Cisco 2811 and Cisco 2821 Integrated Services Router FIPS Non Proprietary Security Policy

Size: px
Start display at page:

Download "Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy"

Transcription

1 Cisco 2811 an Cisco 2821 Integrate Services Router FIPS Non Proprietary Security Policy Level 2 Valiation Version 1.3 November 23, 2005 Introuction This ocument is the non-proprietary Cryptographic Moule Security Policy for the Cisco 2811 an Cisco 2821 Integrate Services Router ithout an AIM car installe. This security policy escribes ho the Cisco 2811 an Cisco 2821 Integrate Services Router (Harare Version: 2811 or 2821; Firmare Version: 12.3(11)T03) meet the security requirements of FIPS 140-2, an ho to operate the router enable in a secure FIPS moe. This policy as prepare aspart of the Level 2 FIPS valiation of the Cisco 2811 or Cisco 2821 Integrate Services Router. FIPS (Feeral Information Processing Stanars Publication Security Requirements for Cryptographic Moules) etails the U.S. Government requirements for cryptographic moules. More information about the FIPS stanar an valiation program is available on the NIST ebsite at This ocument contains the folloing sections: Introuction, page 1 Cisco 2811 an Cisco 2821 Routers, page 2 Secure Operation of the Cisco 2811 or Cisco 2821 router, page 22 Relate Documentation, page 23 Obtaining Documentation, page 24 Documentation Feeback, page 25 Cisco Prouct Security Overvie, page 25 Obtaining Technical Assistance, page 26 Corporate Heaquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA USA 2005 Cisco Systems, Inc. All rights reserve.

2 Cisco 2811 an Cisco 2821 Routers Obtaining Aitional Publications an Information, page 27 References This ocument eals only ith operations an capabilities of the Cisco 2811 an Cisco 2821 routers in the technical terms of a FIPS cryptographic moule security policy. More information is available on the routers from the folloing sources: The Cisco Systems ebsite contains information on the full line of Cisco Systems routers. Please refer to the folloing ebsite: For ansers to technical or sales relate questions please refer to the contacts liste on the Cisco Systems ebsite at.cisco.com. The NIST Valiate Moules ebsite ( contains contact information for ansers to technical or sales-relate questions for the moule. Terminology In this ocument, the Cisco 2811 or Cisco 2821 routers are referre to as the router, the moule, or the system. Document Organization The Security Policy ocument is part of the FIPS Submission Package. In aition to this ocument, the Submission Package contains: Venor Evience ocument Finite State Machine Other supporting ocumentation as aitional references This ocument provies an overvie of the routers an explains their secure configuration an operation. This introuction section is folloe by the Cisco 2811 an Cisco 2821 Routers section on page 2, hich etails the general features an functionality of the router. The Secure Operation of the Cisco 2811 or Cisco 2821 router section on page 22 specifically aresses the require configuration for the FIPS-moe of operation. With the exception of this Non-Proprietary Security Policy, the FIPS Valiation Submission Documentation is Cisco-proprietary an is releasable only uner appropriate non-isclosure agreements. For access to these ocuments, please contact Cisco Systems. Cisco 2811 an Cisco 2821 Routers Branch office netorking requirements are ramatically evolving, riven by eb an e-commerce applications to enhance prouctivity an merging the voice an ata infrastructure to reuce costs. The Cisco 2811 an Cisco 2821 routers provie a scalable, secure, manageable remote access server that meets FIPS Level 2 requirements. This section escribes the general features an functionality provie by the routers. The folloing subsections escribe the physical characteristics of the routers. 2

3 Do Not Remove During Netork Operation OPTIONAL RPS INPUT 12V 11A -48V 4A V~ 4A 50/60 Hz Cisco 2811 an Cisco 2821 Routers The Cisco 2811 Cryptographic Moule Physical Characteristics Figure 1 The Cisco 2811 router case SYS PWR AUX/ SYS PWR ACT CF COMPACT FLASH 1 CONSOLE 0 AUX The Cisco 2811 router is a multiple-chip stanalone cryptographic moule. The router has a processing spee of 350MHz. Depening on configuration, either the internal NetGX chip or the IOS softare is use for cryptographic operations. The cryptographic bounary of the moule is the evice's case. All of the functionality iscusse in this ocument is provie by components ithin this cryptographic bounary. The interface for the router is locate on the rear an front panels as shon in Figure 2 an Figure 3, respectively. Figure 2 Cisco 2811 Front Panel Physical Interfaces CONSOLE OPTIONAL RPS INPUT SYS PWR AUX/ PWR SYS 1 ACT CF V~ 2A COMPACT FLASH AUX 50/60 Hz 0 12V 11A Do Not Remove During Netork Operation Figure 3 Cisco 2811 Rear Panel Physical Interfaces H W I C 3 H W I C 1 H W I C 2 H W I C 0 A F S L A= ACT S= SPEED FE 0/1 A= FDX A= LINK FE 0/0 PVDM1 PVDM0 AIM1 AIM0 A F S L The Cisco 2811 router features a console port, an auxiliary port, to Universal Serial Bus (USB) ports, four high-spee WAN interface car (HWIC) slots, to10/100 Gigabit Ethernet RJ45 ports, an Enhance Netork Moule (ENM) slot, an a Compact Flash (CF) rive. The Cisco 2811 router supports one single-ith netork moule, four single-ith or to ouble-ith HWICs, to internal avance integration moules (AIMs) 1, to internal packet voice ata moules (PVDMs), to fast Ethernet connections, an 16 ports of IP phone poer output. The Figure 2 shos the front panel an Figure 3 3

4 Cisco 2811 an Cisco 2821 Routers shos the rear panel. The front panel contains 4 LEDs that output status ata about the system poer, auxiliary poer, system activity, an compact flash busy status. The back panel consists of 12 LEDs: to Ethernet activity LEDs, to uplex LEDs, to spee LEDs, to link LEDs, to PVDM LEDs, an to AIM LEDs. The front panel contains the folloing: (1) Poer inlet (2) Poer sitch (3) Optional RPS input (4) Console an auxiliary ports (5) USB ports (6) CF rive (7) LEDs escribe in table 1. The back panel contains the folloing: (1) Groun connector (2) an (3) Ethernet ports an LEDs (4)-(7) HWIC slots (8) ENM slot. Table 1 an Table 2 provie more etaile information conveye by the LEDs on the front an rear panel of the router: Table 1 Cisco 2811 Front Panel Inicators Name State Description System Poer Off Blinking Green Soli Green Soli Orange Poer off ROMMON moe Operating normally System Error Detecte Auxiliary Poer Off Soli Green Soli Orange -48V PS an RPS not present -48V PS or RPS present an functional -48V PS or RPS present an failure etecte Activity Off Blinking Green Soli Green No interrupts or packet transfer occurring System is servicing interrupts System is actively transferring packets Compact Flash Off Soli Green No ongoing accesses, eject permitte Device is busy, o not eject 1. Hoever, an AIM moule may not be installe in accorance ith this security policy. There is a separate security policy covering the Cisco 2811 an Cisco 2821 routers ith AIM moule installe. 4

5 Cisco 2811 an Cisco 2821 Routers Table 2 Cisco 2811 Rear Panel Inicators Name State Description PVDM1 Off Soli Green Soli Orange PVDM1 not installe PVDM1 installe an initialize PVDM1 installe an initialize error PVDM0 Off Soli Green Soli Orange PVDM0 not installe PVDM0 installe an initialize PVDM0 installe an initialize error AIM1 Off Soli Green Soli Orange AIM1 not installe AIM1 installe an initialize AIM1 installe an initialize error AIM0 Off Soli Green Soli Orange AIM0 not installe AIM0 installe an initialize AIM0 installe an initialize error Table 3 escribes the meaning of Ethernet LEDs on the rear panel: Table 3 Cisco 2811 Ethernet Inicators Name State Description Activity Off Not receiving packets Duplex Spee Link Soli/Blinking Green Off Soli Green One Blink Green To Blink Green Off Soli Green Receiving packets Half-Duplex Full-Duplex 10 Mbps 100 Mbps No link establishe Ethernet link is establishe The physical interfaces are separate into the logical interfaces from FIPS as escribe in the Table 4: 5

6 Cisco 2811 an Cisco 2821 Routers Table 4 Cisco 2811 FIPS Logical Interfaces Router Physical Interface 10/100 Ethernet LAN Ports HWIC Ports Console Port Auxiliary Port ENM Slot 10/100 Ethernet LAN Ports HWIC Ports Console Port Auxiliary Port ENM Slot 10/100 Ethernet LAN Ports HWIC Ports Poer Sitch Console Port Auxiliary Port ENM Slot 10/100 Ethernet LAN Port LEDs AIM LEDs PVDM LEDs Poer LED Activity LEDs Auxiliary LED Compact Flash LED Console Port Auxiliary Port Main Poer Plug Reunant Poer Supply Plug FIPS Logical Interface Data Input Interface Data Output Interface Control Input Interface Status Output Interface Poer Interface There are to USB ports but they are not supporte currently. The ports ill be supporte in the future for smartcar or token reaer. The CF car that store the IOS image is consiere an internal memory moule, because the IOS image store in the car may not be moifie or upgrae. The car itself must never be remove from the rive. Tamper evient seal ill be place over the car in the rive. 6

7 OPTIONAL RPS INPUT 12V 11A -48V 4A SYS AUX/ SYS PWR PWR ACT CF Do Not Remove During Netork Operation V~ 4A 50/60 Hz Cisco 2811 an Cisco 2821 Routers The Cisco 2821 Cryptographic Moule Physical Characteristics Figure 4 The Cisco 2821 router case COMPACT FLASH 1 CONSOLE 0 AUX The Cisco 2821 router a multiple-chip stanalone cryptographic moule. The router has a processing spee of 350MHz. Depening on configuration, either the internal NetGX chip or the IOS softare is use for cryptographic operations. The cryptographic bounary of the moule is the evice's case. All of the functionality iscusse in this ocument is provie by components ithin this cryptographic bounary. The interfaces for the router are locate on the front an rear panel as shon in Figure 5an Figure 6, respectively. Figure 5 Cisco 2821 Front Panel Physical Interfaces CONSOLE SYS PWR AUX/ PWR SYS ACT CF COMPACT FLASH 1 0 AUX Do Not Remove During Netork Operation OPTIONAL RPS INPUT V~ 3A 50/60 Hz 12V 18A

8 Cisco 2811 an Cisco 2821 Routers Figure 6 Cisco 2821 Rear Panel Physical Interfaces A= ACT A= FDX S= SPEED A= LINK A GE 0/1 GE 0/0 A F F S S L L EVM 2 ONLY PVDM2 PVDM1 PVDM0 AIM1 AIM The Cisco 2821 router features a console port, an auxiliary port, to Universal Serial Bus (USB) ports, four high-spee WAN interface car (HWIC) slots, to10/100 Gigabit Ethernet RJ45 ports, a Enhance Netork Moule (ENM) slot, a Voice Netork Moule (VeNoM) slot, an a Compact Flash (CF) rive. The Cisco 2821 router supports one single-ith netork moule, four single-ith or to ouble-ith HWICs, to internal avance integration moules (AIMs) 1, three internal packet voice ata moules (PVDMs), to fast Ethernet connections, an 16 ports of IP phone poer output. The Figure 5 shos the front panel an Figure 6 shos the rear panel. The front panel contains 4 LEDs that output status ata about the system poer, auxiliary poer, system activity, an compact flash busy status. The back panel consists of 13 LEDs: to Ethernet activity LEDs, to uplex LEDs, to spee LEDs, to link LEDs, three PVDM LEDs, an to AIM LEDs. The front panel contains the folloing: (1) Poer inlet (2) Poer sitch (3) Console an auxiliary ports (4) USB ports (5) CF rive (6) LEDs escribe in table 1. (7) Optional RPS input The back panel contains the folloing: (1) GE 0 port (2) GE 1 port (3) HWIC 0 slot (4) HWIC 1 slot (5) HWIC 2 slot (6) HWIC 3 slot (7) VeNoM slot (8) ENM slot (9) Groun connector 1. Hoever, an AIM moule may not be installe in accorance ith this security policy. There is a separate security policy covering the Cisco 2811 an Cisco 2821 routers ith AIM moule installe. 8

9 Cisco 2811 an Cisco 2821 Routers Table 5 an Table 6 provie more etaile information conveye by the LEDs on the front an rear panel of the router: Table 5 Cisco 2821 Front Panel Inicators Name State Description System Poer Off Blinking Green Soli Green Soli Orange Poer off ROMMON moe Operating normally System Error Detecte Auxiliary Poer Off Soli Green Soli Orange -48V PS an RPS not present -48V PS or RPS present an functional -48V PS or RPS present an failure etecte Activity Off Blinking Green Soli Green No interrupts or packet transfer occurring System is servicing interrupts System is actively transferring packets Compact Flash Off Soli Green No ongoing accesses, eject permitte Device is busy, o not eject Table 6 Cisco 2821 Rear Panel Inicators Name State Description PVDM2 Off Soli Green Soli Orange PVDM2 not installe PVDM2 installe an initialize PVDM2 installe an initialize error PVDM1 Off Soli Green Soli Orange PVDM1 not installe PVDM1 installe an initialize PVDM1 installe an initialize error PVDM0 Off Soli Green Soli Orange PVDM0 not installe PVDM0 installe an initialize PVDM0 installe an initialize error AIM1 Off Soli Green Soli Orange AIM1 not installe AIM1 installe an initialize AIM1 installe an initialize error AIM0 Off Soli Green Soli Orange AIM0 not installe AIM0 installe an initialize AIM0 installe an initialize error Table 7 escribes the meaning of Ethernet LEDs on the front panel: 9

10 Cisco 2811 an Cisco 2821 Routers Table 7 Cisco 2821 Ethernet Inicators Name State Description Activity Off Not receiving packets Soli/Blinking Green Receiving packets Duplex Off Soli Green Half-Duplex Full-Duplex Spee One Blink Green To Blink Green 10 Mbps 100 Mbps Link Off Soli Green No link establishe Ethernet link is establishe The physical interfaces are separate into the logical interfaces from FIPS as escribe in the Table 8: Table 8 Cisco 2821 FIPS Logical Interfaces Router Physical Interface 10/100 Ethernet LAN Ports HWIC Ports Console Port Auxiliary Port ENM Slot VeNoM Slot 10/100 Ethernet LAN Ports HWIC Ports Console Port Auxiliary Port ENM Slot VeNoM Slot 10/100 Ethernet LAN Ports HWIC Ports Poer Sitch Console Port Auxiliary Port ENM Slot FIPS Logical Interface Data Input Interface Data Output Interface Control Input Interface 10

11 Cisco 2811 an Cisco 2821 Routers Table 8 Cisco 2821 FIPS Logical Interfaces (Continue) 10/100 Ethernet LAN Port LEDs AIM LEDs PVDM LEDs Poer LED Activity LEDs Auxiliary LED Compact Flash LED Console Port Auxiliary Port Main Poer Plug Reunant Poer Supply Plug Status Output Interface Poer Interface There are to USB ports but they are not supporte currently. The ports ill be supporte in the future for smartcar or token reaer. The CF car that store the IOS image is consiere an internal memory moule. The reason is the IOS image store in the car cannot be moifie or upgrae. The car itself must never be remove from the rive. Tamper evient seal ill be place over the car in the rive. Roles an Services Authentication in Cisco 2811 an Cisco 2821 is role-base. There are to main roles in the router that operators can assume: the Crypto Officer role an the User role. The aministrator of the router assumes the Crypto Officer role in orer to configure an maintain the router using Crypto Officer services, hile the Users exercise only the basic User services. The moule supports RADIUS an TACACS+ for authentication. A complete escription of all the management an configuration capabilities of the router can be foun in the Performing Basic System Management manual an in the online help for the router. User Services Users enter the system by accessing the console port ith a terminal program or via IPSec protecte telnet or SSH session to a LAN port. The IOS prompts the User for username an passor. If the passor is correct, the User is alloe entry to the IOS executive program. The services available to the User role consist of the folloing: Status Functions Vie state of interfaces an protocols, version of IOS currently running. Netork Functions Connect to other netork evices through outgoing telnet, PPP, etc. an initiate iagnostic netork services (i.e., ping, mtrace). Terminal Functions Ajust the terminal session (e.g., lock the terminal, ajust flo control). Directory Services Display irectory of files kept in flash memory. 11

12 Cisco 2811 an Cisco 2821 Routers Crypto Officer Services During initial configuration of the router, the Crypto Officer passor (the enable passor) is efine. A Crypto Officer can assign permission to access the Crypto Officer role to aitional accounts, thereby creating aitional Crypto Officers. The Crypto Officer role is responsible for the configuration an maintenance of the router. The Crypto Officer services consist of the folloing: Configure the router Define netork interfaces an settings, create comman aliases, set the protocols the router ill support, enable interfaces an netork services, set system ate an time, an loa authentication information. Define Rules an Filters Create packet Filters that are applie to User ata streams on each interface. Each Filter consists of a set of Rules, hich efine a set of packets to permit or eny base on characteristics such as protocol ID, aresses, ports, TCP connection establishment, or packet irection. Vie Status Functions Vie the router configuration, routing tables, active sessions, use gets to vie SNMP MIB statistics, health, temperature, memory status, voltage, packet statistics, revie accounting logs, an vie physical interface status. Manage the router Log off users, shuton or reloa the router, manually back up router configurations, vie complete configurations, manage user rights, an restore router configurations. Set Encryption/Bypass Set up the configuration tables for IP tunneling. Set keys an algorithms to be use for each IP range or allo plaintext packets to be set from specifie IP aress. Physical Security The router is entirely encase by a metal, opaque case. The rear of the unit contains HWIC/WIC/VIC connectors, LAN connectors, a CF rive, poer connector, console connector, auxiliary connector, USB port, an fast Ethernet connectors. The front of the unit contains the system status an activity LEDs. The top, sie, an front portion of the chassis can be remove to allo access to the motherboar, memory, AIM slot, an expansion slots. Once the router has been configure in to meet FIPS Level 2 requirements, the router cannot be accesse ithout signs of tampering. To seal the system, apply serialize tamper-evience labels as follos: To apply serialize tamper-evience labels to the Cisco 2811: Step 1 Step 2 Step 3 Step 4 Clean the cover of any grease, irt, or oil before applying the tamper evience labels. Alcohol-base cleaning pas are recommene for this purpose. The temperature of the router shoul be above 10 C. The tamper evience label shoul be place so that one half of the label covers the front panel an the other half covers the enclosure. The tamper evience label shoul be place over the CF car in the slot so that any attempt to remove the car ill sho sign of tampering. The tamper evience label shoul be place so that the one half of the label covers the enclosure an the other half covers the port aapter slot. 12

13 Cisco 2811 an Cisco 2821 Routers Step 5 Step 6 The tamper evience label shoul be place so that the one half of the label covers the enclosure an the other half covers the rear panel. The labels completely cure ithin five minutes. Figure 7 an Figure 8 sho the tamper evience label placements for the Cisco Figure 7 Cisco 2811 Tamper Evient Label Placement (Back Vie) Figure 8 Cisco 2811 Tamper Evient Label Placement (Front Vie) To apply serialize tamper-evience labels to the Cisco 2821: Step 1 Step 2 Step 3 Step 4 Clean the cover of any grease, irt, or oil before applying the tamper evience labels. Alcohol-base cleaning pas are recommene for this purpose. The temperature of the router shoul be above 10 C. The tamper evience label shoul be place so that one half of the label covers the front panel an the other half covers the enclosure. The tamper evience label shoul be place over the CF car in the slot so that any attempt to remove the car ill sho sign of tampering. The tamper evience label shoul be place so that the one half of the label covers the enclosure an the other half covers the port aapter slot. 13

14 Cisco 2811 an Cisco 2821 Routers Step 5 Step 6 The tamper evience label shoul be place so that the one half of the label covers the enclosure an the other half covers the rear panel. The labels completely cure ithin five minutes. Figure 9 an Figure 10 sho the tamper evience label placements for the Cisco Figure 9 Cisco 2821 Tamper Evient Label Placement (Back Vie) Figure 10 Cisco 2821 Tamper Evient Label Placement (Front Vie) The tamper evience seals are prouce from a special thin gauge vinyl ith self-ahesive backing. Any attempt to open the router ill amage the tamper evience seals or the material of the moule cover. Since the tamper evience seals have non-repeate serial numbers, they can be inspecte for amage an compare against the applie serial numbers to verify that the moule has not been tampere. Tamper evience seals can also be inspecte for signs of tampering, hich inclue the folloing: curle corners, bubbling, crinkling, rips, tears, an slices. The or OPEN may appear if the label as peele back. Cryptographic Key Management The router securely aministers both cryptographic keys an other critical security parameters such as passors. The tamper evience seals provie physical protection for all keys. All keys are also protecte by the passor-protection on the Crypto Officer role login, an can be zeroize by the Crypto Officer. All zeroization consists of overriting the memory that store the key. Keys are exchange an entere electronically or via Internet Key Exchange (IKE). 14

15 Cisco 2811 an Cisco 2821 Routers Key Zeroization: The routers support the folloing FIPS approve algorithm implementations: Softare (IOS) implementations AES DES (for legacy use only) (transitional phase only vali until May 19th, 2007) 3DES SHA-1 HMAC-SHA-1 X9.31 PRNG Onboar harare implementations AES DES (for legacy use only) (transitional phase only vali until May 19th, 2007) 3DES SHA-1 HMAC-SHA-1 The router is in the approve moe of operation only hen FIPS approve algorithms are use (except DH hich is alloe in the approve moe for key establishment espite being non-approve). The folloing are not FIPS approve algorithms: RC4, MD5, HMAC-MD5, RSA an DH. Note: The moule supports DH key sizes of 1024 an 1536 bits. Therefore, DH provies 80-bit an 96-bit of encryption strength per NIST The moule supports to types of key management schemes: Pre-share key exchange via electronic key entry. DES/3DES/AES key an HMAC-SHA-1 key are exchange an entere electronically. Internet Key Exchange metho ith support for pre-share keys exchange an entere electronically. The pre-share keys are use ith Diffie-Hellman key agreement technique to erive DES, 3DES or AES keys. The pre-share key is also use to erive HMAC-SHA-1 key. The moule supports commercially available Diffie-Hellman for key establishment. See the Cisco IOS Reference Guie. All pre-share keys are associate ith the CO role that create the keys, an the CO role is protecte by a passor. Therefore, the CO passor is associate ith all the pre-share keys. The Crypto Officer nees to be authenticate to store keys. All Diffie-Hellman (DH) keys agree upon for iniviual tunnels are irectly associate ith that specific tunnel only via the IKE protocol. Each key can be zeroize by sening the no comman prior to the key function commans. This ill zeroize each key from the, the running configuration. Clear Crypto IPSec SA ill zeroize the IPSec DES/3DES/AES session key (hich is erive using the Diffie-Hellman key agreement technique) from the. This session key is only available in the ; therefore this comman ill completely zeroize this key. The folloing comman ill zeroize the pre-share keys from the : 15

16 Cisco 2811 an Cisco 2821 Routers no set session-key inboun ah spi hex-key-ata no set session-key outboun ah spi hex-key-ata no set session-key inboun esp spi cipher hex-key-ata [authenticator hex-key-ata] no set session-key outboun esp spi cipher hex-key-ata [authenticator hex-key-ata] The running configuration must be copie to the start-up configuration in NVRAM in orer to completely zeroize the keys. The folloing commans ill zeroize the pre-share keys from the : no crypto isakmp key key-string aress peer-aress no crypto isakmp key key-string hostname peer-hostname The running configuration must be copie to the start-up configuration in NVRAM in orer to completely zeroize the keys. The moule supports the folloing keys an critical security parameters (CSPs). Note that keys store in NVRAM are in plaintext unless the configuration file encryption key is configure via the key config-key comman is use. Table 9 Cryptographic Keys an CSPs Name Algorithm Description Storage PRNG See X9.31 This is the see for X9.31 PRNG. This CSP is store in an upate perioically after the generation of 400 bytes after this it is reseee ith router-erive entropy; hence, it is zeroize perioically. Also, the operator can turn off the router to zeroize this CSP. Diffie Hellman private exponent Diffie Hellman public key skeyi skeyi_ skeyi_a skeyi_e IKE session encrypt key IKE session authentication key DH DH Keye SHA-1 Keye SHA-1 HMAC- SHA-1 or DES MAC DES/TDES /AES DES/TDES /AES HMAC- SHA-1 or DES MAC The private exponent use in Diffie-Hellman (DH) exchange. Zeroize after DH share secret has been generate. The public key use in Diffie-Hellman (DH) exchange as part of IKE. Zeroize after the DH share secret has been generate. Value erive from the share secret ithin IKE exchange. Zeroize hen IKE session is terminate. The IKE key erivation key for non ISAKMP security associations. The ISAKMP security association authentication key. The ISAKMP security association encryption key. The IKE session encrypt key. The IKE session authentication key. Zeroization Metho Automatically every 400 bytes, or turn off the router. Automatically after share secret generate. Automatically after share secret generate. Automatically after IKE session terminate. Automatically after IKE session terminate. Automatically after IKE session terminate. Automatically after IKE session terminate. Automatically after IKE session terminate. Automatically after IKE session terminate. 16

17 Cisco 2811 an Cisco 2821 Routers Table 9 Cryptographic Keys an CSPs (Continue) ISAKMP preshare Secret The key use to generate IKE skeyi uring preshare-key authentication. no crypto isakmp key comman zeroizes it. This key can have to forms base on hether the key is relate to the hostname or the IP aress. NVRAM (plaintext ) # no crypto isakmp key IKE hash key SHA-1 HMAC This key generates the IKE share secret keys. This key is zeroize after generating those keys. secret_1_0_0 The fixe key use in Cisco venor ID generation. This key is embee in the moule binary image an can be elete by erasing the Flash. NVRAM IPSec encryption key DES/TDES /AES The IPSec encryption key. Zeroize hen IPSec session is terminate. Automatically hen IPSec session terminate. IPSec authentication key SHA-1 HMAC or DES MAC The IPSec authentication key. The zeroization is the same as above. Automatically hen IPSec session terminate. Configuration encryption key AES The key use to encrypt values of the configuration file. This key is zeroize hen the no key config-key is issue. Note that this comman oes not ecrypt the configuration file, so zeroize ith care. NVRAM (plaintext ) # no key config-key Router authentication key 1 Share secret This key is use by the router to authenticate itself to the peer. The router itself gets the passor (that is use as this key) from the AAA server an sens it onto the peer. The passor retrieve from the AAA server is zeroize upon completion of the authentication attempt. Automatically upon completion of authentication attempt. PPP authentication key RFC 1334 The authentication key use in PPP. This key is in the an not zeroize at runtime. One can turn off the router to zeroize this key because it is store in. Turn off the router. Router authentication key 2 Share Secret This key is use by the router to authenticate itself to the peer. The key is ientical to Router authentication key 1 except that it is retrieve from the local atabase (on the router itself). Issuing the no username passor zeroizes the passor (that is use as this key) from the local atabase. NVRAM # no username passor SSH session key Various symmetric This is the SSH session key. It is zeroize hen the SSH session is terminate. Automatically hen SSH session terminate User passor Share Secret The passor of the User role. This passor is zeroize by overriting it ith a ne passor. NVRAM Overrite ith ne passor Enable passor Share Secret The plaintext passor of the CO role. This passor is zeroize by overriting it ith a ne passor. NVRAM Overrite ith ne passor 17

18 Cisco 2811 an Cisco 2821 Routers Table 9 Cryptographic Keys an CSPs (Continue) Enable secret Share Secret The ciphertext passor of the CO role. Hoever, the algorithm use to encrypt this passor is not FIPS approve. Therefore, this passor is consiere plaintext for FIPS purposes. This passor is zeroize by overriting it ith a ne passor. NVRAM Overrite ith ne passor RADIUS secret Share Secret The RADIUS share secret. This share secret is zeroize by executing the no raius-server key comman. NVRAM, # no raius-server key TACACS+ secret Share Secret The TACACS+ share secret. This share secret is zeroize by executing the no tacacs-server key comman. NVRAM, # no tacacs-server key Note All RSA operations are prohibite by policy, an commans that can be execute by Officer are shon # comman.. Table 10 Role an Service Access to CSP Note: An empty entry inicates that a particular SRDI is not accessible by the corresponing service SRDI/Role/Service Access Policy Security Relevant Data Item Role/Service User Role PRNG See r r DH private exponent r r DH public key r r Status Functions Netork Functions Terminal Functions Directory Services Crypto-Officer Role Configure the Router Define Rules an Filters Status Functions Manage the Router Set Encryptions/Bypass Change WAN Interface Cars 18

19 Cisco 2811 an Cisco 2821 Routers Table 10 Role an Service Access to CSP (Continue) Note: An empty entry inicates that a particular SRDI is not accessible by the corresponing service Role/Service User Role Status Functions Netork Functions Terminal Functions Directory Services Crypto-Officer Role Configure the Router Define Rules an Filters Status Functions Manage the Router Set Encryptions/Bypass Change WAN Interface Cars SRDI/Role/Service Access Policy DH public key r r skeyi r r skeyi_ r r skeyi_a r r skeyi_e r r IKE session encrypt key r r IKE session authentication key r r ISAKMP preshare r r IKE hash key r r secret_1_0_0 r r IPSec encryption key r r 19

20 Cisco 2811 an Cisco 2821 Routers Table 10 Role an Service Access to CSP (Continue) Note: An empty entry inicates that a particular SRDI is not accessible by the corresponing service SRDI/Role/Service Access Policy IPSec encryption key r r Configuration encryption key Role/Service User Role Status Functions Netork Functions Terminal Functions Directory Services Crypto-Officer Role Configure the Router Define Rules an Filters Status Functions Manage the Router Set Encryptions/Bypass Change WAN Interface Cars Router authentication key r r PPP Authentication key r r Router authentication key 2 r r SSH session key r r User passor r r Enable passor r Enable secret r RADIUS secret r TACACS+ secret r r r 20

21 Cisco 2811 an Cisco 2821 Routers Self-Tests In orer to prevent any secure ata from being release, it is important to test the cryptographic components of a security moule to insure all components are functioning correctly. The router inclues an array of self-tests that are run uring startup an perioically uring operations. All self-tests are implemente by the softare. An example of self-tests run at poer-up is a cryptographic knon anser test (KAT) on each of the FIPS-approve cryptographic algorithms an on the Diffie-Hellman algorithm. Examples of tests performe at startup are a softare integrity test using an EDC, an a set of Statistical Ranom Number Generator (RNG) tests. Examples of tests run perioically or conitionally inclue: a bypass moe test performe conitionally prior to executing IPSec, an a continuous ranom number generator test. If any of the self-tests fail, the router transitions into an error state. In the error state, all secure ata transmission is halte an the router outputs status information inicating the failure. Examples of the errors that cause the system to transition to an error state: IOS image integrity checksum faile Microprocessor overheats an burns out Knon anser test faile NVRAM moule malfunction. Temperature high arning Self-tests performe by the IOS image IOS Self Tests: POST tests AES Knon Anser Test Softare/firmare test Poer up bypass test RNG Knon Anser Test Diffie Hellman test HMAC-SHA-1 Knon Anser Test SHA-1 Knon Anser Test DES Knon Anser Test 3DES Knon Anser Test Conitional tests Conitional bypass test Self-tests performe by NetGX Continuous ranom number generation test NetGX Tests: POST tests AES Knon Anser Test DES Knon Anser Test 21

22 Secure Operation of the Cisco 2811 or Cisco 2821 router 3DES Knon Anser Test SHA-1 Knon Anser Test HMAC-SHA-1 Knon Anser Test Secure Operation of the Cisco 2811 or Cisco 2821 router The Cisco 2811 an Cisco 2821 routers meet all the Level 2 requirements for FIPS Follo the setting instructions provie belo to place the moule in FIPS-approve moe. Operating this router ithout maintaining the folloing settings ill remove the moule from the FIPS approve moe of operation. Initial Setup The Crypto Officer must apply tamper evience labels as escribe in the Physical Security section on page 12 of this ocument. The Crypto Officer must isable IOS Passor Recovery by executing the folloing commans: configure terminal no service passor-recovery en sho version Note Once Passor Recovery is isable, aministrative access to the moule ithout the passor ill not be possible. System Initialization an Configuration The Crypto Officer must perform the initial configuration. IOS version 12.3(11)T03, Avance Security buil (avsecurity) is the only alloable image; no other image shoul be loae. The value of the boot fiel must be 0x0102. This setting isables break from the console to the ROM monitor an automatically boots the IOS image. From the configure terminal comman line, the Crypto Officer enters the folloing syntax: config-register 0x0102 The Crypto Officer must create the enable passor for the Crypto Officer role. The passor must be at least 8 characters to inclue at least one number an one letter an is entere hen the Crypto Officer first engages the enable comman. The Crypto Officer enters the folloing syntax at the # prompt: enable secret [PASSWORD] The Crypto Officer must alays assign passors (of at least 8 characters) to users. Ientification an authentication on the console port is require for Users. From the configure terminal comman line, the Crypto Officer enters the folloing syntax: line con 0 passor [PASSWORD] login local 22

23 Relate Documentation RADIUS an TACACS+ share secret key sizes must be at least 8 characters long, an must inclue at least one number an one letter. IPSec Requirements an Cryptographic Algorithms The only type of key management that is alloe in FIPS moe is Internet Key Exchange (IKE). Although the IOS implementation of IKE allos a number of algorithms, only the folloing algorithms are alloe in a FIPS configuration: ah-sha-hmac esp-es esp-sha-hmac esp-3es esp-aes The folloing algorithms are not FIPS approve an shoul not be use uring FIPS-approve moe: RSA MD-5 for signing MD-5 HMAC Protocols SNMP v3 over a secure IPSec tunnel may be employe for authenticate, secure SNMP gets an sets. Since SNMP v2c uses community strings for authentication, only gets are alloe uner SNMP v2c. SSL is not an Approve protocol, an shall not be use in FIPS moe. Remote Access Telnet access to the moule is only alloe via a secure IPSec tunnel beteen the remote system an the moule. The Crypto officer must configure the moule so that any remote connections via telnet are secure through IPSec, using FIPS-approve algorithms. Note that all users must still authenticate after remote access is grante. SSH access to the moule is only alloe if SSH is configure to use a FIPS-approve algorithm. The Crypto officer must configure the moule so that SSH uses only FIPS-approve algorithms. Note that all users must still authenticate after remote access is grante. Relate Documentation For more information about the Cisco 2811 an Cisco 2821 Integrate Services Routers, refer to the folloing ocuments: Cisco 2800 Series Integrate Services Routers Quick Start Guies Cisco 2800 Series Harare Installation ocuments 23

24 Obtaining Documentation Cisco 2800 Series Softare Configuration ocuments Cisco 2800 Series Cars an Moules Obtaining Documentation Cisco ocumentation an aitional literature are available on Cisco.com. Cisco also provies several ays to obtain technical assistance an other technical resources. These sections explain ho to obtain technical information from Cisco Systems. Cisco.com You can access the most current Cisco ocumentation at this URL: You can access the Cisco ebsite at this URL: You can access international Cisco ebsites at this URL: Prouct Documentation DVD Cisco ocumentation an aitional literature are available in the Prouct Documentation DVD package, hich may have shippe ith your prouct. The Prouct Documentation DVD is upate regularly an may be more current than printe ocumentation. The Prouct Documentation DVD is a comprehensive library of technical prouct ocumentation on portable meia. The DVD enables you to access multiple versions of harare an softare installation, configuration, an comman guies for Cisco proucts an to vie technical ocumentation in HTML. With the DVD, you have access to the same ocumentation that is foun on the Cisco ebsite ithout being connecte to the Internet. Certain proucts also have.pf versions of the ocumentation available. The Prouct Documentation DVD is available as a single unit or as a subscription. Registere Cisco.com users (Cisco irect customers) can orer a Prouct Documentation DVD (prouct number DOC-DOCDVD=) from Cisco Marketplace at this URL: Orering Documentation Beginning June 30, 2005, registere Cisco.com users may orer Cisco ocumentation at the Prouct Documentation Store in the Cisco Marketplace at this URL: Nonregistere Cisco.com users can orer technical ocumentation from 8:00 a.m. to 5:00 p.m. (0800 to 1700) PDT by calling in the Unite States an Canaa, or elsehere by calling You can also orer ocumentation by at [email protected] or by fax at in the Unite States an Canaa, or elsehere at

25 Documentation Feeback Documentation Feeback You can rate an provie feeback about Cisco technical ocuments by completing the online feeback form that appears ith the technical ocuments on Cisco.com. You can sen comments about Cisco ocumentation to You can submit comments by using the response car (if present) behin the front cover of your ocument or by riting to the folloing aress: Cisco Systems Attn: Customer Document Orering 170 West Tasman Drive San Jose, CA We appreciate your comments. Cisco Prouct Security Overvie Cisco provies a free online Security Vulnerability Policy portal at this URL: From this site, you can perform these tasks: Report security vulnerabilities in Cisco proucts. Obtain assistance ith security incients that involve Cisco proucts. Register to receive security information from Cisco. A current list of security avisories an notices for Cisco proucts is available at this URL: If you prefer to see avisories an notices as they are upate in real time, you can access a Prouct Security Incient Response Team Really Simple Synication (PSIRT RSS) fee from this URL: Reporting Security Problems in Cisco Proucts Cisco is committe to elivering secure proucts. We test our proucts internally before e release them, an e strive to correct all vulnerabilities quickly. If you think that you might have ientifie a vulnerability in a Cisco prouct, contact PSIRT: Emergencies [email protected] An emergency is either a conition in hich a system is uner active attack or a conition for hich a severe an urgent security vulnerability shoul be reporte. All other conitions are consiere nonemergencies. Nonemergencies [email protected] In an emergency, you can also reach PSIRT by telephone:

26 Obtaining Technical Assistance Tip We encourage you to use Pretty Goo Privacy (PGP) or a compatible prouct to encrypt any sensitive information that you sen to Cisco. PSIRT can ork from encrypte information that is compatible ith PGP versions 2.x through 8.x. Never use a revoke or an expire encryption key. The correct public key to use in your corresponence ith PSIRT is the one linke in the Contact Summary section of the Security Vulnerability Policy page at this URL: The link on this page has the current PGP key ID in use. Obtaining Technical Assistance Cisco Technical Support provies 24-hour-a-ay aar-inning technical assistance. The Cisco Technical Support & Documentation ebsite on Cisco.com features extensive online support resources. In aition, if you have a vali Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provie telephone support. If you o not have a vali Cisco service contract, contact your reseller. Cisco Technical Support & Documentation Website The Cisco Technical Support & Documentation ebsite provies online ocuments an tools for troubleshooting an resolving technical issues ith Cisco proucts an technologies. The ebsite is available 24 hours a ay, at this URL: Access to all tools on the Cisco Technical Support & Documentation ebsite requires a Cisco.com user ID an passor. If you have a vali service contract but o not have a user ID or passor, you can register at this URL: Note Use the Cisco Prouct Ientification (CPI) tool to locate your prouct serial number before submitting a eb or phone request for service. You can access the CPI tool from the Cisco Technical Support & Documentation ebsite by clicking the Tools & Resources link uner Documentation & Tools. Choose Cisco Prouct Ientification Tool from the Alphabetical Inex rop-on list, or click the Cisco Prouct Ientification Tool link uner Alerts & RMAs. The CPI tool offers three search options: by prouct ID or moel name; by tree vie; or for certain proucts, by copying an pasting sho comman output. Search results sho an illustration of your prouct ith the serial number label location highlighte. Locate the serial number label on your prouct an recor the information before placing a service call. 26

27 Obtaining Aitional Publications an Information Submitting a Service Request Using the online TAC Service Request Tool is the fastest ay to open S3 an S4 service requests. (S3 an S4 service requests are those in hich your netork is minimally impaire or for hich you require prouct information.) After you escribe your situation, the TAC Service Request Tool provies recommene solutions. If your issue is not resolve using the recommene resources, your service request is assigne to a Cisco engineer. The TAC Service Request Tool is locate at this URL: For S1 or S2 service requests or if you o not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in hich your prouction netork is on or severely egrae.) Cisco engineers are assigne immeiately to S1 an S2 service requests to help keep your business operations running smoothly. To open a service request by telephone, use one of the folloing numbers: Asia-Pacific: (Australia: ) EMEA: USA: For a complete list of Cisco TAC contacts, go to this URL: Definitions of Service Request Severity To ensure that all service requests are reporte in a stanar format, Cisco has establishe severity efinitions. Severity 1 (S1) Your netork is on, or there is a critical impact to your business operations. You an Cisco ill commit all necessary resources aroun the clock to resolve the situation. Severity 2 (S2) Operation of an existing netork is severely egrae, or significant aspects of your business operation are negatively affecte by inaequate performance of Cisco proucts. You an Cisco ill commit full-time resources uring normal business hours to resolve the situation. Severity 3 (S3) Operational performance of your netork is impaire, but most business operations remain functional. You an Cisco ill commit resources uring normal business hours to restore service to satisfactory levels. Severity 4 (S4) You require information or assistance ith Cisco prouct capabilities, installation, or configuration. There is little or no effect on your business operations. Obtaining Aitional Publications an Information Information about Cisco proucts, technologies, an netork solutions is available from various online an printe sources. Cisco Marketplace provies a variety of Cisco books, reference guies, ocumentation, an logo merchanise. Visit Cisco Marketplace, the company store, at this URL: 27

28 Obtaining Aitional Publications an Information Cisco Press publishes a ie range of general netorking, training an certification titles. Both ne an experience users ill benefit from these publications. For current Cisco Press titles an other information, go to Cisco Press at this URL: Packet magazine is the Cisco Systems technical user magazine for maximizing Internet an netorking investments. Each quarter, Packet elivers coverage of the latest inustry trens, technology breakthroughs, an Cisco proucts an solutions, as ell as netork eployment an troubleshooting tips, configuration examples, customer case stuies, certification an training information, an links to scores of in-epth online resources. You can access Packet magazine at this URL: iq Magazine is the quarterly publication from Cisco Systems esigne to help groing companies learn ho they can use technology to increase revenue, streamline their business, an expan services. The publication ientifies the challenges facing these companies an the technologies to help solve them, using real-orl case stuies an business strategies to help reaers make soun technology investment ecisions. You can access iq Magazine at this URL: or vie the igital eition at this URL: Internet Protocol Journal is a quarterly journal publishe by Cisco Systems for engineering professionals involve in esigning, eveloping, an operating public an private internets an intranets. You can access the Internet Protocol Journal at this URL: Netorking proucts offere by Cisco Systems, as ell as customer support services, can be obtaine at this URL: Netorking Professionals Connection is an interactive ebsite for netorking professionals to share questions, suggestions, an information about netorking proucts an technologies ith Cisco experts an other netorking professionals. Join a iscussion at this URL: Worl-class netorking training is available from Cisco. You can vie current offerings at this URL: 28

29 Obtaining Aitional Publications an Information By printing or making a copy of this ocument, the user agrees to use this information for prouct evaluation purposes only. Sale of this information in hole or in part is not authorize by Cisco Systems. This ocument is to be use in conjunction ith the ocuments liste in the Relate Documentation section. q g g g y g g y Live, Play, an Learn, an iquick Stuy are service marks of Cisco Systems, Inc.; an Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certifie Internetork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empoering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iq Expertise, the iq logo, iq Net Reainess Scorecar, LightStream, Linksys, MeetingPlace, MGX, the Netorkers logo, Netorking Acaemy, Netork Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlieCast, SMARTnet, StrataVie Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, an TransPath are registere traemarks of Cisco Systems, Inc. an/or its affiliates in the Unite States an certain other countries. All other traemarks mentione in this ocument or Website are the property of their respective oners. The use of the or partner oes not imply a partnership relationship beteen Cisco an any other company. (0502R) 29

30 Obtaining Aitional Publications an Information 30

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions

More information

Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix

Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the OC-3/OC-12/OC-48 Small Form-Factor

More information

7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE,

7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, FIPS 140-2 Non-Proprietary Security Policy for the Cisco Unified IP Phone 7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, and 7975G Introduction This is a non-proprietary

More information

Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3)

Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3) Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3) The Disaster Recovery System Administration Guide provides an overview of the Disaster Recovery System, describes

More information

How To Install A Cisco Antenna For Outdoor Use

How To Install A Cisco Antenna For Outdoor Use Cisco Aironet 5.5-dBi Omnidirectional Antenna (AIR-ANT2455V-N) This document describes the Cisco Aironet AIR-ANT2455V-N 5.5-dBi Omnidirectional Antenna and provides instructions for mounting it. The antenna

More information

Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers

Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers Product Numbers: MEM3600-4FC=, MEM3600-8FC=, MEM3600-16FC=, MEM3600-20FC= This document describes how to install external

More information

FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module

FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,

More information

1C - FIPS 140-2 Cisco VPN Client Security Policy

1C - FIPS 140-2 Cisco VPN Client Security Policy This document describes the Cisco VPN Client security policy. Introduction This non-proprietary cryptographic module security policy describes how version 3.6.5 of the Cisco software VPN Client meets the

More information

Cisco 7140 VPN Router Security Policy

Cisco 7140 VPN Router Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how Cisco 7140 VPN routers meet the security requirements of the Federal Information Processing Standards (FIPS) 140-1, and

More information

FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers

FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers This document describes the support on the Cisco 1751 and Cisco 1760 routers for the following new voice interface cards (VICs):

More information

Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy

Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Overall Level 2 Validation Version 0.54 April 25, 2012 Introduction... 3 References... 3 FIPS 140-2 Submission

More information

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements Enhancements The purpose of this document is to provide a summary of some of the feature behavior enhancements on the new, and how they differ from the Cisco IP Phone 7960G/7940G. Complete information

More information

ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40

ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 Cisco ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Security Appliances FIPS 140-2 Non Proprietary Security

More information

Basic Software Configuration Using the Cisco IOS Command-Line Interface

Basic Software Configuration Using the Cisco IOS Command-Line Interface Basic Software Configuration Using the Cisco IOS Command-Line Interface This document describes how to use the Cisco IOS command-line interface (CLI) to perform a basic software configuration for your

More information

Transferring Files Using HTTP or HTTPS

Transferring Files Using HTTP or HTTPS Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device

More information

Cisco PIX 515E Security Appliance Getting Started Guide

Cisco PIX 515E Security Appliance Getting Started Guide Cisco PIX 515E Security Appliance Getting Started Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Upgrading to the Cisco ubr7246vxr Universal Broadband Router

Upgrading to the Cisco ubr7246vxr Universal Broadband Router Upgrading to the Cisco ubr7246vxr Universal Broadband Router This document outlines the process for upgrading an existing Cisco ubr7246 universal broadband router to a Cisco ubr7246vxr chassis, along with

More information

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy

Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.

More information

Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement

Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement June 2007 This documentation guide contains the End User Supplemental License Agreement for Cisco Systems Network

More information

Overview: Cisco Wireless Network Management Suite 1.0

Overview: Cisco Wireless Network Management Suite 1.0 Overview: Cisco Wireless Network Management Suite 1.0 Introduction Cisco Wireless Network Management Suite 1.0 (CWNMS 1.0) is a client/server based network management application suite for Broadband Fixed

More information

Constraining IP Multicast in a Switched Ethernet Network

Constraining IP Multicast in a Switched Ethernet Network Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure routers to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast

More information

L2TP Dial-Out Load Balancing and Redundancy

L2TP Dial-Out Load Balancing and Redundancy L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the

More information

Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix

Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the 10-Gigabit Ethernet transceiver

More information

ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4

ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 Cisco Integrated Services Router (ISR) 4451 X (with SM ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 128 and PVDM4 256) and Integrated Services Router (ISR) 4431 (with PVDM4 32, PVDM4

More information

Cisco ASA 5505 Getting Started Guide

Cisco ASA 5505 Getting Started Guide Cisco ASA 5505 Getting Started Guide Software Version 7.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Terminal Services Overview

Terminal Services Overview Terminal Services Overview This chapter provides an overview of Cisco IOS terminal services and includes the following main sections: Cisco IOS Network Access Devices Line Characteristics and s Asynchronous

More information

Cisco Router and Security Device Manager File Management

Cisco Router and Security Device Manager File Management Application Note Cisco Router and Security Device Manager File Management Introduction Cisco Router and Security Device Manager (SDM) allows you to view and manage the file system on your Cisco router

More information

Encrypted Preshared Key

Encrypted Preshared Key Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release

More information

Data Center Infrastructure Design Guide 2.1 Readme File

Data Center Infrastructure Design Guide 2.1 Readme File Data Center Infrastructure Design Guide 2.1 Readme File Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T. BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for

More information

CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES

CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES OVERVIEW CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES COMPANY PROFILE Cisco CallManager Express (CME) promotional bundles are appropriate for small businesses

More information

Cisco IronPort Encryption Appliance 6.5.5 Release Notes

Cisco IronPort Encryption Appliance 6.5.5 Release Notes Cisco IronPort Encryption Appliance 6.5.5 Release Notes Published: August 30, 2011 Contents These release notes contain important information about running the latest version of the IronPort Encryption

More information

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3

JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].

More information

Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix

Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the 10-Gigabit Ethernet transceiver

More information

Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network

Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network Revised: May 1, 2008, OL-12808-01 This guide describes how to connect Cisco Fast Ethernet Integrated Services Digital Network (ISDN)

More information

Manure Spreader Calibration

Manure Spreader Calibration Agronomy Facts 68 Manure Spreaer Calibration Manure spreaer calibration is an essential an valuable nutrient management tool for maximizing the efficient use of available manure nutrients. Planne manure

More information

Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1

Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 June 2007 Rev. A0 These release notes are for use with the Cisco WAN Modeling Tools, which includes the following subsystems: NMT

More information

Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2

Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2 Cisco 2811 an 2821 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2005 Cisco Systems, Inc. This ocument may be feely

More information

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004 ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

Cisco IP Phone 7914 Expansion Module

Cisco IP Phone 7914 Expansion Module Quick Start Guide Cisco IP Phone 7914 Expansion Module 1 Introduction to the Cisco IP Phone 7914 Expansion Module 2 Installing the 7914 Expansion Module 3 Features 4 How to Use the 7914 Expansion Module

More information

FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards

FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards FIPS 140-2 Security Policy 3Com Embedded Firewall PCI Cards 3Com Corporation 5403 Betsy Ross Drive Santa Clara, CA 95054 USA February 24, 2006 Revision Version 0.4 Page 1 of 15 1. Introduction The following

More information

Encrypted Preshared Key

Encrypted Preshared Key The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information

More information

FIPS 140-2 SECURITY POLICY

FIPS 140-2 SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 320M and SSG 350M HW P/N SSG-320M and SSG-350M, FW Version ScreenOS 6.2.0 Document # 530-023730-01 Copyright Notice Copyright 2009 Juniper Networks,

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information

Cisco Registered Envelope Recipient Guide

Cisco Registered Envelope Recipient Guide September 8, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:

More information

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange)

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) Revised August 10, 2007 Purpose This document provides capacity planning recommendations

More information

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.

Secure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc. Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].

More information

Cisco Router and Security Device Manager USB Storage

Cisco Router and Security Device Manager USB Storage Application Note Cisco Router and Security Device Manager USB Storage Introduction The USB Storage feature on the Cisco Router and Security Device Manager (Cisco SDM) allows the Cisco 871 and Cisco 1800,

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

How to Register, Start, and Access a Cisco Online Exam

How to Register, Start, and Access a Cisco Online Exam How to Register, Start, and Access a Cisco Online Exam Lifecycle Services and SMB Exams The process for registering and taking a Cisco online exam is different from the process for registering and taking

More information

Connecting Cisco Serial High-Speed WAN Interface Cards

Connecting Cisco Serial High-Speed WAN Interface Cards Connecting Cisco Serial High-Speed WAN Interface Cards Revised: April 5, 008, Overview This document describes Cisco serial and high-speed WAN interface cards (HWICs) and how to connect them to a network.

More information

Voice-Over IP Monitoring Best Practices Deployment Guide for CAD 6.0/6.1

Voice-Over IP Monitoring Best Practices Deployment Guide for CAD 6.0/6.1 Voice-Over IP Monitoring Best Practices Deployment Guide for CAD 6.0/6.1 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

Cisco Unified Wireless IP Phone 7925G Accessory Guide

Cisco Unified Wireless IP Phone 7925G Accessory Guide Cisco Unified Wireless IP Phone 7925G Accessory Guide This guide describes the accessories that you can order for your Cisco Unified Wireless IP Phone 7925G. Contents This document contains these sections:

More information

These documents explains how to configure and maintain your Cisco router.

These documents explains how to configure and maintain your Cisco router. Preface This preface describes the objectives, audience, organization, and conventions of the software configuration documentation for your router. It contains the following sections: Objectives, page

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager

FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright

More information

Release Notes for Cisco Support Tools Release 2.4(1)

Release Notes for Cisco Support Tools Release 2.4(1) Release Notes for Cisco Support Tools Release 2.4(1) July 2009 Contents Introduction, page 1 System Requirements, page 2 New Features, page 4 Limitations and Restrictions, page 4 Important Notes, page

More information

Cisco IP Phone 7912G. At a Glance

Cisco IP Phone 7912G. At a Glance At a Glance Cisco IP Phone 7912G 1 Overview 2 Connecting Your Phone 3 Introducing Your Cisco IP Phone 7912G 4 Tips for Using Your Phone 5 Using Additional Features 6 Where to Find More Information 7 Safety

More information

Cisco Router and Security Device Manager Quick Start Guide

Cisco Router and Security Device Manager Quick Start Guide Cisco Router and Security Device Manager Quick Start Guide Cisco Router and Security Device Manager (SDM) is an easy-to-use device management tool that allows you to configure Cisco IOS security features

More information

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1) First Published: June 21, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA

More information

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3

Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3 Cisco 3825 an Cisco 3845 Integate Sevices Routes ith AIM-VPN/SSL-3 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2007 Cisco Systems, Inc. This ocument may

More information

Times AA-9303 or equivalent (plenum rated)

Times AA-9303 or equivalent (plenum rated) Cisco Aironet 6.5-dBi Diversity Patch Antenna (AIR-ANT2465P-R) This document outlines the specifications, describes the AIR-ANT2465P-R 6-dBi patch antenna, and provides instructions for mounting it. The

More information

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)

More information

CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES

CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES DATA SHEET CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES Offering a single ISDN BRI S/T interface, this WIC may require an external Network Termination 1 (NT1),

More information

Cisco WLAN Controller Web Interface User Guide

Cisco WLAN Controller Web Interface User Guide Cisco WLAN Controller Web Interface User Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax:

More information

Cisco Aironet 5-dBi Omnidirectional Antenna (AIR-ANT2450V-N)

Cisco Aironet 5-dBi Omnidirectional Antenna (AIR-ANT2450V-N) Cisco Aironet 5-dBi Omnidirectional Antenna (AIR-ANT2450V-N) This document describes the Cisco Aironet AIR-ANT2450V-N 5-dBi Omnidirectional Antenna and provides instructions for mounting it. The antenna

More information

CISCO IOS SOFTWARE FEATURE PACKS FOR THE CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES (MODULAR) INTEGRATED SERVICES ROUTERS

CISCO IOS SOFTWARE FEATURE PACKS FOR THE CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES (MODULAR) INTEGRATED SERVICES ROUTERS CISCO IOS SOFTWARE FEATURE PACKS FOR THE CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES (MODULAR) INTEGRATED SERVICES ROUTERS This product bulletin provides details on the Cisco IOS s for

More information

SNAPcell Security Policy Document Version 1.7. Snapshield

SNAPcell Security Policy Document Version 1.7. Snapshield SNAPcell Security Policy Document Version 1.7 Snapshield July 12, 2005 Copyright Snapshield 2005. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE OVERVIEW...3

More information

Cisco Unified Wireless IP Phone 7925G Accessory Guide

Cisco Unified Wireless IP Phone 7925G Accessory Guide Cisco Unified Wireless IP Phone 7925G Accessory Guide This guide describes the accessories that you can order for your Cisco Unified Wireless IP Phone 7925G. Contents This document contains these sections:

More information

Enabling and Monitoring NetFlow on Subinterfaces

Enabling and Monitoring NetFlow on Subinterfaces Enabling and Monitoring NetFlow on Subinterfaces This module contains instructions for enabling and monitoring NetFlow on a router subinterface or a Versatile Interface Processor (VIP) controller interface.

More information

Danish Train Operator Gets Customer Service Back On Track

Danish Train Operator Gets Customer Service Back On Track Danish Train Operator Gets Customer Service Back On Track Danish Rail uses Cisco Unified Communications to sharpen its customer focus and revitalise its call centre operation EXECUTIVE SUMMARY Customer

More information

CD Installation Guide for the Cisco SIP Proxy Server on Linux

CD Installation Guide for the Cisco SIP Proxy Server on Linux CD Installation Guide for the Cisco SIP Proxy Server on Linux The describes how to install the Cisco SIP Proxy Server software on a Pentium-based server running Linux Kernel 2.2.13 or later. Network engineers,

More information

Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide

Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide First Published: April 2007 Last Updated: April 2007 OL 13005-01 In this document you will find basic information that will help you

More information

Cisco Remote Monitoring Suite Administration Guide

Cisco Remote Monitoring Suite Administration Guide Cisco Remote Monitoring Suite Administration Guide Remote Monitoring Suite (RMS) Release 2.1(0) July 2005 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

FIPS 140-2 SECURITY POLICY FOR

FIPS 140-2 SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SERVER August 31, 2011 FIPS 140-2 LEVEL-1 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SERVER 1. Introduction This document describes

More information

Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway

Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway This document describes how to configure Cisco Unified Communications Manager systems to use the NovaTec TransNova

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide Release 2.3 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706

More information

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration

More information

FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent

FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4

More information

FIPS 140-2 SECURITY POLICY

FIPS 140-2 SECURITY POLICY FIPS 140-2 SECURITY POLICY Juniper Networks, Inc. SSG 140 HW P/N SSG-140-SB, SSG-140-SH, FW Version ScreenOS 6.3.0r6 Copyright Notice Copyright 2012 Juniper Networks, Inc. May be reproduced only in its

More information

CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS

CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS DATA SHEET CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS The Cisco industry-standard Small Form-Factor Pluggable Interface Converter (SFP) for packet-over-sonet/sdh (POS), optical networking,

More information

Figure 1. The Cisco Aironet Power Injectors Provide Inline Power to Cisco Aironet Access Points and Bridges

Figure 1. The Cisco Aironet Power Injectors Provide Inline Power to Cisco Aironet Access Points and Bridges DATA SHEET CISCO AIRONET POWER INJECTOR Cisco Aironet Power Injector products increase the deployment flexibility of Cisco Aironet wireless access points and bridges by providing an alternative powering

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy

NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy NitroGuard Intrusion Prevention System Version 8.0.0.20080605 and 8.2.0 Security Policy FIPS 140-2 Level 2 Validation Model Numbers NS-IPS-620R-4C-B NS-IPS-1220R-6C-B NS-IPS-1220R-4C-2F-B NS-IPS-620R-4C-BFS

More information

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of

More information

Cisco Content Services Switch SSL Configuration Guide

Cisco Content Services Switch SSL Configuration Guide Cisco Content Services Switch SSL Configuration Guide Software Version 8.10 November 2005 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security

FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.2 January 31, 2013 Document Version 1.2 IBM Internet Security Systems Page 1 of

More information

Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix

Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix This document contains information about the Cisco platforms and software versions that support the 100-Megabit Ethernet Small Form-Factor Pluggable

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where

More information

HEWLETT PACKARD TIPPINGPOINT. FIPS 140 2 NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System

HEWLETT PACKARD TIPPINGPOINT. FIPS 140 2 NON PROPRIETARY SECURITY POLICY HP TippingPoint Security Management System HEWLETT PACKAD TIPPINGPOINT FIPS 140 2 NON POPIETAY SECUITY POLICY HP TippingPoint Security Management System Level 1 Validation Firmware Version: 3.2.0.8312.3 Document Version: 1.03 Page 1 of 31 FIPS

More information

Cisco PIX 501 Firewall

Cisco PIX 501 Firewall Quick Start Guide Cisco PIX 501 Firewall 1 Check Items Included 2 Installing the PIX 501 3 Configuring the PIX 501 4 Optional Maintenance and Upgrade Procedures About the Cisco PIX 501 Firewall The PIX

More information

SERIAL AND ASYNCHRONOUS HIGH-SPEED WAN INTERFACE CARDS FOR CISCO 1800, 2800, AND 3800 SERIES INTEGRATED SERVICES ROUTERS

SERIAL AND ASYNCHRONOUS HIGH-SPEED WAN INTERFACE CARDS FOR CISCO 1800, 2800, AND 3800 SERIES INTEGRATED SERVICES ROUTERS DATA SHEET SERIAL AND ASYNCHRONOUS HIGH-SPEED WAN INTERFACE CARDS FOR CISCO 1800, 2800, AND 3800 SERIES INTEGRATED SERVICES ROUTERS Serial and asynchronous high-speed WAN interface cards (HWICs) provide

More information

Implementation Note for NetFlow Collectors

Implementation Note for NetFlow Collectors This document describes the implementation details for NetFlow collectors for the ASA 5580 adaptive security appliance, and includes the following sections: Event-Driven Data Export Bidirectional Flows

More information