppot & Documentation ebsite on Cisco.com featues extensive online suppot esouces. In aition, if you have a vali Cisco sevice contact, Cisco Technical Assistance Cente (TAC) enginees povie telephone suppot. If you o not have a vali Cisco sevice contact, contact you eselle. Cisco Technical Suppot & Documentation Website The Cisco Technical Suppot & Documentation ebsite povies online ocuments an tools fo toubleshooting an esolving technical issues ith Cisco poucts an technologies. The ebsite is available 24 hous a ay, at this URL: Access to all tools on the Cisco Technical Suppot & Documentation ebsite equies a Cisco.com use ID an passo. If you have a vali sevice contact but o not have a use ID o passo, you can egiste at this URL: Note 41

42 Use the Cisco Pouct Ientification (CPI) tool to locate you pouct seial numbe befoe submitting a eb o phone equest fo sevice. You can access the CPI tool fom the Cisco Technical Suppot & Documentation ebsite by clicking the Tools & Resouces link une Documentation & Tools. Choose Cisco Pouct Ientification Tool fom the Alphabetical Inex op-on list, o click the Cisco Pouct Ientification Tool link une Alets & RMAs. The CPI tool offes thee seach options: by pouct ID o moel name; by tee vie; o fo cetain poucts, by copying an pasting sho comman output. Seach esults sho an illustation of you pouct ith the seial numbe label location highlighte. Locate the seial numbe label on you pouct an eco the infomation befoe placing a sevice call. Submitting a Sevice Request Using the online TAC Sevice Request Tool is the fastest ay to open S3 an S4 sevice equests. (S3 an S4 sevice equests ae those in hich you netok is minimally impaie o fo hich you equie pouct infomation.) Afte you escibe you situation, the TAC Sevice Request Tool povies ecommene solutions. If you issue is not esolve using the ecommene esouces, you sevice equest is assigne to a Cisco enginee. The TAC Sevice Request Tool is locate at this URL: Fo S1 o S2 sevice equests o if you o not have Intenet access, contact the Cisco TAC by telephone. (S1 o S2 sevice equests ae those in hich you pouction netok is on o seveely egae.) Cisco enginees ae assigne immeiately to S1 an S2 sevice equests to help keep you business opeations unning smoothly. To open a sevice equest by telephone, use one of the folloing numbes: Asia-Pacific: (Austalia: )EMEA: USA: Fo a complete list of Cisco TAC contacts, go to this URL: Definitions of Sevice Request Seveity To ensue that all sevice equests ae epote in a stana fomat, Cisco has establishe seveity efinitions. Seveity 1 (S1) You netok is on, o thee is a citical impact to you business opeations. You an Cisco ill commit all necessay esouces aoun the clock to esolve the situation. Seveity 2 (S2) Opeation of an existing netok is seveely egae, o significant aspects of you business opeation ae negatively affecte by inaequate pefomance of Cisco poucts. You an Cisco ill commit full-time esouces uing nomal business hous to esolve the situation. Seveity 3 (S3) Opeational pefomance of you netok is impaie, but most business opeations emain functional. You an Cisco ill commit esouces uing nomal business hous to estoe sevice to satisfactoy levels. 42

43 Seveity 4 (S4) You equie infomation o assistance ith Cisco pouct capabilities, installation, o configuation. Thee is little o no effect on you business opeations. Obtaining Aitional Publications an Infomation Infomation about Cisco poucts, technologies, an netok solutions is available fom vaious online an pinte souces. Cisco Maketplace povies a vaiety of Cisco books, efeence guies, ocumentation, an logo mechanise. Visit Cisco Maketplace, the company stoe, at this URL: Cisco Pess publishes a ie ange of geneal netoking, taining an cetification titles. Both ne an expeience uses ill benefit fom these publications. Fo cuent Cisco Pess titles an othe infomation, go to Cisco Pess at this URL: Packet magazine is the Cisco Systems technical use magazine fo maximizing Intenet an netoking investments. Each quate, Packet elives coveage of the latest inusty tens, technology beakthoughs, an Cisco poucts an solutions, as ell as netok eployment an toubleshooting tips, configuation examples, custome case stuies, cetification an taining infomation, an links to scoes of in-epth online esouces. You can access Packet magazine at this URL: iq Magazine is the quately publication fom Cisco Systems esigne to help going companies lean ho they can use technology to incease evenue, steamline thei business, an expan sevices. The publication ientifies the challenges facing these companies an the technologies to help solve them, using eal-ol case stuies an business stategies to help eaes make soun technology investment ecisions. You can access iq Magazine at this URL: o vie the igital eition at this URL: Intenet Potocol Jounal is a quately jounal publishe by Cisco Systems fo engineeing pofessionals involve in esigning, eveloping, an opeating public an pivate intenets an intanets. You can access the Intenet Potocol Jounal at this URL: Netoking poucts offee by Cisco Systems, as ell as custome suppot sevices, can be obtaine at this URL: 43

44 Netoking Pofessionals Connection is an inteactive ebsite fo netoking pofessionals to shae questions, suggestions, an infomation about netoking poucts an technologies ith Cisco expets an othe netoking pofessionals. Join a iscussion at this URL: Wol-class netoking taining is available fom Cisco. You can vie cuent offeings at this URL: Definition List AES Avance Encyption Stana CMVP Cyptogaphic Moule Valiation Pogam CSEC Communications Secuity Establishment Canaa CSP Citical Secuity Paamete FIPS Feeal Infomation Pocessing Stana HMAC Hash Message Authentication Coe HTTP Hype Text Tansfe Potocol KAT Knon Anse Test LED Light Emitting Dioe MAC Message Authentication Coe NIST National Institute of Stanas an Technology NVRAM Non-Volatile Ranom Access Memoy RAM Ranom Access Memoy RNG Ranom Numbe Geneato RSA Rivest Shami an Aleman metho fo asymmetic encyption SHA Secue Hash Algoithm TDES Tiple Data Encyption Stana 44

Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs)

Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs) Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) Haae vesions: 2951[1][2], 3925[1][3], 3945[1][3], FIPS Kit (CISCO-FIPS-KIT=), Revision -B0[1], ISR: FIPS- SHIELD-2951=[2] an FIPS-SHIELD-3900=[3]

More information

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2 Cisco 1841 Integate Sevices Route ith AIM-VPN/SSL-1 An Cisco 2801 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.7 Octobe 13, 2009 Copyight 2009

More information

Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2

Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2 Cisco 2811 an 2821 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2005 Cisco Systems, Inc. This ocument may be feely

More information

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3 Cisco 3825 an Cisco 3845 Integate Sevices Routes ith AIM-VPN/SSL-3 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2007 Cisco Systems, Inc. This ocument may

More information

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions

More information

How To Power A Clou Mpa Series Mixer

How To Power A Clou Mpa Series Mixer CLOUD MPA Seies Mixe-Amplifies Clealy bette soun 48.6 mm 19 88 mm 3½ (U) MPA Seies - font panel view (MPA40 illustate) MPA Seies - ea panel view ( illustate) Geneal Desciption The Clou MPA Seies is intene

More information

Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy

Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy Cisco 2811 an Cisco 2821 Integrate Services Router FIPS 140-2 Non Proprietary Security Policy Level 2 Valiation Version 1.3 November 23, 2005 Introuction This ocument is the non-proprietary Cryptographic

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy

Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Overall Level 2 Validation Version 0.54 April 25, 2012 Introduction... 3 References... 3 FIPS 140-2 Submission

More information

PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK

PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK Vaanya Vaanyuwatana Chutikan Anunyavanit Manoat Pinthong Puthapon Jaupash Aussaavut Dumongsii Siinhon Intenational Institute

More information

CLOSE RANGE PHOTOGRAMMETRY WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT

CLOSE RANGE PHOTOGRAMMETRY WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT CLOSE RANGE PHOTOGRAMMETR WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT Tim Suthau, John Moé, Albet Wieemann an Jens Fanzen Technical Univesit of Belin, Depatment

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Anti-Lock Braking System Training Program

Anti-Lock Braking System Training Program COVERST.EPS ac T to $2.50 BS A Anti-Lock Baking System Taining Pogam Student Manual TP-9738 Revised 3-99 Module 1 ABS Components and System Opeation Module 2 ABS Diagnosis and Repai Module 3 ATC Opeation,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

DSP monitoring systems

DSP monitoring systems DSP monitoing systems DSP, utocal, GLM an GLM.SE The Genelec DSP louspeake systems utilize DSP to allow fo all stana ES/EU fomats of igital auio. The DSP Seies will accept sampling ates anging fom 32k

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

How To Change V1 Programming

How To Change V1 Programming REPORT # HOW TO REPROGRAM V1 RADAR DETECTORS IF YOU REALLY WANT TO How To ange V1 Pogamming WARNING: Impotant ada alets may be blocked by changes in factoy settings es that ae Essential To Full Potection

More information

ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4

ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 Cisco Integrated Services Router (ISR) 4451 X (with SM ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 128 and PVDM4 256) and Integrated Services Router (ISR) 4431 (with PVDM4 32, PVDM4

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans

More information

Hitachi Virtual Storage Platform

Hitachi Virtual Storage Platform Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any

More information

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

Product reviews by third parties are growing in popularity. This paper examines when and how a manufacturing

Product reviews by third parties are growing in popularity. This paper examines when and how a manufacturing Vol. 24, No. 2, Sping 2005, pp. 218 240 issn 0732-2399 eissn 1526-548X 05 2402 0218 infoms oi 10.1287/mksc.1040.0089 2005 INFORMS Thi-Paty Pouct Review an Fim Maketing Stategy Yubo Chen Elle College of

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes CIS-162 Intoduction to Netok Secuity Comptia Secuity+ Eam Domain 3 Secuity Baselines Secuity Baselines Standad that oganization systems must comply Establish the nom of consistency Detect the anomaly Pefom

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40

ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 Cisco ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Security Appliances FIPS 140-2 Non Proprietary Security

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

X2 Based Local Mobility Management for Networked Femtocells

X2 Based Local Mobility Management for Networked Femtocells 2013 EEE 9th ntenational onfeence on Wieless an Mobile omputing, Netwoking an ommunications (WiMob) X2 Base Local Mobility Management fo Netwoke Femtocells Ahme Salim hekkoui, Abellatif Ezzouhaii, Samuel

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Integrating Net2 with an intruder alarm system

Integrating Net2 with an intruder alarm system Net AN035 Integating Net with an intude alam system Oveview Net can monito whethe the intude alam is set o uet If the alam is set, Net will limit access to valid uses who ae also authoised to uet the alam

More information

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8 1 [Table of contents] Chapte 1: Intoduction... 7 1-1. BELSORP analysis pogam... 7 1-. Requied compute envionment... 8 Chapte : Installation of the analysis pogam... 9-1. Installation of the WIBU-KEY pogam...

More information

DOCTORAL DEGREE PROGRAM

DOCTORAL DEGREE PROGRAM DOCTORAL DEGREE PROGRAM Application Fo Admission National Mose Cente fo Adult Leaning Cental Illinois: Benedictine Univesity at Spingfield 1500 Noth 5th Steet, Spingfield, IL 62702 Phone: (217) 718-5002

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS Highe Education Cente fo Alcohol and Othe Dug Abuse and Violence Pevention Education Development Cente, Inc. 55 Chapel Steet Newton, MA 02458-1060 COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS

More information

MAGNT Research Report (ISSN. 1444-8939) Vol.3 (2). PP: 267-278

MAGNT Research Report (ISSN. 1444-8939) Vol.3 (2). PP: 267-278 Analysis of Relationship between Knowlege Management an Paticipatoy Management base on the Moeating Role of Oganizational Cultue in Bank Melli of Razavi Khoasan Povince Ggolafshani 1. S. M. Ghayou 2 1,2

More information

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards BIOS Ameican Megatends Inc (AMI) v02.61 BIOS setup guide and manual fo AM2/AM2+/AM3 motheboads The BIOS setup, also called CMOS setup, is a cucial pat of the pope setting up of a PC the BIOS (Basic Input

More information

How to create a default user profile in Windows 7

How to create a default user profile in Windows 7 AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use

More information

Smarter Transportation: The power of Big Data and Analytics

Smarter Transportation: The power of Big Data and Analytics Smate Tanspotation: The powe of Big Data and Analytics Eic-Mak Huitema, Global Smate Tanspotation Leade IBM 1 Intelligent Tanspot Systems (ITS) fo the futue 2 BECAUSE WE WANT IT FOR THE FUTURE. How? The

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Determine implementation strategy, including a communications plan with trading partners and business associates (1 month)

Determine implementation strategy, including a communications plan with trading partners and business associates (1 month) Official CMS Industy Resouces fo the Tansition www.cms.gov/icd10 Payes Compliance Timeline The following is a timeline of essential activities needed to successfully tansition to Vesion 5010 and. While

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Welcome to the Cloud Stream. Sponsored by:

Welcome to the Cloud Stream. Sponsored by: Welcome to the Cloud Steam Sponsoed by: Entepise Cloud (HEC) Hanessing the Powe of eal- Time Business with the Simplicity of the Cloud Ben Lingwood Diecto HEC GtM Entepise Cloud - Oveview Announced May

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

DOCTORATE DEGREE PROGRAMS

DOCTORATE DEGREE PROGRAMS DOCTORATE DEGREE PROGRAMS Application Fo Admission 2015-2016 5700 College Road, Lisle, Illinois 60532 Enollment Cente Phone: (630) 829-6300 Outside Illinois: (888) 829-6363 FAX: (630) 829-6301 Email: admissions@ben.edu

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

P/ACE MDQ Basic Training Workbook

P/ACE MDQ Basic Training Workbook P/ACE MDQ Basic Taining Wokbook 32 Kaat 8.0 A33116AB Novembe 2009 Beckman Coulte, Inc. 250 S. Kaeme Blvd., Bea, CA 92821 Copyight 2009 Beckman Coulte, Inc. Copyight, Licenses and Tademaks Copyight Beckman

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION Application Fom SECTION 1 COMPANY DETAILS New Company Yes No Company Name Tading As Pevious Company Name Email Addess Contact Numbe Tel Cell Fax Registeed Numbe Natue of Business Yea of Incopoation Yea

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

Engineered Systems. Configuration Guide. October, 1998 TD9007 rev. 2.0

Engineered Systems. Configuration Guide. October, 1998 TD9007 rev. 2.0 Engineeed Systems Configuation Guide Octobe, 1998 TD9007 ev. 2.0 2 ENGINEERED SYSTES CONFIGURATION GUIDE A division of Nothen Computes, Inc. Contents Po-Watch NT Single-Use System... 3 Po-Watch NT ulti-use

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

cover comparison TUH it s my health fund! Your Queensland health fund Effective 2 April 2014

cover comparison TUH it s my health fund! Your Queensland health fund Effective 2 April 2014 Effective 2 Apil 2014 You Queensland health fund cove compaison TUH it s my health fund! PLEASE CAREFULLY READ AND RETAIN THIS BROCHURE. PLEASE READ IN CONJUNCTION WITH THE Fine Points BROCHURE. waiting

More information

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.

More information

Significant value in diagnostic information

Significant value in diagnostic information U.S. Centalized Oveview Tom Adkins Vice Pesident Sales and Maketing Centalized, USA 1 Centalized Significant value in diagnostic infomation Diagnostic analysis of blood and othe body fluids pefomed in

More information

California s Duals Demonstration: A Transparent. Process. Margaret Tatar Chief, Medi-Cal Managed Care Division. CA Coo 8/21/12

California s Duals Demonstration: A Transparent. Process. Margaret Tatar Chief, Medi-Cal Managed Care Division. CA Coo 8/21/12 Califonia s Duals Demonstation: A Tanspaent and Inclusive Stakeholde Pocess Magaet Tata Chief, Medi-Cal Managed Cae Division Depatment of Health Cae Sevices 1 Stakeholde Engagement 1. 2. Inclusive Building

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Ashfield Girls High School. Critical Incident Policy

Ashfield Girls High School. Critical Incident Policy Ashfield Gils High School A Specialist School fo ICT Citical Incident Policy Citical Incident Policy 2 Citical Incident Policy A Specialist School fo ICT Ashfield Gils High School CRITICAL INCIDENT POLICY

More information

[TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)]

[TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)] [TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)] GOVERNMENT OF INDIA MINISTRY OF FINANCE (DEPARTMENT OF REVENUE) Notification No. 32/2016 - Customs (N. T.)

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

Research Article A Reputation-Based Identity Management Model for Cloud Computing

Research Article A Reputation-Based Identity Management Model for Cloud Computing Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Automated Hydraulic Drilling Rigs. HHSeries

Automated Hydraulic Drilling Rigs. HHSeries Automated Hydaulic Dilling Rigs HHSeies The Shape of Things to Come CUSTOMSOLUTIONS HH600 Rig The HH Hydaulic Hoist Seies Eveything about the HH Seies is designed fo speed, safety and efficiency. You can

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1

Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1 Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN Collies Intenational Office Leasing Guide P. 1 THE OFFICE LEASING GUIDE This step-by-step guide has been assembled to eflect Collies Intenational

More information

7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE,

7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, FIPS 140-2 Non-Proprietary Security Policy for the Cisco Unified IP Phone 7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, and 7975G Introduction This is a non-proprietary

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

AFFILIATE MEMBERSHIP APPLICATION

AFFILIATE MEMBERSHIP APPLICATION Califonia Constuction Tucking Association AFFILIATE MEMBERSHIP APPLICATION Reach and Netwok with the Lagest Concentation of Constuction Tucking Fims in the U.S. Affiliate Dues - $500 Annual CCTA 334 N.

More information

KNIGHTS OF COLUMBUS LEADERSHIP RESOURCES. Practical Information for Grand Knights, District Deputies and Financial Secretaries

KNIGHTS OF COLUMBUS LEADERSHIP RESOURCES. Practical Information for Grand Knights, District Deputies and Financial Secretaries KNIGHTS OF COLUMBUS LEADERSHIP RESOURCES Pactical Infomation fo Gand Knights, Distict Deputies and Financial Secetaies Thank you fo taking on the esponsibility of being a leade in the Knights of Columbus.

More information

FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module

FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact

More information

Armored Car Insurance Application

Armored Car Insurance Application Amoed Ca Insuance Application Applicant Details: Fist named insued: _ Please attach list of any additional insueds to be included fo coveage. Addess: City/State/Zip: Effective date: Expiation date: Additional

More information

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].

More information

Ou Appoach and Types of attack

Ou Appoach and Types of attack BlueBoX: A Policy diven, Host Based Intusion Detection system Suesh N. Chai Pau Chen Cheng IBM Thomas J. Watson Reseach Cente Yoktown Heights, NY 10598, U.S.A. schai,pau @watson.ibm.com Abstact In this

More information

Instructions. Application. FORTIFIed with. www.gkhair.com info@gkhair.com PH: +1.305.390.0044 +1 888.JUVEXIN (888.588.

Instructions. Application. FORTIFIed with. www.gkhair.com info@gkhair.com PH: +1.305.390.0044 +1 888.JUVEXIN (888.588. FORTIFIed with Juvexin Application Instuctions www.gkhai.com info@gkhai.com PH: +1.5.390.0044 +1 888.JUVEXIN (888.588.3946) POWERED BY: GKhai, Global Keatin, Hai Taming System, Juvexin, and ph+ ae tademaks

More information

!( r) =!( r)e i(m" + kz)!!!!. (30.1)

!( r) =!( r)e i(m + kz)!!!!. (30.1) 3 EXAMPLES OF THE APPLICATION OF THE ENERGY PRINCIPLE TO CYLINDRICAL EQUILIBRIA We now use the Enegy Pinciple to analyze the stability popeties of the cylinical! -pinch, the Z-pinch, an the Geneal Scew

More information

Application for Admission GENEVA COLLEGE

Application for Admission GENEVA COLLEGE Application fo Admission GENEVA COLLEGE 3 2 0 0 C o l l e g e A v e n u e, B e a v e F a l l s, P A 1 5 0 1 0 Application Instuctions When to apply You may apply fo admission any time afte you junio yea

More information

2006-2008 Energy Efficiency Rebate and Incentive Programs for Business.

2006-2008 Energy Efficiency Rebate and Incentive Programs for Business. The Company } A ~ Sempa Enegy utilit/ 2006-2008 Enegy Efficiency Rebate and Incentive Pogams fo Business. Lean how you business may qualify fo up to $525,000* pe yea in ebates and incentives unde the Expess

More information