Cisco 2951, Cisco 3925 and Cisco 3945 Integrated Services Routers (ISRs)
|
|
|
- Beverly Kelly
- 10 years ago
- Views:
Transcription
1 Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) Haae vesions: 2951[1][2], 3925[1][3], 3945[1][3], FIPS Kit (CISCO-FIPS-KIT=), Revision -B0[1], ISR: FIPS- SHIELD-2951=[2] an FIPS-SHIELD-3900=[3] Fimae vesions: 15.1(2)T2A an 15.1(2)T3 FIPS Non-Popietay Secuity Policy Oveall Level 2 (Sections 3 an 10 Level 3) Valiation Vesion 0.13 July 2011
2 Intouction... 3 Refeences... 3 FIPS Submission Package... 3 Moule Desciption... 4 Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs)... 4 Moule Valiation Level... 4 Cyptogaphic Bounay... 5 Cyptogaphic Moule Pots an Intefaces... 5 Roles, Sevices, an Authentication... 8 Use Sevices... 8 Cyptogaphic Office Sevices... 9 Unauthenticate Use Sevices... 9 Cyptogaphic Key/CSP Management Cyptogaphic Algoithms Appove Cyptogaphic Algoithms Non-Appove Algoithms Self-Tests Physical Secuity Moule Opacity an Tampe Evience Secue Opeation Initial Setup System Initialization an Configuation IPSec Requiements an Cyptogaphic Algoithms Potocols Remote Access Cisco Unifie Boe Element (CUBE) TLS Configuation Relate Documentation Obtaining Documentation Cisco.com Pouct Documentation DVD Oeing Documentation Documentation Feeback Cisco Pouct Secuity Ovevie Repoting Secuity Poblems in Cisco Poucts Obtaining Technical Assistance Cisco Technical Suppot & Documentation Website Submitting a Sevice Request Definitions of Sevice Request Seveity Obtaining Aitional Publications an Infomation Definition List
3 Intouction This is a non-popietay Cyptogaphic Moule Secuity Policy fo the Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) fom Cisco Systems, Inc. (Haae Vesions: 2951[1][2], 3925[1][3], 3945[1][3], FIPS Kit (CISCO-FIPS-KIT=), Revision -B0[1], ISR: FIPS-SHIELD-2951=[2] an FIPS-SHIELD-3900=[3]; Fimae Vesions: IOS 15.1(2)T2A an 15.1(2)T3, efee to in this ocument as the moules, outes, o by thei specific moel name. This secuity policy escibes ho moules meet the secuity equiements of FIPS an ho to un the moules in a FIPS moe of opeation. FIPS (Feeal Infomation Pocessing Stanas Publication Secuity Requiements fo Cyptogaphic Moules) etails the U.S. Govenment equiements fo cyptogaphic moules. Moe infomation about the FIPS stana an valiation pogam is available on the NIST ebsite at Refeences This ocument eals only ith opeations an capabilities of the moule in the technical tems of a FIPS cyptogaphic moule secuity policy. Moe infomation is available on the moule fom the folloing souces: The Cisco Systems ebsite ( contains infomation on the full line of poucts fom Cisco Systems. The NIST Cyptogaphic Moule Valiation Pogam ebsite ( contains contact infomation fo anses to technical o sales-elate questions fo the moule. FIPS Submission Package The secuity policy ocument is one ocument in a FIPS Submission Package. In aition to this ocument, the submission package inclues: Veno Evience Finite State Machine Othe suppoting ocumentation as aitional efeences With the exception of this non-popietay secuity policy, the FIPS valiation ocumentation is popietay to Cisco Systems, Inc. an is eleasable only une appopiate non-isclosue ageements. Fo access to these ocuments, please contact Cisco Systems, Inc. See Obtaining Technical Assistance section fo moe infomation. 3
4 Moule Desciption Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) The Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) ae outing platfoms that povies VPN functionality, as ell as, SIP Gateay Signaling Ove TLS Tanspot. The Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) povie connectivity an secuity sevices in a single, secue evice. These outes offe boaban spees an simplifie management to small businesses, an entepise small banch an teleokes. In suppot of the outing capabilities, the Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) povie IPSec, GetVPN (GDOI), an SSL v3.1 connection capabilities fo VPN enable clients connecting though the Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs). The evaluate platfoms consist of the folloing components: Cisco 2951 ISR Cisco 3925 ISR Cisco 3945 ISR Moule Valiation Level Moel Fimae Cisco 2951 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 3925 ISR 15.1(2)T2A an 15.1(2)T3 Cisco 3945 ISR 15.1(2)T2A an 15.1(2)T3 Table 1: Moule Haae Configuations The folloing table lists the level of valiation fo each aea in the FIPS PUB No. Aea Title Level 1 Cyptogaphic Moule Specification 2 2 Cyptogaphic Moule Pots an Intefaces 2 3 Roles, Sevices, an Authentication 3 4 Finite State Moel 2 5 Physical Secuity 2 6 Opeational Envionmentxfomes-tme N/A 7 Cyptogaphic Key management 2 8 Electomagnetic Inteface/Electomagnetic Compatibility 2 9 Self-Tests 2 10 Design Assuance 3 11 Mitigation of Othe Attacks N/A Oveall Oveall moule valiation level 2 Table 2: Moule Valiation Level 4
5 Cyptogaphic Bounay The cyptogaphic bounay fo the Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) is efine as the moules chassis along ith the opacity shiels. Cyptogaphic Moule Pots an Intefaces Each moule povies a numbe of physical an logical intefaces to the evice, an the physical intefaces povie by the moule ae mappe to fou FIPS efine logical intefaces: ata input, ata output, contol input, an status output. The logical intefaces an thei mapping ae escibe in the folloing tables: Physical Intefaces FIPS Logical Intefaces EHWIC Slots (4) Data Input Inteface GigE Pots (3) SM Slots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Data Output Inteface GigE Pots (3) SM Slots (2) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Contol Input Inteface GigE Pots (3) SM Slots (2) Console Pot USB Console Pot Auxiliay Pot Activity LED Status Output Inteface System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) SM LED Compact Flash LED (2) RPS Boost LED Poe LED (2) GigE pots (3) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface Table 3: Cisco 2951 ISR Intefaces Physical Intefaces EHWIC Slots (4) SM Slots (2) GigE Pots (3) Console Pot USB Console Pot FIPS Logical Intefaces Data Input Inteface 5
6 Physical Intefaces FIPS Logical Intefaces Auxiliay Pot EHWIC Slots (4) Data Output Inteface SM Slots (2) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) Contol Input Inteface SM Slots (2) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot Activity LED Status Output Inteface System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) SM LED Compact Flash LED (2) RPS Boost LED Poe LED (2) GigE pots (3) Console Pot Auxiliay Pot USB Console Pot Poe Plug Poe inteface Table 4: Cisco 3925 ISR Intefaces Physical Intefaces EHWIC Slots (4) SM Slots (4) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) SM Slots (4) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot EHWIC Slots (4) SM Slots (4) GigE Pots (3) Console Pot USB Console Pot Auxiliay Pot Activity LED System LED GigE Link LED (1 pe GigE pot) GigE Spee LED (1 pe GigE pot) SM LED Compact Flash LED (2) RPS Boost LED FIPS Logical Intefaces Data Input Inteface Data Output Inteface Contol Input Inteface Status Output Inteface 6
7 Poe LED (2) GigE pots (3) Console Pot Auxiliay Pot USB Console Pot Poe Plug Physical Intefaces Poe inteface Table 5: Cisco 3945 ISR Intefaces FIPS Logical Intefaces NOTE: Each moule inclues to USB pots an to compact flash slots. These pots an slots ae isable by coveing Tampe Evient Labels (TELs)hile opeating in FIPS-moe. 7
8 Roles, Sevices, an Authentication Authentication is ientity-base. Each use is authenticate upon initial access to the moule. Thee ae to oles in the oute that opeatos may assume: the Cypto Office ole an the Use ole. The aministato of the oute assumes the Cypto Office ole in oe to configue an maintain the oute using Cypto Office sevices, hile the Uses execise only the basic Use sevices. The moule suppots RADIUS an TACACS+ fo authentication. A complete esciption of all the management an configuation capabilities of the moules can be foun in the IOS vesion 12.4T Configuation Guie Manual an in the online help fo the moules. The Use an Cypto Office passos an all shae secets must each be at least eight (8) chaactes long, incluing at least one lette an at least one numbe chaacte, in length (enfoce poceually). See the Secue Opeation section fo moe infomation. If six (6) integes, one (1) special chaacte an one (1) alphabet ae use ithout epetition fo an eight (8) igit PIN, the pobability of anomly guessing the coect sequence is one (1) in 832,000,000. In oe to successfully guess the sequence in one minute oul equie the ability to make ove 13,000,000 guesses pe secon, hich fa excees the opeational capabilities of the moule. Incluing the est of the alphanumeic chaactes astically eceases the os of guessing the coect sequence. Aitionally, hen using RSA base authentication, RSA key pai has moulus size of 1024 bit to 2048 bit, thus poviing beteen 80 bits an 112 bits of stength. Assuming the lo en of that ange, an attacke oul have a 1 in 2 80 chance of anomly obtaining the key, hich is much stonge than the one in a million chance equie by FIPS To excee a one in 100,000 pobability of a successful anom key guess in one minute, an attacke oul have to be capable of appoximately 1.8x10 21 attempts pe minute, hich fa excees the opeational capabilities of the moules to suppot. Use Sevices A Use entes the system by accessing the console/auxiliay pot ith a teminal pogam o SSH v2 session to a LAN pot. The moule pompts the Use fo thei usename/passo combination. If the usename/passo combination is coect, the Use is alloe enty to the moule management functionality. The sevices available to the Use ole consist of the folloing: Status Functions - Vie state of intefaces an potocols, fimae vesion Netok Functions - Connect to othe netok evices an initiate iagnostic netok sevices (i.e., ping, mtace). Teminal Functions - Ajust the teminal session (e.g., lock the teminal, ajust flo contol) Diectoy Sevices - Display iectoy of files kept in memoy Pefom Self-Tests Pefom the FIPS 140 stat-up tests on eman 8
9 VPN functions - Negotiation an encypte ata tanspot via VPN Cyptogaphic Office Sevices A Cypto Office entes the system by accessing the console/auxiliay pot ith a teminal pogam o SSH v2 session to a LAN pot. The Cypto Office authenticates as a Use an then authenticates as the Cypto Office ole. Duing initial configuation of the oute, the Cypto Office passo (the enable passo) is efine. A Cypto Office may assign pemission to access the Cypto Office ole to aitional accounts, theeby ceating aitional Cypto Offices. The Cypto Office ole is esponsible fo the configuation an maintenance of the oute. The Cypto Office sevices consist of the folloing: Configue the moule - Define netok intefaces an settings, ceate comman aliases, set the potocols the oute ill suppot, enable intefaces an netok sevices, set system ate an time, an loa authentication infomation. Define Rules an Filtes - Ceate packet Filtes that ae applie to Use ata steams on each inteface. Each Filte consists of a set of Rules, hich efine a set of packets to pemit o eny base chaacteistics such as potocol ID, aesses, pots, TCP connection establishment, o packet iection. Status Functions - Vie the moule configuation, outing tables, active sessions, use get commans to vie SNMP MIB statistics, health, tempeatue, memoy status, voltage, packet statistics, evie accounting logs, an vie physical inteface status. Manage the moule - Log off uses, shuton o eloa the oute, manually back up oute configuations, vie complete configuations, manage use ights, initiate poe-on self tests on eman an estoe oute configuations. Configue Encyption/Bypass - Set up the configuation tables fo IP tunneling. Set keys an algoithms to be use fo each IP ange o allo plaintext packets to be set fom specifie IP aess. Pefom Self-Tests Pefom the FIPS 140 stat-up tests on eman The Cypto Office also has access to all Use sevices. Unauthenticate Use Sevices The sevices fo someone ithout an authoize ole ae to vie the status output fom the moule s LED an cycle poe. 9
10 Cyptogaphic Key/CSP Management The moule secuely aministes both cyptogaphic keys an othe citical secuity paametes such as passos. The tampe evience seals povie physical potection fo all keys. All keys ae also potecte by the passo-potection on the Cypto Office ole login, an can be zeoize by the Cypto Office. All zeoization consists of oveiting the memoy that stoe the key. Keys ae exchange an entee electonically o via Intenet Key Exchange (IKE)/Goup Domain of Intepetation (GDOI). The moule suppots the folloing citical secuity paametes (CSPs): ID Algoithm Size Desciption Stoage Zeoization Metho RNG See X bits This is the see fo X9.31 RNG. This CSP is stoe in DRAM an upate peioically afte the geneation of 400 bytes afte this it is eseee ith oute-eive entopy; hence, it is zeoize peioically. Also, the opeato can tun off the oute to zeoize this CSP. DRAM RNG See Key X bits This is the see key fo the RNG. DRAM Diffie Hellman pivate exponent Diffie Hellman Shae Secet DH bits DH bits/2048- bits The pivate exponent use in Diffie-Hellman (DH) exchange. Zeoize afte DH shae secet has been geneate. Shae secet geneate by the Diffie-Hellman Key exchange Skeyi Keye SHA bits Value eive fom the shae secet ithin IKE exchange. Zeoize hen IKE session is teminate. skeyi_ Keye SHA bits The IKE key eivation key fo non ISAKMP secuity associations. IKE session encypt key IKE session authentication key Tiple-DES/AES 168- bits/256- bits The IKE session encypt key. DRAM DRAM DRAM DRAM DRAM SHA-1 HMAC 160-bits The IKE session authentication key. DRAM ISAKMP peshae Secet At least eight chaacte s IKE RSA Authentication pivate Key RSA bits The key use to geneate IKE skeyi uing peshae-key authentication. no cypto isakmp key comman zeoizes it. This key can have to foms base on hethe the key is elate to the hostname o the IP aess. RSA pivate key fo IKE authentication. Geneate o entee like any RSA key, set as IKE RSA Authentication Key ith the cypto keying o ca tust- NVRAM (plaintext o encypte) NVRAM Automatically evey 400 bytes, o tun off the oute. Tun off the oute Automatically afte shae secet geneate. Automatically afte session is teminate Automatically afte IKE session teminate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. # no cypto isakmp key # cypto key zeoize sa" 10
11 IPSec encyption key IPSec authentication key GDOI Key encyption Key (KEK) GDOI Taffic Encyption Key (TEK) GDOI TEK Integity key TLS Seve RSA pivate key TLS pe-maste secet SSL Taffic Keys Configuation encyption key SSH RSA pivate key SSH session key Use passo Enable passo Tiple-DES/AES 168- bits/256- bits point comman. The IPSec encyption key. Zeoize hen IPSec session is teminate. SHA-1 HMAC 160-bits The IPSec authentication key. The zeoization is the same as above. AES (128, 192 an 256 bits) 168- bits/256- bits Tiple-DES/AES 168- bits/256- bits This key is ceate using the GROUPKEY- PULL egistation potocol ith GDOI. It is use potect GDOI ekeying ata. This key is ceate using the GROUPKEY- PULL egistation potocol an upate using the GROUPKEY-PUSH egistation potocol ith GDOI. It is use to encypt ata taffic beteen Get VPN pees HMAC SHA bits This key is ceate using the GROUPKEY- PULL egistation potocol an upate using the GROUPKEY-PUSH egistation potocol ith GDOI. It is use to ensue ata taffic integity beteen Get VPN pees. RSA 1024/153 6/2048 Ientity cetificates fo moule itself an also use in TLS negotiations. This CSP is use fo both SSL VPN an SIP Gateay Signaling Ove TLS Tanspot. Shae Secet 384-bits Shae secet ceate using asymmetic cyptogaphy fom hich ne HTTPS session keys can be ceate. This CSP is use fo both SSL VPN an SIP Gateay Signaling Ove TLS Tanspot. Tiple-DES/AES HMAC SHA-1 keys 160- bits/168- bits/256- bits Geneate using the TLS potocol (X9.31RNG + HMAC-SHA1 + eithe Diffie- Hellman o RSA). This CSP is use fo both SSL VPN an SIP Gateay Signaling Ove TLS Tanspot. AES 256-bits The key use to encypt values of the configuation file. This key is zeoize hen the no key config-key is issue. Note that this comman oes not ecypt the configuation file, so zeoize ith cae. DH 168- bits/256- bits Tiple-DES/AES HMAC SHA-1 keys Shae Secet Shae Secet 160- bits/168- bits/256- bits At least eight chaacte s At least eight Shae secet geneate by the Diffie- Hellman Key exchange This is the SSH session key. It is zeoize hen the SSH session is teminate. The passo of the Use ole. This passo is zeoize by oveiting it ith a ne passo. The plaintext passo of the CO ole. This passo is zeoize by oveiting it ith a DRAM DRAM DRAM DRAM DRAM NVRAM (plaintext o encypte) DRAM DRAM NVRAM (plaintext o encypte) DRAM DRAM NVRAM (plaintext o encypte) NVRAM (plaintext o Automatically hen IPSec session teminate. Automatically hen IPSec session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. Automatically hen session teminate. # no key configkey Automatically afte session is teminate Automatically hen SSH session teminate Oveite ith ne passo Oveite ith ne passo 11
12 chaacte s ne passo. encypte) Enable secet Shae Secet At least eight chaacte s The ciphetext passo of the CO ole. Hoeve, the algoithm use to encypt this passo is not FIPS appove. Theefoe, this passo is consiee plaintext fo FIPS puposes. This passo is zeoize by oveiting it ith a ne passo. NVRAM (plaintext o encypte) Oveite ith ne passo RADIUS secet Shae Secet At least eight chaacte s The RADIUS shae secet. This shae secet is zeoize by executing the no aius-seve key comman. NVRAM (plaintext o encypte), DRAM # no aius-seve key TACACS+ secet Shae Secet At least eight chaacte s The TACACS+ shae secet. This shae secet is zeoize by executing the no tacacs-seve key comman. NVRAM (plaintext o encypte), DRAM # no tacacs-seve key Table 6: CSP Table The sevices accessing the CSPs, the type of access an hich ole accesses the CSPs ae liste belo. Role/Sevice Use Role Status Function Netok Function Teminal Function Diectoy Sevices Pefom Selftests VPN Function CO Role Configue the moule Define Rules CSP RNG See RNG See Key Diffie Hellman pivate exponent Diffie Hellman Shae Secet Skeyi skeyi_ IKE session encypt key IKE session authentication key ISAKMP peshae IKE RSA Authentication pivate Key IPSec encyption key IPSec authentication key GDOI Key encyption Key (KEK) GDOI Taffic Encyption Key (TEK) GDOI TEK Integity Key Configuation encyption key TLS Seve RSA Pivate Key TLS pe-maste Secet SSL Taffic Key SSH RSA Pivate Key SSH session key Use passo Enable passo Enable secet RADIUS secet TACACS+ secet 12
13 13 an Filtes Status Functions Manage the moule Set Encyption/ Bypass Pefom Selftests = ea = ite = elete Table 7: Role CSP Access
14 Cyptogaphic Algoithms Appove Cyptogaphic Algoithms The Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) suppot many iffeent cyptogaphic algoithms. Hoeve, only FIPS appove algoithms may be use hile in the FIPS moe of opeation. The folloing table ientifies the appove algoithms inclue in the Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) fo use in the FIPS moe of opeation. Algoithm IOS Cet. # Feescale Acceleato Cet. # AES #1527 #963, #1536 SHS (SHA-1, SHA256 an SHA 512) #1359 #934 HMAC SHA-1 #891 #538 RNG (ANSI X9.31) #823 N/A Tiple-DES #1010 #758 RSA #743 N/A Table 8: FIPS-Appove Algoithms fo use in FIPS Moe Non-Appove Algoithms The Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) cyptogaphic moule implements the folloing non-appove algoithms: MD5 DES, HMAC-MD5 RC4 The moules suppot the folloing key establishment schemes: Diffie-Hellman (key establishment methoology povies beteen 80 an 112 bits of encyption stength) RSA key tanspot (key establishment methoology povies beteen 80 an 112 bits of encyption stength) Intenet Key Exchange Key Establishment (IKEv1/IKEv2) Goup Domain of Intepetation (GDOI) Self-Tests The moules inclue an aay of self-tests that ae un uing statup an peioically uing opeations to pevent any secue ata fom being elease an to insue all 14
15 components ae functioning coectly. The moules implement the folloing poe-on self-tests: IOS Knon Anse Tests: AES KAT, SHS KAT, HMAC KAT, Tiple-DES KAT, RNG KAT, RSA KAT Feescale Acceleato Knon Anse Tests: AES KAT, HMAC KAT, Tiple- DES KAT Fimae Integity Test (32-bit CRC) The moules pefom all poe-on self-tests automatically at boot. All poe-on selftests must be passe befoe any opeato can pefom cyptogaphic sevices. The poeon self-tests ae pefome afte the cyptogaphic systems ae initialize but pio any othe opeations; this pevents the moule fom passing any ata uing a poe-on selftest failue. In aition, the moules also povie the folloing conitional self-tests: CRNG test fo the FIPS-appove RNG CRNG tests fo the non-appove RNG RSA PWCT Bypass Test 15
16 Physical Secuity This moule is a multi-chip stanalone cyptogaphic moule. The FIPS level 2 physical secuity equiements fo the moules ae met by the use of opacity shiels coveing the font panels of moules to povie the equie opacity an tampe evient seals to povie the equie tampe evience. The tampe evient labels an opacity shiels shall be installe fo the moule to opeate in a FIPS Appove moe of opeation. The folloing sections illustate the physical secuity povie by the moule. Moule Opacity an Tampe Evience All Citical Secuity Paametes ae stoe an potecte ithin each moule's tampe evient enclosue. The Cypto Office is esponsible fo popely placing all tampe evient labels. The secuity labels ecommene fo FIPS compliance ae povie in the FIPS Kit (Pat Numbe CISCO-FIPS-KIT=), Revision -B0. The FIPS kit inclues 15 of the seals, as ell as a ocument etailing the numbe of seals equie pe platfom an placement infomation. Please be aae that the exta tampe evient labels/seals shall be secuely stoe by the Cypto Office. These secuity labels ae vey fagile an cannot be emove ithout clea signs of amage to the labels. The outes also equie that a special opacity shiel be installe ove the sie ai vents in oe to opeate in FIPS-appove moe. The shiel eceases the suface aea of the vent holes, eucing visibility ithin the cyptogaphic bounay to FIPS-appove specifications. These ae obtaine by oeing the appopiate FIPS shiel, as follos: Cisco 2951 ISR: FIPS-SHIELD-2951= Cisco 3925 ISR: FIPS-SHIELD-3900= Cisco 3945 ISR: FIPS-SHIELD-3900= Once the moule has been configue to meet oveall FIPS Level 2 equiements, the moule cannot be accesse ithout signs of tampeing. The Cypto Office shoul inspect the tampe evient labels peioically to veify they ae intact an the seial numbes on the applie tampe evient labels match the ecos in the secuity log. The Tampe evient labels shall be applie as shon in the pictues belo, fo the moule to opeate in FIPS moe. Moule Cisco 2951 ISR Cisco 3925 ISR Cisco 3945 ISR Numbe of Tampe Seals 30 (to FIPS Kits (CISCO-FIPS-KIT=) equie) 31 (thee FIPS Kits (CISCO-FIPS-KIT=) equie) 31 (thee FIPS Kits (CISCO-FIPS-KIT=) equie) 16
17 Install the opacity plates an apply seialize tampe-evience labels as specifie in the pictues belo: Figue 1: Cisco 2951 ISR Font Figue 2: Cisco 2951 ISR Back 17
18 Figue 3: Cisco 2951 ISR Top 18
19 Figue 4: Cisco 2951 ISR Bottom Figue 5: Cisco 2951 ISR Right Sie 19
20 Figue 6: Cisco 2951 ISR Left Sie Figue 7: Cisco 3925 ISR Font 20
21 Figue 8: Cisco 3925 ISR Back Figue 9: Cisco 3925 ISR Top 21
22 Figue 10: Cisco 3925 ISR Bottom Figue 11: Cisco 3925 ISR Right Sie 22
23 Figue 12: Cisco 3925 ISR Left Sie Figue 13: Cisco 3945 ISR Font 23
24 Figue 14: Cisco 3945 ISR Back Figue 15: Cisco 3945 ISR Top 24
25 Figue 16: Cisco 3945 ISR Bottom Figue 17: Cisco 3945 ISR Right Sie 25
26 Figue 18: Cisco 3945 ISR Left Sie 26
27 Secue Opeation The Cisco 2951, Cisco 3925 an Cisco 3945 Integate Sevices Routes (ISRs) meet all the oveall Level 2 equiements fo FIPS Follo the setting instuctions povie belo to place the moule in FIPS-appove moe. Opeating this oute ithout maintaining the folloing settings ill emove the moule fom the FIPS appove moe of opeation. Initial Setup 1. The Cypto Office must install the FIPS opacity shiels as escibe in this ocument. 2. The Cypto Office must apply tampe evience labels as escibe in this ocument. 3. The Cypto Office must isable IOS Passo Recovey by executing the folloing commans: configue teminal no sevice passo-ecovey en sho vesion NOTE: Once Passo Recovey is isable, aministative access to the moule ithout the passo ill not be possible. System Initialization an Configuation 1. The value of the boot fiel must be 0x0102. This setting isables beak fom the console to the ROM monito an automatically boots. Fom the configue teminal comman line, the Cypto Office entes the folloing syntax: config-egiste 0x The Cypto Office must ceate the enable passo fo the Cypto Office ole. Poceually, the passo must be at least 8 chaactes, incluing at least one lette an at least one numbe, an is entee hen the Cypto Office fist engages the enable comman. The Cypto Office entes the folloing syntax at the # pompt: enable secet [PASSWORD] 3. The Cypto Office must alays assign passos (of at least 8 chaactes, incluing at least one lette an at least one numbe) to uses. Ientification an authentication on the console/auxiliay pot is equie 27
28 fo Uses. Fom the configue teminal comman line, the Cypto Office entes the folloing syntax: line con 0 passo [PASSWORD] login local 4. The Cypto Office may configue the moule to use RADIUS o TACACS+ fo authentication. Configuing the moule to use RADIUS o TACACS+ fo authentication is optional. If the moule is configue to use RADIUS o TACACS+, the Cypto-Office must efine RADIUS o TACACS+ shae secet keys that ae at least 8 chaactes long, incluing at least one lette an at least one numbe. 5. Fimae upate is not alloe in FIPS moe. IPSec Requiements an Cyptogaphic Algoithms 1. The only types of IPSec key management that ae alloe in FIPS moe is Intenet Key Exchange (IKE) an Goup Domain of Intepetation (GDOI). 2. Although the IOS implementation of IKE allos a numbe of algoithms, only the folloing algoithms ae alloe in a FIPS configuation: ah-sha-hmac esp-sha-hmac esp-3es esp-aes esp-aes-192 esp-aes The folloing algoithms shall not be use: MD-5 fo signing MD-5 HMAC DES Potocols 1. SNMP v3 ove a secue IPSec tunnel may be employe fo authenticate, secue SNMP gets an sets. Since SNMP v2c uses community stings fo authentication, only gets ae alloe une SNMP v2c. 28
29 Remote Access 1. SSH access to the moule is alloe in FIPS appove moe of opeation, using SSH v2 an a FIPS appove algoithm. 2. Telnet access to the moule is only alloe via a secue IPSec tunnel beteen the emote system an the moule. The Cypto office must configue the moule so that any emote connections via telnet ae secue though IPSec, using FIPS-appove algoithms. Note that all uses must still authenticate afte emote access is gante. 3. HTTPS/TLS management is not alloe in FIPS moe Cisco Unifie Boe Element (CUBE) TLS Configuation 1. When configuing CUBE TLS connections, the folloing configuation comman option must be execute to limit the TLS session options to FIPS-appove algoithms. cypto signaling [stict-ciphe] Ientifying Opeation in an Appove Moe The folloing activities ae equie to veify that that the moule is opeating in an Appove moe of opeation. 1. Veify that the tampe evience labels an FIPS opacity shiels have been popely place on the moule base on the instuctions specifie in the Physical Secuity an Secue Opeation sections of this ocument. 2. Veify that the length of Use an Cypto Office passos an all shae secets ae at least eight (8) chaactes long, inclue at least one lette, an inclue at least one numbe chaacte, as specifie in the Secue Opeation section of this ocument. 3. Issue the folloing commans: 'sho cypto ipsec sa', 'sho cypto isakmp policy', an sho sip-ua connections tcp tls etail. Veify that only FIPS appove algoithms ae use. 29
30 Relate Documentation This ocument eals only ith opeations an capabilities of the secuity appliances in the technical tems of a FIPS cyptogaphic evice secuity policy. Moe infomation is available on the secuity appliances fom the souces liste in this section an fom the folloing souce: The NIST Cyptogaphic Moule Valiation Pogam ebsite ( contains contact infomation fo anses to technical o sales-elate questions fo the secuity appliances. Obtaining Documentation Cisco ocumentation an aitional liteatue ae available on Cisco.com. Cisco also povies seveal ays to obtain technical assistance an othe technical esouces. These sections explain ho to obtain technical infomation fom Cisco Systems. Cisco.com You can access the most cuent Cisco ocumentation at this URL: You can access the Cisco ebsite at this URL: You can access intenational Cisco ebsites at this URL: Pouct Documentation DVD Cisco ocumentation an aitional liteatue ae available in the Pouct Documentation DVD package, hich may have shippe ith you pouct. The Pouct Documentation DVD is upate egulaly an may be moe cuent than pinte ocumentation. The Pouct Documentation DVD is a compehensive libay of technical pouct ocumentation on potable meia. The DVD enables you to access multiple vesions of haae an softae installation, configuation, an comman guies fo Cisco poucts an to vie technical ocumentation in HTML. With the DVD, you have access to the same ocumentation that is foun on the Cisco ebsite ithout being connecte to the Intenet. Cetain poucts also have.pf vesions of the ocumentation available. The Pouct Documentation DVD is available as a single unit o as a subsciption. Registee Cisco.com uses (Cisco iect customes) can oe a Pouct Documentation DVD (pouct numbe DOC-DOCDVD=) fom Cisco Maketplace at this URL: 30
31 Oeing Documentation Beginning June 30, 2005, egistee Cisco.com uses may oe Cisco ocumentation at the Pouct Documentation Stoe in the Cisco Maketplace at this URL: Nonegistee Cisco.com uses can oe technical ocumentation fom 8:00 a.m. to 5:00 p.m. (0800 to 1700) PDT by calling in the Unite States an Canaa, o elsehee by calling You can also oe ocumentation by at [email protected] o by fax at in the Unite States an Canaa, o elsehee at Documentation Feeback You can ate an povie feeback about Cisco technical ocuments by completing the online feeback fom that appeas ith the technical ocuments on Cisco.com. You can sen comments about Cisco ocumentation to [email protected]. You can submit comments by using the esponse ca (if pesent) behin the font cove of you ocument o by iting to the folloing aess: Cisco Systems Attn: Custome Document Oeing 170 West Tasman Dive San Jose, CA We appeciate you comments. Cisco Pouct Secuity Ovevie Cisco povies a fee online Secuity Vulneability Policy potal at this URL: Fom this site, you can pefom these tasks: Repot secuity vulneabilities in Cisco poucts. Obtain assistance ith secuity incients that involve Cisco poucts. Registe to eceive secuity infomation fom Cisco. A cuent list of secuity avisoies an notices fo Cisco poucts is available at this URL: If you pefe to see avisoies an notices as they ae upate in eal time, you can access a Pouct Secuity Incient Response Team Really Simple Synication (PSIRT RSS) fee fom this URL: 31
32 Repoting Secuity Poblems in Cisco Poucts Cisco is committe to eliveing secue poucts. We test ou poucts intenally befoe e elease them, an e stive to coect all vulneabilities quickly. If you think that you might have ientifie a vulneability in a Cisco pouct, contact PSIRT: Emegencies [email protected] An emegency is eithe a conition in hich a system is une active attack o a conition fo hich a sevee an ugent secuity vulneability shoul be epote. All othe conitions ae consiee nonemegencies. Nonemegencies [email protected] In an emegency, you can also each PSIRT by telephone: Tip We encouage you to use Petty Goo Pivacy (PGP) o a compatible pouct to encypt any sensitive infomation that you sen to Cisco. PSIRT can ok fom encypte infomation that is compatible ith PGP vesions 2.x though 8.x. Neve use a evoke o an expie encyption key. The coect public key to use in you coesponence ith PSIRT is the one linke in the Contact Summay section of the Secuity Vulneability Policy page at this URL: The link on this page has the cuent PGP key ID in use. Obtaining Technical Assistance Cisco Technical Suppot povies 24-hou-a-ay aa-inning technical assistance. The Cisco Technical Suppot & Documentation ebsite on Cisco.com featues extensive online suppot esouces. In aition, if you have a vali Cisco sevice contact, Cisco Technical Assistance Cente (TAC) enginees povie telephone suppot. If you o not have a vali Cisco sevice contact, contact you eselle. Cisco Technical Suppot & Documentation Website The Cisco Technical Suppot & Documentation ebsite povies online ocuments an tools fo toubleshooting an esolving technical issues ith Cisco poucts an technologies. The ebsite is available 24 hous a ay, at this URL: Access to all tools on the Cisco Technical Suppot & Documentation ebsite equies a Cisco.com use ID an passo. If you have a vali sevice contact but o not have a use ID o passo, you can egiste at this URL: Note 32
33 Use the Cisco Pouct Ientification (CPI) tool to locate you pouct seial numbe befoe submitting a eb o phone equest fo sevice. You can access the CPI tool fom the Cisco Technical Suppot & Documentation ebsite by clicking the Tools & Resouces link une Documentation & Tools. Choose Cisco Pouct Ientification Tool fom the Alphabetical Inex op-on list, o click the Cisco Pouct Ientification Tool link une Alets & RMAs. The CPI tool offes thee seach options: by pouct ID o moel name; by tee vie; o fo cetain poucts, by copying an pasting sho comman output. Seach esults sho an illustation of you pouct ith the seial numbe label location highlighte. Locate the seial numbe label on you pouct an eco the infomation befoe placing a sevice call. Submitting a Sevice Request Using the online TAC Sevice Request Tool is the fastest ay to open S3 an S4 sevice equests. (S3 an S4 sevice equests ae those in hich you netok is minimally impaie o fo hich you equie pouct infomation.) Afte you escibe you situation, the TAC Sevice Request Tool povies ecommene solutions. If you issue is not esolve using the ecommene esouces, you sevice equest is assigne to a Cisco enginee. The TAC Sevice Request Tool is locate at this URL: Fo S1 o S2 sevice equests o if you o not have Intenet access, contact the Cisco TAC by telephone. (S1 o S2 sevice equests ae those in hich you pouction netok is on o seveely egae.) Cisco enginees ae assigne immeiately to S1 an S2 sevice equests to help keep you business opeations unning smoothly. To open a sevice equest by telephone, use one of the folloing numbes: Asia-Pacific: (Austalia: )EMEA: USA: Fo a complete list of Cisco TAC contacts, go to this URL: Definitions of Sevice Request Seveity To ensue that all sevice equests ae epote in a stana fomat, Cisco has establishe seveity efinitions. Seveity 1 (S1) You netok is on, o thee is a citical impact to you business opeations. You an Cisco ill commit all necessay esouces aoun the clock to esolve the situation. Seveity 2 (S2) Opeation of an existing netok is seveely egae, o significant aspects of you business opeation ae negatively affecte by inaequate pefomance of Cisco poucts. You an Cisco ill commit full-time esouces uing nomal business hous to esolve the situation. Seveity 3 (S3) Opeational pefomance of you netok is impaie, but most business opeations emain functional. You an Cisco ill commit esouces uing nomal business hous to estoe sevice to satisfactoy levels. 33
34 Seveity 4 (S4) You equie infomation o assistance ith Cisco pouct capabilities, installation, o configuation. Thee is little o no effect on you business opeations. Obtaining Aitional Publications an Infomation Infomation about Cisco poucts, technologies, an netok solutions is available fom vaious online an pinte souces. Cisco Maketplace povies a vaiety of Cisco books, efeence guies, ocumentation, an logo mechanise. Visit Cisco Maketplace, the company stoe, at this URL: Cisco Pess publishes a ie ange of geneal netoking, taining an cetification titles. Both ne an expeience uses ill benefit fom these publications. Fo cuent Cisco Pess titles an othe infomation, go to Cisco Pess at this URL: Packet magazine is the Cisco Systems technical use magazine fo maximizing Intenet an netoking investments. Each quate, Packet elives coveage of the latest inusty tens, technology beakthoughs, an Cisco poucts an solutions, as ell as netok eployment an toubleshooting tips, configuation examples, custome case stuies, cetification an taining infomation, an links to scoes of in-epth online esouces. You can access Packet magazine at this URL: iq Magazine is the quately publication fom Cisco Systems esigne to help going companies lean ho they can use technology to incease evenue, steamline thei business, an expan sevices. The publication ientifies the challenges facing these companies an the technologies to help solve them, using eal-ol case stuies an business stategies to help eaes make soun technology investment ecisions. You can access iq Magazine at this URL: o vie the igital eition at this URL: Intenet Potocol Jounal is a quately jounal publishe by Cisco Systems fo engineeing pofessionals involve in esigning, eveloping, an opeating public an pivate intenets an intanets. You can access the Intenet Potocol Jounal at this URL: Netoking poucts offee by Cisco Systems, as ell as custome suppot sevices, can be obtaine at this URL: 34
35 Netoking Pofessionals Connection is an inteactive ebsite fo netoking pofessionals to shae questions, suggestions, an infomation about netoking poucts an technologies ith Cisco expets an othe netoking pofessionals. Join a iscussion at this URL: Wol-class netoking taining is available fom Cisco. You can vie cuent offeings at this URL: Definition List AES Avance Encyption Stana CMVP Cyptogaphic Moule Valiation Pogam CSEC Communications Secuity Establishment Canaa CSP Citical Secuity Paamete FIPS Feeal Infomation Pocessing Stana HMAC Hash Message Authentication Coe HTTP Hype Text Tansfe Potocol KAT Knon Anse Test LED Light Emitting Dioe MAC Message Authentication Coe NIST National Institute of Stanas an Technology NVRAM Non-Volatile Ranom Access Memoy RAM Ranom Access Memoy RNG Ranom Numbe Geneato RSA Rivest Shami an Aleman metho fo asymmetic encyption SHA Secue Hash Algoithm TDES Tiple Data Encyption Stana 35
Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, and Cisco 2921 Integrated Services Routers (ISRs)
Cisco 1905, Cisco 1921, Cisco 1941, Cisco 2901, Cisco 2911, an Cisco 2921 Integate Sevices Routes (ISRs) Haae vesions: 1905[1][2], 1921[1][2], 1941[1][2], 2901[1][3], 2911[1][4], 2921[1][5], FIPS Kit (CISCO-FIPS-
Cisco 1841 Integrated Services Router with AIM-VPN/SSL-1. And. Cisco 2801 Integrated Services Router with AIM-VPN/SSL-2
Cisco 1841 Integate Sevices Route ith AIM-VPN/SSL-1 An Cisco 2801 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.7 Octobe 13, 2009 Copyight 2009
Cisco 2811 and 2821 Integrated Services Router with AIM-VPN/SSL-2
Cisco 2811 an 2821 Integate Sevices Route ith AIM-VPN/SSL-2 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2005 Cisco Systems, Inc. This ocument may be feely
Cisco 3825 and Cisco 3845. Integrated Services Routers. with AIM-VPN/SSL-3
Cisco 3825 an Cisco 3845 Integate Sevices Routes ith AIM-VPN/SSL-3 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2007 Cisco Systems, Inc. This ocument may
Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy
Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions
Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy
Cisco 2811 an Cisco 2821 Integrate Services Router FIPS 140-2 Non Proprietary Security Policy Level 2 Valiation Version 1.3 November 23, 2005 Introuction This ocument is the non-proprietary Cryptographic
How To Power A Clou Mpa Series Mixer
CLOUD MPA Seies Mixe-Amplifies Clealy bette soun 48.6 mm 19 88 mm 3½ (U) MPA Seies - font panel view (MPA40 illustate) MPA Seies - ea panel view ( illustate) Geneal Desciption The Clou MPA Seies is intene
Faithful Comptroller s Handbook
Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices
Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy
Cisco Catalyst 3560-X and 3750-X Switches FIPS 140-2 Level 2 Non-Proprietary Security Policy Overall Level 2 Validation Version 0.54 April 25, 2012 Introduction... 3 References... 3 FIPS 140-2 Submission
Alarm transmission through Radio and GSM networks
Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS
CLOSE RANGE PHOTOGRAMMETRY WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT
CLOSE RANGE PHOTOGRAMMETR WITH CCD CAMERAS AND MATCHING METHODS - APPLIED TO THE FRACTURE SURFACE OF AN IRON BOLT Tim Suthau, John Moé, Albet Wieemann an Jens Fanzen Technical Univesit of Belin, Depatment
How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (
Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate
Anti-Lock Braking System Training Program
COVERST.EPS ac T to $2.50 BS A Anti-Lock Baking System Taining Pogam Student Manual TP-9738 Revised 3-99 Module 1 ABS Components and System Opeation Module 2 ABS Diagnosis and Repai Module 3 ATC Opeation,
Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors
anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing
HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING
U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available
College of Engineering Bachelor of Computer Science
2 0 0 7 w w w. c n u a s. e d u College of Engineeing Bachelo of Compute Science This bochue Details the BACHELOR OF COMPUTER SCIENCE PROGRAM available though CNU s College of Engineeing. Fo ou most up-to-date
How To Change V1 Programming
REPORT # HOW TO REPROGRAM V1 RADAR DETECTORS IF YOU REALLY WANT TO How To ange V1 Pogamming WARNING: Impotant ada alets may be blocked by changes in factoy settings es that ae Essential To Full Potection
ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4
Cisco Integrated Services Router (ISR) 4451 X (with SM ES3X 16 P, SM ES3X 24 P, SM D ES3X 48 P, PVDM4 32, PVDM4 64, PVDM4 128 and PVDM4 256) and Integrated Services Router (ISR) 4431 (with PVDM4 32, PVDM4
How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it
AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve
Hitachi Virtual Storage Platform
Hitachi Vitual Stoage Platfom FASTFIND LINKS Contents Poduct Vesion Getting Help MK-90RD7028-15 2010-2014 Hitachi, Ltd. All ights eseved. No pat of this publication may be epoduced o tansmitted in any
DSP monitoring systems
DSP monitoing systems DSP, utocal, GLM an GLM.SE The Genelec DSP louspeake systems utilize DSP to allow fo all stana ES/EU fomats of igital auio. The DSP Seies will accept sampling ates anging fom 32k
Over-encryption: Management of Access Control Evolution on Outsourced Data
Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy [email protected] Stefano Paaboschi DIIMM - Univesità
How to SYSPREP a Windows 7 Pro corporate PC setup so you can image it for use on future PCs
AnswesThatWok TM How to SYSPREP a Windows 7 Po copoate PC setup so you can image it fo use on futue PCs In a copoate envionment most PCs will usually have identical setups, with the same pogams installed
CIS-162. Security Baselines. Security Baselines. Best Practice aka Beer and Pizza. Remove all unneeded processes
CIS-162 Intoduction to Netok Secuity Comptia Secuity+ Eam Domain 3 Secuity Baselines Secuity Baselines Standad that oganization systems must comply Establish the nom of consistency Detect the anomaly Pefom
Software Engineering and Development
I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining
Firstmark Credit Union Commercial Loan Department
Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and
Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.
Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to
9:6.4 Sample Questions/Requests for Managing Underwriter Candidates
9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS
INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in
ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40
Cisco ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA 5580-20, ASA 5580-40, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-40 and 5585-X SSP-60 Security Appliances FIPS 140-2 Non Proprietary Security
Distributed Computing and Big Data: Hadoop and MapReduce
Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents
MAGNT Research Report (ISSN. 1444-8939) Vol.3 (2). PP: 267-278
Analysis of Relationship between Knowlege Management an Paticipatoy Management base on the Moeating Role of Oganizational Cultue in Bank Melli of Razavi Khoasan Povince Ggolafshani 1. S. M. Ghayou 2 1,2
BIOS American Megatrends Inc (AMI) v02.61 BIOS setup guide and manual for AM2/AM2+/AM3 motherboards
BIOS Ameican Megatends Inc (AMI) v02.61 BIOS setup guide and manual fo AM2/AM2+/AM3 motheboads The BIOS setup, also called CMOS setup, is a cucial pat of the pope setting up of a PC the BIOS (Basic Input
COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS
Highe Education Cente fo Alcohol and Othe Dug Abuse and Violence Pevention Education Development Cente, Inc. 55 Chapel Steet Newton, MA 02458-1060 COMPLYING WITH THE DRUG-FREE SCHOOLS AND CAMPUSES REGULATIONS
Cloud Service Reliability: Modeling and Analysis
Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity
Smarter Transportation: The power of Big Data and Analytics
Smate Tanspotation: The powe of Big Data and Analytics Eic-Mak Huitema, Global Smate Tanspotation Leade IBM 1 Intelligent Tanspot Systems (ITS) fo the futue 2 BECAUSE WE WANT IT FOR THE FUTURE. How? The
The transport performance evaluation system building of logistics enterprises
Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics
Welcome to the Cloud Stream. Sponsored by:
Welcome to the Cloud Steam Sponsoed by: Entepise Cloud (HEC) Hanessing the Powe of eal- Time Business with the Simplicity of the Cloud Ben Lingwood Diecto HEC GtM Entepise Cloud - Oveview Announced May
Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan
Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,
Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication
I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line
est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.
9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,
DOCTORATE DEGREE PROGRAMS
DOCTORATE DEGREE PROGRAMS Application Fo Admission 2015-2016 5700 College Road, Lisle, Illinois 60532 Enollment Cente Phone: (630) 829-6300 Outside Illinois: (888) 829-6363 FAX: (630) 829-6301 Email: [email protected]
P/ACE MDQ Basic Training Workbook
P/ACE MDQ Basic Taining Wokbook 32 Kaat 8.0 A33116AB Novembe 2009 Beckman Coulte, Inc. 250 S. Kaeme Blvd., Bea, CA 92821 Copyight 2009 Beckman Coulte, Inc. Copyight, Licenses and Tademaks Copyight Beckman
Converting knowledge Into Practice
Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading
Chapter 1: Introduction... 7 1-1. BELSORP analysis program... 7 1-2. Required computer environment... 8
1 [Table of contents] Chapte 1: Intoduction... 7 1-1. BELSORP analysis pogam... 7 1-. Requied compute envionment... 8 Chapte : Installation of the analysis pogam... 9-1. Installation of the WIBU-KEY pogam...
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM
AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,
How to create a default user profile in Windows 7
AnswesThatWok TM How to ceate a default use pofile in Windows 7 (Win 7) How to ceate a default use pofile in Windows 7 When to use this document Use this document wheneve you want to ceate a default use
An Epidemic Model of Mobile Phone Virus
An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China [email protected] School of Compute Science and Technology, Huazhong Univesity
APPLICATION AND AGREEMENT FORM FOR TELECOMMUNICATION SERVICES BUSINESS APPLICATION
Application Fom SECTION 1 COMPANY DETAILS New Company Yes No Company Name Tading As Pevious Company Name Email Addess Contact Numbe Tel Cell Fax Registeed Numbe Natue of Business Yea of Incopoation Yea
Comparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance
IBM Research Smarter Transportation Analytics
IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente [email protected] INSTRUMENTED We now have the ability to measue, sense and see the exact condition
883 Brochure A5 GENE ss vernis.indd 1-2
ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,
Secure Smartcard-Based Fingerprint Authentication
Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak [email protected] Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity
Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*
Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:
Comparing Availability of Various Rack Power Redundancy Configurations
Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability
Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing
M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow
cover comparison TUH it s my health fund! Your Queensland health fund Effective 2 April 2014
Effective 2 Apil 2014 You Queensland health fund cove compaison TUH it s my health fund! PLEASE CAREFULLY READ AND RETAIN THIS BROCHURE. PLEASE READ IN CONJUNCTION WITH THE Fine Points BROCHURE. waiting
Adaptive Queue Management with Restraint on Non-Responsive Flows
Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy
Nortel Networks, Inc. VPN Client Software (Software Version: 7_11.101) FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Document Version 0.5 Prepared for: Prepared by: Nortel Networks, Inc.
Significant value in diagnostic information
U.S. Centalized Oveview Tom Adkins Vice Pesident Sales and Maketing Centalized, USA 1 Centalized Significant value in diagnostic infomation Diagnostic analysis of blood and othe body fluids pefomed in
California s Duals Demonstration: A Transparent. Process. Margaret Tatar Chief, Medi-Cal Managed Care Division. CA Coo 8/21/12
Califonia s Duals Demonstation: A Tanspaent and Inclusive Stakeholde Pocess Magaet Tata Chief, Medi-Cal Managed Cae Division Depatment of Health Cae Sevices 1 Stakeholde Engagement 1. 2. Inclusive Building
How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database
AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM
[TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)]
[TO BE PUBLISHED IN THE GAZETTE OF INDIA, EXTRAORDINARY, PART-II, SECTION-3, SUB-SECTION (i)] GOVERNMENT OF INDIA MINISTRY OF FINANCE (DEPARTMENT OF REVENUE) Notification No. 32/2016 - Customs (N. T.)
Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes
Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Strength Analysis and Optimization Design about the key parts of the Robot
Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design
Ashfield Girls High School. Critical Incident Policy
Ashfield Gils High School A Specialist School fo ICT Citical Incident Policy Citical Incident Policy 2 Citical Incident Policy A Specialist School fo ICT Ashfield Gils High School CRITICAL INCIDENT POLICY
STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION
Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts
A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods
A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd [email protected]
Effect of Contention Window on the Performance of IEEE 802.11 WLANs
Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,
KNIGHTS OF COLUMBUS LEADERSHIP RESOURCES. Practical Information for Grand Knights, District Deputies and Financial Secretaries
KNIGHTS OF COLUMBUS LEADERSHIP RESOURCES Pactical Infomation fo Gand Knights, Distict Deputies and Financial Secetaies Thank you fo taking on the esponsibility of being a leade in the Knights of Columbus.
JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3
JUNOS-FIPS-L2 Cryptographic Module Security Policy Document Version 1.3 Juniper Networks January 10, 2007 Copyright Juniper Networks 2007. May be reproduced only in its original entirety [without revision].
AFFILIATE MEMBERSHIP APPLICATION
Califonia Constuction Tucking Association AFFILIATE MEMBERSHIP APPLICATION Reach and Netwok with the Lagest Concentation of Constuction Tucking Fims in the U.S. Affiliate Dues - $500 Annual CCTA 334 N.
Armored Car Insurance Application
Amoed Ca Insuance Application Applicant Details: Fist named insued: _ Please attach list of any additional insueds to be included fo coveage. Addess: City/State/Zip: Effective date: Expiation date: Additional
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
FIPS 140 2 Non Proprietary Security Policy: IBM Internet Security Systems Proventia GX Series Security
FIPS 140 2 Non Proprietary Security Policy IBM Internet Security Systems Proventia GX Series Security Document Version 1.6 January 25, 2013 Document Version 1.6 IBM Internet Security Systems Page 1 of
Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN. Colliers International Office Leasing Guide P. 1
Office Leasing Guide WHAT YOU NEED TO KNOW BEFORE YOU SIGN Collies Intenational Office Leasing Guide P. 1 THE OFFICE LEASING GUIDE This step-by-step guide has been assembled to eflect Collies Intenational
Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN
Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,
Database Management Systems
Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012
Chapter 3 Savings, Present Value and Ricardian Equivalence
Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,
7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE,
FIPS 140-2 Non-Proprietary Security Policy for the Cisco Unified IP Phone 7906G, 7911G, 7931G, 7941G, 7942G, 7945G, 7961G, 7961GE, 7962G, 7965G, 7970G, 7971G, 7971GE, and 7975G Introduction This is a non-proprietary
Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees
Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson [email protected] Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact
Application for Admission GENEVA COLLEGE
Application fo Admission GENEVA COLLEGE 3 2 0 0 C o l l e g e A v e n u e, B e a v e F a l l s, P A 1 5 0 1 0 Application Instuctions When to apply You may apply fo admission any time afte you junio yea
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,
Ou Appoach and Types of attack
BlueBoX: A Policy diven, Host Based Intusion Detection system Suesh N. Chai Pau Chen Cheng IBM Thomas J. Watson Reseach Cente Yoktown Heights, NY 10598, U.S.A. schai,pau @watson.ibm.com Abstact In this
Automated Hydraulic Drilling Rigs. HHSeries
Automated Hydaulic Dilling Rigs HHSeies The Shape of Things to Come CUSTOMSOLUTIONS HH600 Rig The HH Hydaulic Hoist Seies Eveything about the HH Seies is designed fo speed, safety and efficiency. You can
