Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2

Size: px
Start display at page:

Download "Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2"

Transcription

1 Cisco 2811 an 2821 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2005 Cisco Systems, Inc. This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

2 Table of Contents 1 INTRODUCTION PURPOSE REFERENCES TERMINOLOGY DOCUMENT ORGANIZATION CISCO 2811 AND 2821 ROUTERS THE 2811 CRYPTOGRAPHIC MODULE PHYSICAL CHARACTERISTICS THE CISCO 2821 CRYPTOGRAPHIC MODULE PHYSICAL CHARACTERISTICS ROLES AND SERVICES Use Sevices Cypto ice Sevices Unauthenticate Sevices Stength of Authentication PHYSICAL SECURITY CRYPTOGRAPHIC KEY MANAGEMENT SELF-TESTS Self-tests pefome by the IOS image Self-tests pefome by NetGX Chip Self-tests pefome by AIM SECURE OPERATION OF THE CISCO 2811 OR 2821 ROUTER INITIAL SETUP SYSTEM INITIALIZATION AND CONFIGURATION IPSEC REQUIREMENTS AND CRYPTOGRAPHIC ALGORITHMS SSLV3.1/TLS REQUIREMENTS AND CRYPTOGRAPHIC ALGORITHMS PROTOCOLS REMOTE ACCESS Copyight 2007 Cisco Systems, Inc. Page 2 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

3 1 Intouction 1.1 Pupose This ocument is the non-popietay Cyptogaphic Moule Secuity Policy fo the Cisco 2811 an 2821 Integate Sevices Routes ith AIM-VPN/SSL-2 Routes (Route Haae Vesion: 2811 an 2821; Route Fimae Vesion: IOS 12.4 (15) T3; AIM-VPN/SSL-2 Haae Vesion 1.0, Boa Revision 01). This secuity policy escibes ho the Cisco 2811 an 2821 Integate Sevices meet the secuity equiements of FIPS 140-2, an ho to opeate the oute enable in a secue FIPS moe. This policy as pepae as pat of the Level 2 FIPS valiation of the Cisco 2811 o 2821 Integate Sevices oute. FIPS (Feeal Infomation Pocessing Stanas Publication Secuity Requiements fo Cyptogaphic Moules) etails the U.S. Govenment equiements fo cyptogaphic moules. Moe infomation about the FIPS stana an valiation pogam is available on the NIST ebsite at Refeences This ocument eals only ith opeations an capabilities of the 2811 an 2821 outes ith AIM moules in the technical tems of a FIPS cyptogaphic moule secuity policy. Moe infomation is available on the outes fom the folloing souces: The Cisco Systems ebsite contains infomation on the full line of Cisco Systems outes. Please efe to the folloing ebsite: Fo anses to technical o sales elate questions please efe to the contacts liste on the Cisco Systems ebsite at.cisco.com. The NIST Valiate Moules ebsite ( contains contact infomation fo anses to technical o sales-elate questions fo the moule. 1.3 Teminology In this ocument, the Cisco 2811 o 2821 outes ae efee to as the oute, the moule, o the system. 1.4 Document Oganization The Secuity Policy ocument is pat of the FIPS Submission Package. In aition to this ocument, the Submission Package contains: Veno Evience ocument Finite State Machine Othe suppoting ocumentation as aitional efeences Copyight 2007 Cisco Systems, Inc. Page 3 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

4 This ocument povies an ovevie of the outes an explains thei secue configuation an opeation. This intouction section is folloe by Section 2, hich etails the geneal featues an functionality of the oute. Section 3 specifically aesses the equie configuation fo the FIPS-moe of opeation. With the exception of this Non-Popietay Secuity Policy, the FIPS Valiation Submission Documentation is Cisco-popietay an is eleasable only une appopiate nonisclosue ageements. Fo access to these ocuments, please contact Cisco Systems. Copyight 2007 Cisco Systems, Inc. Page 4 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

5 2 Cisco 2811 an 2821 Routes Banch office netoking equiements ae amatically evolving, iven by eb an e- commece applications to enhance pouctivity an meging the voice an ata infastuctue to euce costs. The Cisco 2811 an 2821 outes povie a scalable, secue, manageable emote access seve that meets FIPS Level 2 equiements. This section escibes the geneal featues an functionality povie by the outes. The folloing subsections escibe the physical chaacteistics of the outes. 2.1 The 2811 Cyptogaphic Moule Physical Chaacteistics Figue 1 The 2811 oute case The 2811 Route is a multiple-chip stanalone cyptogaphic moule. The oute has a pocessing spee of 350MHz. Depening on configuation, installe AIM-VPN/SSL-2 moule, o the intenal NetGX chip o the IOS softae is use fo cyptogaphic opeations. The cyptogaphic bounay of the moule is the evice s case. All of the functionality iscusse in this ocument is povie by components ithin this cyptogaphic bounay. The inteface fo the oute is locate on the font an ea panels as shon in Figue 2 an Figue 3, espectively. Figue 2 Font Panel Physical Intefaces Copyight 2007 Cisco Systems, Inc. Page 5 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

6 Figue 3 Rea Panel Physical Intefaces The Cisco 2811 oute featues a console pot, an auxiliay pot, to Univesal Seial Bus (USB) pots, fou high-spee WAN inteface ca (HWIC) slots, to10/100 Gigabit Ethenet RJ45 pots, an Enhance Netok Moule (ENM) slot, an a Compact Flash (CF) ive. The Cisco 2811 oute suppots one single-ith netok moule, fou single-ith o to ouble-ith HWICs, to slots fo AIM-VPN/SSL-2 cas 1, to intenal packet voice ata moules (PVDMs), to fast Ethenet connections, an 16 pots of IP phone poe output. Figue 2 shos the font panel an Figue 3 shos the ea panel. The font panel contains 4 LEDs that output status ata about the system poe, auxiliay poe, system activity, an compact flash busy status. The back panel consists of 12 LEDs: to Ethenet activity LEDs, to uplex LEDs, to spee LEDs, to link LEDs, to PVDM LEDs, an to AIM LEDs. The font panel contains the folloing: (1) Poe inlet (2) Poe sitch (3) Optional RPS input (4) Console an auxiliay pots (5) USB pots (6) CF ive (7) LEDs escibe in table 1. The back panel contains the folloing: (1) Goun connecto (2) an (3) Ethenet pots an LEDs (4)-(7) HWIC slots (8) ENM slot. The folloing tables povie moe etaile infomation conveye by the LEDs on the font an ea panel of the oute: Name State Desciption System Poe Blinking Geen Soli Geen Soli Oange Poe off ROMMON moe Opeating nomally System Eo Detecte 1 The secuity policy coves the configuation in hich one AIM ca is use. Copyight 2007 Cisco Systems, Inc. Page 6 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

7 Auxiliay Poe Activity Compact Flash Soli Geen Soli Oange Blinking Geen Soli Geen Soli Geen -48V PS an RPS not pesent -48V PS o RPS pesent an functional -48V PS o RPS pesent an failue etecte No inteupts o packet tansfe occuing System is sevicing inteupts System is actively tansfeing packets No ongoing accesses, eject pemitte Device is busy, o not eject Table 1 Cisco 2811 Font Panel Inicatos Name State Desciption PVDM1 Soli Geen Soli Oange PVDM0 AIM1 AIM0 Soli Geen Soli Oange Soli Geen Soli Oange Soli Geen Soli Oange PVDM1 not installe PVDM1 installe an initialize PVDM1 installe an initialize eo PVDM0 not installe PVDM0 installe an initialize PVDM0 installe an initialize eo AIM1 not installe AIM1 installe an initialize AIM1 installe an initialize eo AIM0 not installe AIM0 installe an initialize AIM0 installe an initialize eo Table 2 Cisco 2811 Rea Panel Inicatos The folloing table escibes the meaning of Ethenet LEDs on the ea panel: Name State Desciption Activity Not eceiving packets Soli/Blinking Geen Receiving packets Duplex Soli Geen Half-Duplex Full-Duplex Spee One Blink Geen To Blink Geen 10 Mbps 100 Mbps Link Soli Geen No link establishe Ethenet link is establishe Table 3 Cisco 2811 Ethenet Inicatos The physical intefaces ae sepaate into the logical intefaces fom FIPS as escibe in the folloing table: Route Physical Inteface 10/100 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slot USB Pots FIPS Logical Inteface Data Input Inteface Copyight 2007 Cisco Systems, Inc. Page 7 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

8 Route Physical Inteface 10/100 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slot USB Pots 10/100 Ethenet LAN Pots HWIC Pots Poe Sitch Console Pot Auxiliay Pot ENM Slot 10/100 Ethenet LAN Pot LEDs AIM LEDs PVDM LEDs Poe LED Activity LEDs Auxiliay LED Compact Flash LED Console Pot Auxiliay Pot USB Pots Main Poe Plug Reunant Poe Supply Plug FIPS Logical Inteface Data Output Inteface Contol Input Inteface Status Output Inteface Poe Inteface Table 4 Cisco 2811 FIPS Logical Intefaces The CF ca that stoe the IOS image is consiee an intenal memoy moule, because the IOS image stoe in the ca may not be moifie o upgae. The ca itself must neve be emove fom the ive. Tampe evient seal ill be place ove the ca in the ive. 2.2 The Cisco 2821 Cyptogaphic Moule Physical Chaacteistics Figue 4 The 2821 oute case The Cisco 2821 oute a multiple-chip stanalone cyptogaphic moule. The oute has a pocessing spee of 350MHz. Depening on configuation, eithe installe AIM-VPN/SSL-2 ca o the intenal NetGX chip o the IOS softae is use fo cyptogaphic opeations. Copyight 2007 Cisco Systems, Inc. Page 8 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

9 The cyptogaphic bounay of the moule is the evice s case. All of the functionality iscusse in this ocument is povie by components ithin this cyptogaphic bounay. The intefaces fo the oute ae locate on the font an ea panels as shon in Figue 5 an Figue 6, espectively. Figue 5 Cisco 2821 Font Panel Physical Intefaces Figue 6 Cisco 2821 Rea Panel Physical Intefaces The Cisco 2821 oute featues a console pot, an auxiliay pot, to Univesal Seial Bus (USB) pots, fou high-spee WAN inteface ca (HWIC) slots, to10/100 Gigabit Ethenet RJ45 pots, a Enhance Netok Moule (ENM) slot, a Voice Netok Moule (VeNoM) slot, an a Compact Flash (CF) ive. The Cisco 2821 oute suppots one single-ith netok moule, fou single-ith o to ouble-ith HWICs, has to slots fo AIM-VPN/BPII-Plus cas 2, thee intenal packet voice ata moules (PVDMs), to fast Ethenet connections, an 16 pots of IP phone poe output. Figue 5 shos the font panel an Figue 6 shos the ea panel. The font panel contains 4 LEDs that output status ata about the system poe, auxiliay poe, system activity, an compact flash busy status. The back panel consists of 13 LEDs: to Ethenet activity LEDs, to uplex LEDs, to spee LEDs, to link LEDs, thee PVDM LEDs, an to AIM LEDs. The font panel contains the folloing: (1) Poe inlet (2) Poe sitch (3) Console an auxiliay pots 2 The secuity policy coves the configuation in hich one AIM ca is use. Copyight 2007 Cisco Systems, Inc. Page 9 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

10 (4) USB pots (5) CF ive (6) LEDs escibe in table 1. (7) Optional RPS input The back panel contains the folloing: (1) GE 0 pot (2) GE 1 pot (3) HWIC 0 slot (4) HWIC 1 slot (5) HWIC 2 slot (6) HWIC 3 slot (7) VeNoM slot (8) ENM slot (9) Goun connecto The folloing tables povie moe etaile infomation conveye by the LEDs on the font an ea panel of the oute: Name State Desciption System Poe Blinking Geen Soli Geen Soli Oange Poe off ROMMON moe Opeating nomally System Eo Detecte Auxiliay Poe Activity Compact Flash Soli Geen Soli Oange Blinking Geen Soli Geen Soli Geen -48V PS an RPS not pesent -48V PS o RPS pesent an functional -48V PS o RPS pesent an failue etecte No inteupts o packet tansfe occuing System is sevicing inteupts System is actively tansfeing packets No ongoing accesses, eject pemitte Device is busy, o not eject Table 5 Cisco 2821 Font Panel Inicatos Name State Desciption PVDM2 Soli Geen Soli Oange PVDM1 PVDM0 AIM1 AIM0 Soli Geen Soli Oange Soli Geen Soli Oange Soli Geen Soli Oange Soli Geen PVDM2 not installe PVDM2 installe an initialize PVDM2 installe an initialize eo PVDM1 not installe PVDM1 installe an initialize PVDM1 installe an initialize eo PVDM0 not installe PVDM0 installe an initialize PVDM0 installe an initialize eo AIM1 not installe AIM1 installe an initialize AIM1 installe an initialize eo AIM0 not installe AIM0 installe an initialize Copyight 2007 Cisco Systems, Inc. Page 10 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

11 Soli Oange AIM0 installe an initialize eo Table 6 Cisco 2821 Rea Panel Inicatos The folloing table escibes the meaning of Ethenet LEDs on the font panel: Name State Desciption Activity Not eceiving packets Soli/Blinking Geen Receiving packets Duplex Soli Geen Half-Duplex Full-Duplex Spee One Blink Geen To Blink Geen 10 Mbps 100 Mbps Link Soli Geen No link establishe Ethenet link is establishe Table 7 Cisco 2821 Ethenet Inicatos The physical intefaces ae sepaate into the logical intefaces fom FIPS as escibe in the folloing table: Route Physical Inteface 10/100 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slot VeNoM Slot USB Pots 10/100 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slot VeNoM Slot USB Pots 10/100 Ethenet LAN Pots HWIC Pots Poe Sitch Console Pot Auxiliay Pot ENM Slot 10/100 Ethenet LAN Pot LEDs AIM LEDs PVDM LEDs Poe LED Activity LEDs Auxiliay LED Compact Flash LED Console Pot Auxiliay Pot USB Pots FIPS Logical Inteface Data Input Inteface Data Output Inteface Contol Input Inteface Status Output Inteface Copyight 2007 Cisco Systems, Inc. Page 11 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

12 Route Physical Inteface Main Poe Plug Reunant Poe Supply Plug FIPS Logical Inteface Poe Inteface Table 8 Cisco 2821 FIPS Logical Intefaces The CF ca that stoe the IOS image is consiee an intenal memoy moule. The eason is the IOS image stoe in the ca cannot be moifie o upgae. The ca itself must neve be emove fom the ive. Tampe evient seal ill be place ove the ca in the ive. 2.3 Roles an Sevices Authentication in Cisco 2811 an Cisco 2821 is ole-base. Thee ae to main oles in the oute that opeatos can assume: the Cypto ice ole an the Use ole. The aministato of the oute assumes the Cypto ice ole in oe to configue an maintain the oute using Cypto ice sevices, hile the Uses execise only the basic Use sevices. The moule suppots RADIUS an TACACS+ fo authentication. A complete esciption of all the management an configuation capabilities of the oute can be foun in the Pefoming Basic System Management manual an in the online help fo the oute Use Sevices Uses ente the system by accessing the console pot ith a teminal pogam o IPSec potecte telnet o SSH session to a LAN pot. The IOS pompts the Use fo usename an passo. If the passo is coect, the Use is alloe enty to the IOS executive pogam. The sevices available to the Use ole consist of the folloing: Status Functions Vie state of intefaces an potocols, vesion of IOS cuently unning. Netok Functions Teminal Functions Diectoy Sevices SSL-TLS/VPN EASY VPN Connect to othe netok evices though outgoing telnet, PPP, etc. an initiate iagnostic netok sevices (i.e., ping, mtace). Ajust the teminal session (e.g., lock the teminal, ajust flo contol). Display iectoy of files kept in flash memoy. Negotiation an encypte ata tanspot via SSL/TLS. Negotiation an encypte ata tanspot via EASY VPN Cypto ice Sevices Duing initial configuation of the oute, the Cypto ice passo (the enable passo) is efine. A Cypto ice can assign pemission to access the Cypto ice ole to aitional accounts, theeby ceating aitional Cypto ices. The Cypto ice ole is esponsible fo the configuation an maintenance of the oute. The Cypto ice sevices consist of the folloing: Configue the oute Define netok intefaces an settings, ceate comman aliases, set Copyight 2007 Cisco Systems, Inc. Page 12 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

13 the potocols the oute ill suppot, enable intefaces an netok sevices, set system ate an time, an loa authentication infomation. Define Rules an Filtes Ceate packet Filtes that ae applie to Use ata steams on each inteface. Each Filte consists of a set of Rules, hich efine a set of packets to pemit o eny base on chaacteistics such as potocol ID, aesses, pots, TCP connection establishment, o packet iection. Vie Status Functions Vie the oute configuation, outing tables, active sessions, use gets to vie SNMP MIB statistics, health, tempeatue, memoy status, voltage, packet statistics, evie accounting logs, an vie physical inteface status. Manage the oute Log off uses, shuton o eloa the oute, ease the flash memoy, manually back up oute configuations, vie complete configuations, manage use ights, an estoe oute configuations. Set Encyption/Bypass Set up the configuation tables fo IP tunneling. Set peshae keys an algoithms to be use fo each IP ange o allo plaintext packets to be set fom specifie IP aess. Bypass Moe The outes implement an altenating bypass capability, in hich some connections may be cyptogaphically authenticate an encypte hile othes may not. To inepenent intenal actions ae equie in oe to tansition into each bypass state: Fist, the bypass state must be configue by the Cypto ice using match aess <ACL-name>" sub-comman une cypto map hich efines hat taffic is encypte. Secon, the moule must eceive a packet that is estine fo an IP that is not configue to eceive encypte ata. The configuation table uses an eo etection coe to etect integity failues, an if an integity eo is etecte, the moule ill ente an eo state in hich no packets ae oute. Theefoe, a single eo in the configuation table cannot cause plaintext to be tansmitte to an IP aess fo hich it shoul be encypte Unauthenticate Sevices The sevices available to unauthenticate uses ae: Vieing the status output fom the moule s LEDs Poeing the moule on an off using the poe sitch Sening packets in bypass Stength of Authentication The secuity policy stipulates that all use passos must be 8 alphanumeic chaactes, so the passo space is 2.8 tillion possible passos. The possibility of anomly guessing a Copyight 2007 Cisco Systems, Inc. Page 13 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

14 passo is thus fa less than one in one million. To excee a one in 100,000 pobability of a successful anom passo guess in one minute, an attacke oul have to be capable of 28 million passo attempts pe minute, hich fa excees the opeational capabilities of the moule to suppot. When using RSA base authentication, RSA key pai has moulus size of 1024 bit to 2048 bit, thus poviing beteen 80 bits an 112 bits of stength. Assuming the lo en of that ange, an attacke oul have a 1 in 280 chance of anomly obtaining the key, hich is much stonge than the one in a million chance equie by FIPS To excee a one in 100,000 pobability of a successful anom key guess in one minute, an attacke oul have to be capable of appoximately 1.8x1021 attempts pe minute, hich fa excees the opeational capabilities of the moules to suppot. When using peshae key base authentication, the secuity policy stipulates that all peshae keys must be 8 alphanumeic chaactes, so the key space is 2.8 tillion possible combinations. The possibility of anomly guessing this is thus fa less than one in one million. To excee a one in 100,000 pobability of a successful anom guess in one minute, an attacke oul have to be capable of 28 million attempts pe minute, hich fa excees the opeational capabilities of the moule to suppot. 2.4 Physical Secuity The oute is entiely encase by a metal, opaque case. The ea of the unit contains HWIC/WIC/VIC connectos, LAN connectos, a CF ive, poe connecto, console connecto, auxiliay connecto, USB pot, an fast Ethenet connectos. The font of the unit contains the system status an activity LEDs. The top, sie, an font potion of the chassis can be emove to allo access to the motheboa, memoy, AIM slot, an expansion slots. The Cisco 2811 an 2821 outes equie that a special opacity shiel be installe ove the sie ai vents in oe to opeate in FIPS-appove moe. The shiel eceases the suface aea of the vent holes, eucing visibility ithin the cyptogaphic bounay to FIPS-appove specifications. Install the opacity plates as specifie in the pictues belo: Copyight 2007 Cisco Systems, Inc. Page 14 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

15 Figue Opacity Shiels Figue opacity shiel placement Once the oute has been configue in to meet FIPS Level 2 equiements, the oute cannot be accesse ithout signs of tampeing. To seal the system, apply seialize tampeevience labels as follos: Fo Cisco 2811: Copyight 2007 Cisco Systems, Inc. Page 15 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

16 1. Clean the cove of any gease, it, o oil befoe applying the tampe evience labels. Alcohol-base cleaning pas ae ecommene fo this pupose. The tempeatue of the oute shoul be above 10 C. 2. The tampe evience label shoul be place so that one half of the label coves the font panel an the othe half coves the enclosue. 3. The tampe evience label shoul be place ove the CF ca in the slot so that any attempt to emove the ca ill sho sign of tampeing. 4. The tampe evience label shoul be place so that the one half of the label coves the enclosue an the othe half coves the pot aapte slot. 5. The tampe evience label shoul be place so that the one half of the label coves the enclosue an the othe half coves the ea panel. 6. Place tampe evient labels on the opacity shiel as shon in Figue The labels completely cue ithin five minutes. Figues 9, 10 an 11 sho the aitional tampe evience label placements fo the Figue Tampe Evient Label Placement (Back Vie) Figue Tampe Evient Label Placement (Font Vie) Copyight 2007 Cisco Systems, Inc. Page 16 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

17 Figue Tampe Evient Label Placement on the Opacity Shiel Fo Cisco 2821: 1. Clean the cove of any gease, it, o oil befoe applying the tampe evience labels. Alcohol-base cleaning pas ae ecommene fo this pupose. The tempeatue of the oute shoul be above 10 C. 2. The tampe evience label shoul be place so that one half of the label coves the font panel an the othe half coves the enclosue. 3. The tampe evience label shoul be place ove the CF ca in the slot so that any attempt to emove the ca ill sho sign of tampeing. 4. The tampe evience label shoul be place so that the one half of the label coves the enclosue an the othe half coves the pot aapte slot. 5. The tampe evience label shoul be place so that the one half of the label coves the enclosue an the othe half coves the ea panel. 6. Place tampe evient labels on the opacity shiel as shon in Figue The labels completely cue ithin five minutes. Figues 12, 13 an 14 sho the aitional tampe evience label placements fo the Copyight 2007 Cisco Systems, Inc. Page 17 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

18 Figue 12 Cisco 2821 Tampe Evient Label Placement (Back Vie) Figue 13 Cisco 2821 Tampe Evient Label Placement (Font Vie) Figue 14 Cisco 2821 Tampe Evient Label Placement on the Opacity Shiel Copyight 2007 Cisco Systems, Inc. Page 18 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

19 The tampe evience seals ae pouce fom a special thin gauge vinyl ith self-ahesive backing. Any attempt to open the oute ill amage the tampe evience seals o the mateial of the moule cove. Since the tampe evience seals have non-epeate seial numbes, they can be inspecte fo amage an compae against the applie seial numbes to veify that the moule has not been tampee. Tampe evience seals can also be inspecte fo signs of tampeing, hich inclue the folloing: cule cones, bubbling, cinkling, ips, teas, an slices. The o OPEN may appea if the label as peele back. 2.5 Cyptogaphic Key Management The oute secuely aministes both cyptogaphic keys an othe citical secuity paametes such as passos. The tampe evience seals povie physical potection fo all keys. All keys ae also potecte by the passo-potection on the Cypto ice ole login, an can be zeoize by the Cypto ice. All zeoization consists of oveiting the memoy that stoe the key. Keys ae exchange an entee electonically o via Intenet Key Exchange (IKE) o SSL hanshake potocols. The outes suppot the folloing FIPS-2 appove algoithm implementations: Algoithm Algoithm Cetificate Numbe Softae (IOS) Implementations AES 795 Tiple-DES 683 SHA-1, SHA-256, SHA HMAC-SHA X9.31 PRNG 456 RSA 379 Onboa NetGX Implementations AES 265 Tiple-DES 347 SHA HMAC-SHA-1 77 AIM Moule Implementations AES 173 Tiple-DES 275 SHA HMAC-SHA-1 39 X9.31 PRNG 83 RSA 382 The oute is in the appove moe of opeation only hen FIPS appove algoithms ae use (except DH an RSA key apping hich ae alloe fo use in FIPS appove moe fo key establishment). The folloing ae not FIPS appove algoithms: RC4, MD5, HMAC- MD5, RSA key apping an DH. DH an RSA key apping ae alloe fo use in key establishment. Copyight 2007 Cisco Systems, Inc. Page 19 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

20 Note: The moule suppots DH key sizes of 1024 an 1536 bits an RSA key sizes of 1024, 1536 an 2048 bits. Theefoe, the Diffie Hellmann Key ageement, key establishment methoology povies beteen 80-bits an 96-bits of encyption stength pe NIST RSA Key apping, key establishment methoology povies beteen 80-bits an 112-bits of encyption stength pe NIST The moule contains a HiFn 7855 cyptogaphic acceleato chip, integate in the AIM ca. Unless the AIM ca is isable by the Cypto ice ith the no cypto engine aim comman, the HiFn 7855 povies AES (128-bit, 192-bit, an 256-bit), an Tiple-DES (168-bit) encyption/ecyption; MD5 an SHA-1 hashing; an haae suppot fo DH, X9.31 RNG, RSA encyption, an RSA signatue/veification. The moule suppots thee types of key management schemes: 1. Pe-shae key exchange via electonic key enty. Tiple-DES/AES key an HMAC- SHA-1 key ae exchange an entee electonically. 2. Intenet Key Exchange metho ith suppot fo pe-shae keys exchange an entee electonically. The pe-shae keys ae use ith Diffie-Hellman key ageement technique to eive Tiple-DES o AES keys. The pe-shae key is also use to eive HMAC-SHA-1 key. 3. RSA igital signatues base authentication is use fo IKE, ith Diffie-Hellman Key ageement technique to eive AES o Tiple-DES keys. 4. RSA encypte nonces base authentication is use fo IKE, ith Diffie-Hellman Key ageement technique to eive AES o Tiple-DES keys. 5. RSA key tanspot is use to eive the Tiple-DES o AES keys uing SSLv3.1/TLS hanshake. The moule suppots commecially available Diffie-Hellman an RSA key tanspot fo key establishment. All pe-shae keys ae associate ith the CO ole that ceate the keys, an the CO ole is potecte by a passo. Theefoe, the CO passo is associate ith all the pe-shae keys. The Cypto ice nees to be authenticate to stoe keys. All Diffie-Hellman (DH) keys agee upon fo iniviual tunnels ae iectly associate ith that specific tunnel only via the IKE potocol. RSA Public keys ae entee into the moules using igital cetificates hich contain elevant ata such as the name of the public key's one, hich associates the key ith the coect entity. All othe keys ae associate ith the use/ole that entee them. Key Zeoization: Each key can be zeoize by sening the no comman pio to the key function commans. This ill zeoize each key fom the, the unning configuation. Clea Cypto IPSec SA ill zeoize the Tiple-DES/AES session key (hich is eive using the Diffie-Hellman key ageement technique) fom the. This session key is only Copyight 2007 Cisco Systems, Inc. Page 20 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

21 available in the ; theefoe this comman ill completely zeoize this key. The folloing comman ill zeoize the pe-shae keys fom the : no set session-key inboun ah spi hex-key-ata no set session-key outboun ah spi hex-key-ata no set session-key inboun esp spi ciphe hex-key-ata [authenticato hex-key-ata] no set session-key outboun esp spi ciphe hex-key-ata [authenticato hex-key-ata] no cypto isakmp key The unning configuation must be copie to the stat-up configuation in NVRAM in oe to completely zeoize the keys. The RSA keys ae zeoize by issuing the CLI comman cypto key zeoize sa". All SSL/TLS session keys ae zeoize automatically at the en of the SSL/TLS session. The moule suppots the folloing keys an citical secuity paametes (CSPs). Key/CSP Algoithm Desciption Stoage Zeoization Metho Name Location PRNG See X9.31 This is the see fo X9.31 PRNG. This CSP is stoe in an upate peioically afte the Automatically evey 400 bytes, o tun off the oute. geneation of 400 bytes afte this it is eseee ith oute-eive entopy; hence, it is zeoize peioically. Also, the opeato can tun off the oute to zeoize this CSP. PRNG See Key X9.31 This is the sse key fo X9.31 PRNG. Tun off the oute. Diffie Hellman pivate exponent Diffie Hellman public key DH DH The pivate exponent use in Diffie-Hellman (DH) exchange as pat of IKE. Zeoize afte DH shae secet has been geneate. The public key use in Diffie- Hellman (DH) exchange as pat of IKE. Zeoize afte the DH shae secet has been geneate. skeyi Keye SHA-1 Value eive fom the shae secet ithin IKE exchange. Zeoize hen IKE session is teminate. skeyi_ Keye SHA-1 The IKE key eivation key fo non ISAKMP secuity associations. skeyi_a HMAC-SHA-1 The ISAKMP secuity association authentication key. Automatically afte shae secet geneate. Automatically afte shae secet geneate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. Copyight 2007 Cisco Systems, Inc. Page 21 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

22 skeyi_e TRIPLE- DES/AES The ISAKMP secuity association encyption key. Automatically afte IKE session teminate. IKE session encypt key TRIPLE- DES/AES The IKE session encypt key. Automatically afte IKE session teminate. IKE session authentication key ISAKMP peshae HMAC-SHA-1 Shae secet The IKE session authentication key. The key use to geneate IKE skeyi uing peshae-key authentication. no cypto isakmp key comman zeoizes it. This key can have to foms base on hethe the key is elate to the hostname o the IP aess. IKE hash key HMAC-SHA-1 This key geneates the IKE shae secet keys. This key is zeoize afte geneating those keys. IKE RSA Authentication pivate Key IKE RSA Authentication Public Key IKE RSA Encypte Nonce Pivate Key IKE RSA Encypte Nonce Public Key IPSec encyption key IPSec authentication key Configuation encyption key Route authentication key 1 RSA RSA RSA RSA DES/TRIPLE- DES/AES HMAC-SHA-1 AES Shae secet RSA pivate key fo IKE authentication. Geneate o entee like any RSA key, set as IKE RSA Authentication Key ith the cypto keying o ca tustpoint comman. RSA public key fo IKE authentication. Geneate o entee like any RSA key, set as IKE RSA Authentication Key ith the cypto keying o ca tustpoint comman. RSA pivate key fo IKE encypte nonces. Geneate like any RSA, ith the usage-keys paamete inclue. RSA public key fo IKE encypte nonces. Geneate like any RSA, ith the usage-keys paamete inclue. The IPSec encyption key. Zeoize hen IPSec session is teminate. The IPSec authentication key. The zeoization is the same as above. The key use to encypt values of the configuation file. This key is zeoize hen the no key configkey is issue. Note that this comman oes not ecypt the configuation file, so zeoize ith cae. This key is use by the oute to authenticate itself to the pee. The oute itself gets the passo (that NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM Automatically afte IKE session teminate. # no cypto isakmp key Automatically afte geneating IKE shae secet keys. # cypto key zeoize sa" # cypto key zeoize sa" # cypto key zeoize sa" # cypto key zeoize sa" # Clea Cypto IPSec SA # Clea Cypto IPSec SA # no key config-key Automatically upon completion of authentication attempt. Copyight 2007 Cisco Systems, Inc. Page 22 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

23 PPP authentication key Route authentication key 2 SSH session key RFC 1334 Shae Secet Vaious symmetic is use as this key) fom the AAA seve an sens it onto the pee. The passo etieve fom the AAA seve is zeoize upon completion of the authentication attempt. The authentication key use in PPP. This key is in the an not zeoize at untime. One can tun off the oute to zeoize this key because it is stoe in. This key is use by the oute to authenticate itself to the pee. The key is ientical to Route authentication key 1 except that it is etieve fom the local atabase (on the oute itself). Issuing the no usename passo zeoizes the passo (that is use as this key) fom the local atabase. This is the SSH session key. It is zeoize hen the SSH session is teminate. Use passo Shae Secet The passo of the Use ole. This passo is zeoize by oveiting it ith a ne passo. Enable passo Shae Secet The plaintext passo of the CO ole. This passo is zeoize by oveiting it ith a ne passo. Enable secet Shae Secet The ciphetext passo of the CO ole. Hoeve, the algoithm use to encypt this passo is not FIPS appove. Theefoe, this passo is consiee plaintext fo FIPS puposes. This passo is zeoize by oveiting it ith a ne passo. RADIUS secet secet_1_0_0 TACACS+ secet TLS seve pivate key TLS seve public key Shae Secet Shae Secet RSA RSA The RADIUS shae secet. This shae secet is zeoize by executing the no aius-seve key comman. The fixe key use in Cisco veno ID geneation. This key is embee in the moule binay image an can be elete by easing the Flash. The TACACS+ shae secet. This shae secet is zeoize by executing the no tacacs-seve key comman. 1024/1536/2048 bit RSA pivate key use fo SSLV3.1/TLS. 1024/1536/2048 bit RSA public key use fo SSLV3.1/TLS. NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM Tun off the oute. # no usename passo Automatically hen SSH session teminate Oveite ith ne passo Oveite ith ne passo Oveite ith ne passo # no aius-seve key Delete by easing the Flash. # no tacacs-seve key # cypto key zeoize sa" # cypto key zeoize sa" Copyight 2007 Cisco Systems, Inc. Page 23 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

24 TLS pemaste secet TLS Encyption Key TLS Integity Key Shae Secet AES/TRIPLE- DES HMAC-SHA-1 Shae Secet ceate using asymmetic cyptogaphy fom hich ne TLS session keys can be ceate Key use to encypt TLS session ata HMAC-SHA-1 use fo TLS ata integity potection Automatically hen TLS session is teminate Automatically hen TLS session is teminate Automatically hen TLS session is teminate Table 5 - Cyptogaphic Keys an CSPs SRDI/Role/Sevice Access Policy ( = ea, = ite, = elete) Roles/Sevice Secuity Relevant Data Item PRNG See PRNG See Key Diffie Hellman pivate exponent Diffie Hellman public key skeyi skeyi_ skeyi_a skeyi_e Use Role Status Functions Netok Functions Teminal Functions Diectoy Sevices SSL-TLS/VPN EASY VPN Cypto ice Role Configue the Route Define Rules an Filtes Status Functions Manage the Route Set Encyption/Bypass Change WAN Inteface Cas Copyight 2007 Cisco Systems, Inc. Page 24 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

25 IKE session encypt key IKE session authentication key ISAKMP peshae IKE hash key IKE RSA Authentication pivate Key IKE RSA Authentication Public Key IKE RSA Encypte Nonce Pivate Key IKE RSA Encypte Nonce Public Key IPSec encyption key IPSec authentication key Configuation encyption key Route authentication key 1 PPP authentication key Route authentication key 2 SSH session key Use passo Enable passo Enable secet Copyight 2007 Cisco Systems, Inc. Page 25 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

26 RADIUS secet secet_1_0_0 TACACS+ secet TLS seve pivate key TLS seve public key TLS pe-maste secet TLS Encyption Key TLS Integity Key Table 6 Role an Sevice Access to CSP 2.6 Self-Tests In oe to pevent any secue ata fom being elease, it is impotant to test the cyptogaphic components of a secuity moule to insue all components ae functioning coectly. The oute inclues an aay of self-tests that ae un uing statup an peioically uing opeations. All self-tests ae implemente by the softae. An example of self-tests un at poe-up is a cyptogaphic knon anse test (KAT) on each of the FIPS-appove cyptogaphic algoithms an on the Diffie-Hellman algoithm. Examples of tests un peioically o conitionally inclue: a bypass moe test pefome conitionally pio to executing IPSec, an a continuous anom numbe geneato test. If any of the self-tests fail, the oute tansitions into an eo state. In the eo state, all secue ata tansmission is halte an the oute outputs status infomation inicating the failue. Examples of the eos that cause the system to tansition to an eo state: IOS image integity checksum faile Micopocesso oveheats an buns out Knon anse test faile NVRAM moule malfunction. Tempeatue high aning Copyight 2007 Cisco Systems, Inc. Page 26 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

27 2.6.1 Self-tests pefome by the IOS image IOS Self Tests o POST tests AES Knon Anse Test RSA Signatue Knon Anse Test (both signatue/veification) Softae/fimae test Poe up bypass test RNG Knon Anse Test Diffie Hellman test HMAC-SHA-1 Knon Anse Test SHA-1/256/512 Knon Anse Test Tiple-DES Knon Anse Test o Conitional tests Paiise consistency test fo RSA signatue keys Conitional bypass test Continuous anom numbe geneation test fo appove an nonappove RNGs Self-tests pefome by NetGX Chip o POST tests AES Knon Anse Test Tiple-DES Knon Anse Test SHA-1 Knon Anse Test HMAC-SHA-1 Knon Anse Test Self-tests pefome by AIM AIM Self Tests o POST tests AES Knon Anse Test Tiple-DES Knon Anse Test SHA-1 Knon Anse Test HMAC-SHA-1 Knon Anse Test RNG Knon Anse Test Fimae integity test Diffie Hellman Test RSA signatue gen/ve knon anse test o Conitional Tests Paiise consistency test fo RSA signatue keys Continuous RNG test fo the haae RNG Copyight 2007 Cisco Systems, Inc. Page 27 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

28 3 Secue Opeation of the Cisco 2811 o 2821 oute The Cisco 2811 an 2821 outes meet all the Level 2 equiements fo FIPS Follo the instuctions povie belo to place the moule in its FIPS-appove moe. Opeating this oute ithout maintaining the folloing settings ill emove the moule fom its FIPS appove moe of opeation. 3.1 Initial Setup 1. The Cypto ice must apply tampe evience labels as escibe in Section 2.4 of this ocument. 2. The Cypto ice must isable IOS Passo Recovey by executing the folloing commans: configue teminal no sevice passo-ecovey en sho vesion NOTE: Once Passo Recovey is isable, aministative access to the moule ithout the passo ill not be possible. 3.2 System Initialization an Configuation 1. The Cypto ice must pefom the initial configuation. IOS vesion IOS 12.4 (15) T3, Avance Secuity buil (avsecuity) is the only alloable image; no othe image shoul be loae. 2. The value of the boot fiel must be 0x0102. This setting isables beak fom the console to the ROM monito an automatically boots the IOS image. Fom the configue teminal comman line, the Cypto ice entes the folloing syntax: config-egiste 0x The Cypto ice must ceate the enable passo fo the Cypto ice ole. The passo must be at least 8 chaactes (all igits; all loe an uppe case lettes; an all special chaactes except? ae accepte) an is entee hen the Cypto ice fist engages the enable comman. The Cypto ice entes the folloing syntax at the # pompt: enable secet [PASSWORD] 4. The Cypto ice must alays assign passos (of at least 8 chaactes) to uses. Ientification an authentication on the console pot is equie fo Uses. Fom the configue teminal comman line, the Cypto ice entes the folloing syntax: line con 0 passo [PASSWORD] login local 5. RADIUS an TACACS+ shae secet key sizes must be at least 8 chaactes long. Copyight 2007 Cisco Systems, Inc. Page 28 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

29 3.3 IPSec Requiements an Cyptogaphic Algoithms 1. The only type of key management that is alloe in FIPS moe is Intenet Key Exchange (IKE). 2. Although the IOS an AIM implementation of IKE allos a numbe of algoithms, only the folloing algoithms ae alloe in a FIPS configuation: ah-sha-hmac esp-sha-hmac esp-tiple-des esp-aes 3. The folloing algoithms ae not FIPS appove an shoul not be use uing FIPSappove moe: DES MD-5 fo signing MD-5 HMAC 3.4 SSLv3.1/TLS Requiements an Cyptogaphic Algoithms When negotiating SSLv3.1/TLS ciphe suites, only FIPS appove algoithms must be specifie. All othe vesions of SSL except vesion 3.1 must not be use in FIPS moe of opeation The folloing algoithms ae not FIPS appove an shoul not be use in the FIPSappove moe: MD5 RC4 RC2 DES 3.5 Potocols 1. SNMP v3 ove a secue IPSec tunnel may be employe fo authenticate, secue SNMP gets an sets. Since SNMP v2c uses community stings fo authentication, only gets ae alloe une SNMP v2c. 3.6 Remote Access 1. Telnet access to the moule is only alloe via a secue IPSec tunnel beteen the emote system an the moule. The Cypto office must configue the moule so that any emote connections via telnet ae secue though IPSec, using FIPS-appove algoithms. Note that all uses must still authenticate afte emote access is gante. 2. SSH access to the moule is only alloe if SSH is configue to use a FIPS-appove Copyight 2007 Cisco Systems, Inc. Page 29 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

30 algoithm. The Cypto office must configue the moule so that SSH uses only FIPSappove algoithms. Note that all uses must still authenticate afte emote access is gante. Copyight 2007 Cisco Systems, Inc. Page 30 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

31 CISCO EDITOR S NOTE: You may no inclue all stana Cisco infomation inclue in all ocumentation pouce by Cisco. Be sue that the folloing line is in the legal statements at the en of the ocument: By pinting o making a copy of this ocument, the use agees to use this infomation fo pouct evaluation puposes only. Sale of this infomation in hole o in pat is not authoize by Cisco Systems. Copyight 2007 Cisco Systems, Inc. Page 31 of 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3 Cisco 3825 an Cisco 3845 Integate Sevices Routes ith AIM-VPN/SSL-3 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2007 Cisco Systems, Inc. This ocument may

More information

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2

Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2 Cisco 1841 Integate Sevices Route ith AIM-VPN/SSL-1 An Cisco 2801 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.7 Octobe 13, 2009 Copyight 2009

More information

Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs)

Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs) Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) Haae vesions: 1905[1][2], 1921[1][2], 1941[1][2], 2901[1][3], 2911[1][4], 2921[1][5], FIPS Kit (CISCO-FIPS-

More information

Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs)

Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs) Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) Haae vesions: 2951[1][2], 3925[1][3], 3945[1][3], FIPS Kit (CISCO-FIPS-KIT=), Revision -B0[1], ISR: FIPS- SHIELD-2951=[2] an FIPS-SHIELD-3900=[3]

More information

Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy

Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy Cisco 2811 an Cisco 2821 Integrate Services Router FIPS 140-2 Non Proprietary Security Policy Level 2 Valiation Version 1.3 November 23, 2005 Introuction This ocument is the non-proprietary Cryptographic

More information

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions

More information

How To Power A Clou Mpa Series Mixer

How To Power A Clou Mpa Series Mixer CLOUD MPA Seies Mixe-Amplifies Clealy bette soun 48.6 mm 19 88 mm 3½ (U) MPA Seies - font panel view (MPA40 illustate) MPA Seies - ea panel view ( illustate) Geneal Desciption The Clou MPA Seies is intene

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes

CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes CIS-162 Intoduction to Netok Secuity Comptia Secuity+ Eam Domain 3 Secuity Baselines Secuity Baselines Standad that oganization systems must comply Establish the nom of consistency Detect the anomaly Pefom

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40

ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 Cisco ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Security Appliances FIPS 140-2 Non Proprietary Security

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

Anti-Lock Braking System Training Program

Anti-Lock Braking System Training Program COVERST.EPS ac T to $2.50 BS A Anti-Lock Baking System Taining Pogam Student Manual TP-9738 Revised 3-99 Module 1 ABS Components and System Opeation Module 2 ABS Diagnosis and Repai Module 3 ATC Opeation,

More information

CLOSE RANGE PHOTOGRAMMETRY WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT

CLOSE RANGE PHOTOGRAMMETRY WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT CLOSE RANGE PHOTOGRAMMETR WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT Tim Suthau, John Moé, Albet Wieemann an Jens Fanzen Technical Univesit of Belin, Depatment

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy [email protected] Stefano Paaboschi DIIMM - Univesità

More information

ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4

ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 Cisco Integrated Services Router (ISR) 4451 X (with SM ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 128 and PVDM4 256) and Integrated Services Router (ISR) 4431 (with PVDM4 32, PVDM4

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

How To Change V1 Programming

How To Change V1 Programming REPORT # HOW TO REPROGRAM V1 RADAR DETECTORS IF YOU REALLY WANT TO How To ange V1 Pogamming WARNING: Impotant ada alets may be blocked by changes in factoy settings es that ae Essential To Full Potection

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Hitachi Virtual Storage Platform

Hitachi Virtual Storage Platform Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

DSP monitoring systems

DSP monitoring systems DSP monitoing systems DSP, utocal, GLM an GLM.SE The Genelec DSP louspeake systems utilize DSP to allow fo all stana ES/EU fomats of igital auio. The DSP Seies will accept sampling ates anging fom 32k

More information

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].

More information

P/ACE MDQ Basic Training Workbook

P/ACE MDQ Basic Training Workbook P/ACE MDQ Basic Taining Wokbook 32 Kaat 8.0 A33116AB Novembe 2009 Beckman Coulte, Inc. 250 S. Kaeme Blvd., Bea, CA 92821 Copyight 2009 Beckman Coulte, Inc. Copyight, Licenses and Tademaks Copyight Beckman

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

MAGNT Research Report (ISSN. 1444-8939) Vol.3 (2). PP: 267-278

MAGNT Research Report (ISSN. 1444-8939) Vol.3 (2). PP: 267-278 Analysis of Relationship between Knowlege Management an Paticipatoy Management base on the Moeating Role of Oganizational Cultue in Bank Melli of Razavi Khoasan Povince Ggolafshani 1. S. M. Ghayou 2 1,2

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.

More information

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs

How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION

APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION Application Fom SECTION 1 COMPANY DETAILS New Company Yes No Company Name Tading As Pevious Company Name Email Addess Contact Numbe Tel Cell Fax Registeed Numbe Natue of Business Yea of Incopoation Yea

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards

BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards BIOS Ameican Megatends Inc (AMI) v02.61 BIOS setup guide and manual fo AM2/AM2+/AM3 motheboads The BIOS setup, also called CMOS setup, is a cucial pat of the pope setting up of a PC the BIOS (Basic Input

More information

Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy

Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Overall Level 2 Validation Version 0.54 April 25, 2012 Introduction... 3 References... 3 FIPS 140-2 Submission

More information

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8

Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8 1 [Table of contents] Chapte 1: Intoduction... 7 1-1. BELSORP analysis pogam... 7 1-. Requied compute envionment... 8 Chapte : Installation of the analysis pogam... 9-1. Installation of the WIBU-KEY pogam...

More information

Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X

Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X Data Sheet Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Armored Car Insurance Application

Armored Car Insurance Application Amoed Ca Insuance Application Applicant Details: Fist named insued: _ Please attach list of any additional insueds to be included fo coveage. Addess: City/State/Zip: Effective date: Expiation date: Additional

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak [email protected] Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

College of Engineering Bachelor of Computer Science

College of Engineering Bachelor of Computer Science 2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date

More information

Smarter Transportation: The power of Big Data and Analytics

Smarter Transportation: The power of Big Data and Analytics Smate Tanspotation: The powe of Big Data and Analytics Eic-Mak Huitema, Global Smate Tanspotation Leade IBM 1 Intelligent Tanspot Systems (ITS) fo the futue 2 BECAUSE WE WANT IT FOR THE FUTURE. How? The

More information

FIPS 140-2 SECURITY POLICY FOR

FIPS 140-2 SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes

More information

Integrated Services Router with the "AIM-VPN/SSL" Module

Integrated Services Router with the AIM-VPN/SSL Module Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module (AIM) for

More information

DOCTORATE DEGREE PROGRAMS

DOCTORATE DEGREE PROGRAMS DOCTORATE DEGREE PROGRAMS Application Fo Admission 2015-2016 5700 College Road, Lisle, Illinois 60532 Enollment Cente Phone: (630) 829-6300 Outside Illinois: (888) 829-6363 FAX: (630) 829-6301 Email: [email protected]

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China [email protected] School of Compute Science and Technology, Huazhong Univesity

More information

Integrated Services Router with the "AIM-VPN/SSL" Module

Integrated Services Router with the AIM-VPN/SSL Module Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module (AIM) for

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

FIPS 140-2 SECURITY POLICY

FIPS 140-2 SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 320M and SSG 350M HW P/N SSG-320M and SSG-350M, FW Version ScreenOS 6.2.0 Document # 530-023730-01 Copyright Notice Copyright 2009 Juniper Networks,

More information

[TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)]

[TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)] [TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)] GOVERNMENT OF INDIA MINISTRY OF FINANCE (DEPARTMENT OF REVENUE) Notification No. 32/2016 - Customs (N. T.)

More information

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc. Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration

More information

FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module

FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,

More information

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of

More information

APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

FIPS 140-2 SECURITY POLICY

FIPS 140-2 SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 140 HW P/N SSG-140-SB, SSG-140-SH, FW Version ScreenOS 6.3.0r6 Copyright Notice Copyright 2012 Juniper Networks, Inc. May be reproduced only in its

More information

Cisco VPN Internal Service Module for Cisco ISR G2

Cisco VPN Internal Service Module for Cisco ISR G2 Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

How to create a default user profile in Windows 7

How to create a default user profile in Windows 7 AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Analytical Proof of Newton's Force Laws

Analytical Proof of Newton's Force Laws Analytical Poof of Newton s Foce Laws Page 1 1 Intouction Analytical Poof of Newton's Foce Laws Many stuents intuitively assume that Newton's inetial an gavitational foce laws, F = ma an Mm F = G, ae tue

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information

The BANDIT Products in Virtual Private Networks

The BANDIT Products in Virtual Private Networks encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

McAfee Firewall Enterprise 8.3.1

McAfee Firewall Enterprise 8.3.1 Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

HEWLETT PACKARD TIPPINGPOINT. FIPS 140 2 NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System

HEWLETT PACKARD TIPPINGPOINT. FIPS 140 2 NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System HEWLETT PACKAD TIPPINGPOINT FIPS 140 2 NON POPIETAY SECUITY POLICY HP TippingPoint Security Management System Level 1 Validation Firmware Version: 3.2.0.8312.3 Document Version: 1.03 Page 1 of 31 FIPS

More information

Introduction of Quidway SecPath 1000 Security Gateway

Introduction of Quidway SecPath 1000 Security Gateway Introduction of Quidway SecPath 1000 Security Gateway Quidway SecPath 1000 security gateway is new generation security equipment developed specially for enterprise customer by Huawei-3Com. It can help

More information

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of

More information

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side

More information

AFFILIATE MEMBERSHIP APPLICATION

AFFILIATE MEMBERSHIP APPLICATION Califonia Constuction Tucking Association AFFILIATE MEMBERSHIP APPLICATION Reach and Netwok with the Lagest Concentation of Constuction Tucking Fims in the U.S. Affiliate Dues - $500 Annual CCTA 334 N.

More information

Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1

Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1 Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN Collies Intenational Office Leasing Guide P. 1 THE OFFICE LEASING GUIDE This step-by-step guide has been assembled to eflect Collies Intenational

More information

McAfee Firewall Enterprise 8.2.1

McAfee Firewall Enterprise 8.2.1 Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall

More information

Application for Admission GENEVA COLLEGE

Application for Admission GENEVA COLLEGE Application fo Admission GENEVA COLLEGE 3 2 0 0 C o l l e g e A v e n u e, B e a v e F a l l s, P A 1 5 0 1 0 Application Instuctions When to apply You may apply fo admission any time afte you junio yea

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

1C - FIPS 140-2 Cisco VPN Client Security Policy

1C - FIPS 140-2 Cisco VPN Client Security Policy This document describes the Cisco VPN Client security policy. Introduction This non-proprietary cryptographic module security policy describes how version 3.6.5 of the Cisco software VPN Client meets the

More information

Automated Hydraulic Drilling Rigs. HHSeries

Automated Hydraulic Drilling Rigs. HHSeries Automated Hydaulic Dilling Rigs HHSeies The Shape of Things to Come CUSTOMSOLUTIONS HH600 Rig The HH Hydaulic Hoist Seies Eveything about the HH Seies is designed fo speed, safety and efficiency. You can

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc. Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety

More information

IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49

IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security

More information

SNAPcell Security Policy Document Version 1.7. Snapshield

SNAPcell Security Policy Document Version 1.7. Snapshield SNAPcell Security Policy Document Version 1.7 Snapshield July 12, 2005 Copyright Snapshield 2005. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW...3

More information