Cisco 3825 an Cisco 3845 Integate Sevices Routes ith AIM-VPN/SSL-3 FIPS 140-2 Non Popietay Secuity Policy Level 2 Valiation Vesion 1.5 Septembe 8, 2008 Copyight 2007 Cisco Systems, Inc. This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Table of Contents 1 INTRODUCTION... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3 1.3 TERMINOLOGY... 3 1.4 DOCUMENT ORGANIZATION... 3 2 CISCO 3825 AND 3845 ROUTERS... 5 2.1 THE 3825 CRYPTOGRAPHIC MODULE PHYSICAL CHARACTERISTICS... 5 2.2 THE CISCO 3845 CRYPTOGRAPHIC MODULE PHYSICAL CHARACTERISTICS... 9 2.3 ROLES AND SERVICES... 13 2.3.1. Use Sevices... 13 2.3.2 Cypto ice Sevices... 13 2.3.3 Unauthenticate Sevices... 14 2.3.4 Stength of Authentication... 14 2.4 PHYSICAL SECURITY... 15 2.5 CRYPTOGRAPHIC KEY MANAGEMENT... 19 2.6 SELF-TESTS... 28 2.6.1 Self-tests pefome by the IOS image... 28 2.6.2 Self-tests pefome by Safenet... 28 2.6.3 Self-tests pefome by AIM... 29 3 SECURE OPERATION OF THE CISCO 3825 OR 3845 ROUTER... 30 3.1 INITIAL SETUP... 30 3.2 SYSTEM INITIALIZATION AND CONFIGURATION... 30 3.3 IPSEC REQUIREMENTS AND CRYPTOGRAPHIC ALGORITHMS... 31 3.4 SSLV3.1/TLS REQUIREMENTS AND CRYPTOGRAPHIC ALGORITHMS... 31 3.5 PROTOCOLS... 31 3.6 REMOTE ACCESS... 31 Copyight 2007 Cisco Systems, Inc. 2 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
1 Intouction 1.1 Pupose This ocument is the non-popietay Cyptogaphic Moule Secuity Policy fo the Cisco 3825 Integate Sevices Route ith AIM-VPN/SSL-3 an 3845 Integate Sevices Routes Routes ith AIM-VPN/SSL-3 (Route Haae Vesion: 3825 o 3845; Route Fimae Vesion: IOS 12.4 (15) T3; AIM-VPN/SSL-3 Haae Vesion 1.0, Boa Revision 01). This secuity policy escibes ho the Cisco 3825 an 3845 Integate Sevices Routes meet the secuity equiements of FIPS 140-2, an ho to opeate the oute ith on-boa cypto enable in a secue FIPS 140-2 moe. This policy as pepae as pat of the Level 2 FIPS 140-2 valiation of the Cisco 3825 o 3845 Integate Sevices Route. FIPS 140-2 (Feeal Infomation Pocessing Stanas Publication 140-2 Secuity Requiements fo Cyptogaphic Moules) etails the U.S. Govenment equiements fo cyptogaphic moules. Moe infomation about the FIPS 140-2 stana an valiation pogam is available on the NIST ebsite at http://csc.nist.gov/goups/stm/inex.html. 1.2 Refeences This ocument eals only ith opeations an capabilities of the 3825 an 3845 outes ith AIM moules in the technical tems of a FIPS 140-2 cyptogaphic moule secuity policy. Moe infomation is available on the outes fom the folloing souces: The Cisco Systems ebsite contains infomation on the full line of Cisco Systems outes. Please efe to the folloing ebsite: http://.cisco.com/en/us/poucts/h/outes/inex.html Fo anses to technical o sales elate questions please efe to the contacts liste on the Cisco Systems ebsite at.cisco.com. The NIST Valiate Moules ebsite (http://csc.nist.gov/goups/stm/cmvp/valiation.html) contains contact infomation fo anses to technical o sales-elate questions fo the moule. 1.3 Teminology In this ocument, the Cisco 3825 o 3845 outes ae efee to as the oute, the moule, o the system. 1.4 Document Oganization The Secuity Policy ocument is pat of the FIPS 140-2 Submission Package. In aition to this ocument, the Submission Package contains: Veno Evience ocument Finite State Machine Othe suppoting ocumentation as aitional efeences Copyight 2007 Cisco Systems, Inc. 3 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
This ocument povies an ovevie of the outes an explains thei secue configuation an opeation. This intouction section is folloe by Section 2, hich etails the geneal featues an functionality of the oute. Section 3 specifically aesses the equie configuation fo the FIPS-moe of opeation. With the exception of this Non-Popietay Secuity Policy, the FIPS 140-2 Valiation Submission Documentation is Cisco-popietay an is eleasable only une appopiate nonisclosue ageements. Fo access to these ocuments, please contact Cisco Systems. Copyight 2007 Cisco Systems, Inc. 4 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
2 Cisco 3825 an 3845 Routes Banch office netoking equiements ae amatically evolving, iven by eb an e- commece applications to enhance pouctivity an meging the voice an ata infastuctue to euce costs. The Cisco 3825 an 3845 outes povie a scalable, secue, manageable emote access seve that meets FIPS 140-2 Level 2 equiements. This section escibes the geneal featues an functionality povie by the outes. The folloing subsections escibe the physical chaacteistics of the outes. 2.1 The 3825 Cyptogaphic Moule Physical Chaacteistics Figue 1 The 3825 oute case The 3825 Route is a multiple-chip stanalone cyptogaphic moule. The oute has a pocessing spee of 500MHz. Depening on configuation, eithe the installe AIM-VPN/SSL-3 moule, the onboa Safenet chip o the IOS softae is use fo cyptogaphic opeations. The cyptogaphic bounay of the moule is the evice s case. All of the functionality iscusse in this ocument is povie by components ithin this cyptogaphic bounay. The inteface fo the oute is locate on the ea an font panels as shon in Figue 2 an Figue 3, espectively. Figue 2 3825 Rea Panel Physical Intefaces Copyight 2007 Cisco Systems, Inc. 5 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Figue 3 3825 Font Panel Physical Intefaces The Cisco 3825 oute featues a console pot, auxiliay pot, ual Univesal Seial Bus (USB) pots, fou high-spee WAN inteface ca (HWIC) slots, to10/100/1000 Gigabit Ethenet RJ45 pots, to Enhance Netok Moule (ENM) slots, small fom facto pluggable (SFP), eunant poe supply (RPS) inlet, poe inlet, an Compact Flash (CF) ive. The 3825 oute has slots fo AIM-VPN/SSL-3 cas 1, an to Ethenet connections. Figue 2 shos the ea panel an Figue 3 shos the font panel. The font panel consists of 12 LEDs: CF LED, SYS LED, ACT LED, SYS PWR LED, RPS LED, AUX PWR LED, AIM0 LED, AIM1 LED, PVDM0 LED, PVDM1 LED, PVDM2 LED, an PVDM3 LED. The back panel contains LEDs to inicate the status of the GE pots. The font panel contains the folloing: LEDs Poe sitch Poe input CF ive USB pots The ea panel contains the folloing: HWIC/WIC/VIC slots 0 an 1 Console pot Auxiliay pot GE pots ENM Pots SFP Pot The folloing tables povie moe etaile infomation conveye by the LEDs on the font an ea panel of the oute: 1 The secuity policy coves the configuation in hich one AIM ca is use. Copyight 2007 Cisco Systems, Inc. 6 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Name State Desciption System Soli Geen Blinking Geen Ambe System Poe Auxiliay Poe Reunant Poe Supply Activity Compact Flash PVDM3 PVDM2 PVDM1 PVDM0 AIM1 AIM0 Geen Ambe Geen Ambe Geen Geen Soli Geen Blinking Geen Geen Ambe Geen Ambe Geen Ambe Geen Ambe Geen Ambe Geen Ambe Nomal System Opeation. Booting o in ROM monito (ROMMON) moe. Poee, but malfunctionaing. Route is not eceiving poe. Poe supply pesent an enable. Poe supply pesent an off o ith failue. Poe supply not pesent. Inicates IP phone poe supply pesent. Inicates IP phone poe supply pesent. IP phone poe supply not pesent. System unning on RPS PSU. System unning on pimay PSU. Soli o blinking inicates packet activity. No inteupts o packet tansfe occuing. Compact Flash pesent an enable. Compact Flash accesse. Compact Flash not pesent. PVDM3 installe an initialize. PVDM3 installe an initialize eo. PVDM3 not installe. PVDM2 installe an initialize. PVDM2 installe an initialize eo. PVDM2 not installe. PVDM1 installe an initialize. PVDM1 installe an initialize eo. PVDM1 not installe. PVDM0 installe an initialize. PVDM0 installe an initialize eo. PVDM0 not installe. AIM1 pesent an enable. AIM1 pesent ith failue. AIM1 not installe. AIM0 pesent an enable. AIM0 pesent ith failue. AIM0 not installe. Table 1 Cisco 3825 Font Panel Inicatos Name State Desciption Spee Geen (Blinking) Blinking fequency inicates pot spee. Link Soli Geen Ethenet link is establishe No link establishe Table 2 Cisco 3825 Rea Panel Inicatos The folloing table escibes the meaning of Ethenet LEDs on the ea panel: Name State Desciption Duplex Soli Geen Full-Duplex Half-Duplex Copyight 2007 Cisco Systems, Inc. 7 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Spee Link Soli Geen Soli Geen 100 Mbps 10 Mbps Ethenet link is establishe No link establishe Table 3 Cisco 3825 Ethenet Inicatos The physical intefaces ae sepaate into the logical intefaces fom FIPS 140-2 as escibe in the folloing table: Route Physical Inteface 10/100/1000 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slots SFP USB Pots 10/100/1000 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slots SFP USB Pots 10/100/1000 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slots SFP 10/100/1000 Ethenet LAN LEDs SFP LED AIM LEDs PVDM LEDs Poe LED System Activity LED System LED Compact Flash LED Auxiliay Poe LED RPS LED Console Pot Auxiliay Pot USB Pots Poe Plug Reunant Poe Supply Plug FIPS 140-2 Logical Inteface Data Input Inteface Data Output Inteface Contol Input Inteface Status Output Inteface Poe Inteface Table 4 Cisco 3825 FIPS 140-2 Logical Intefaces The CF ca that stoe the IOS image is consiee an intenal memoy moule, because the IOS image stoe in the ca may not be moifie o upgae. The ca itself must neve be emove fom the ive. Tampe evient seal ill be place ove the ca in the ive. Copyight 2007 Cisco Systems, Inc. 8 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
2.2 The Cisco 3845 Cyptogaphic Moule Physical Chaacteistics Figue 4 The 3845 oute case The 3845 oute ith on-boa cypto enable is a multiple-chip stanalone cyptogaphic moule. The oute has a pocessing spee of 650MHz. Depening on configuation, eithe the installe AIM-VPN/SSL-3 moule, the onboa Safenet chip o the IOS softae is use fo cyptogaphic opeations. The cyptogaphic bounay of the moule is the evice s case. All of the functionality iscusse in this ocument is povie by components ithin this cyptogaphic bounay. The intefaces fo the oute ae locate on the font an ea panel as shon in Figue 4 an Figue 5, espectively. Figue 5 Cisco 3845 Font Panel Physical Intefaces Copyight 2007 Cisco Systems, Inc. 9 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Figue 6 Cisco 3845 Rea Panel Physical Intefaces The Cisco 3845 oute featues a console pot, auxiliay pot, ual Univesal Seial Bus (USB) pots, fou high-spee WAN inteface ca (HWIC) slots, to10/100/1000 Gigabit Ethenet RJ45 pots, fou Enhance Netok Moule (ENM) slots, small fom facto pluggable (SFP), poe inlets, an Compact Flash (CF) ive. The 3845 oute has slots fo AIM-VPN/SSL-3 cas 2, an to Ethenet connections. The Figue 4 shos the font panel an Figue 5 shos the ea panel. The font panel consists of 7 LEDs: CF LED, PVDM0 LED, PVDM1 LED, PVDM2 LED, PVDM3 LED, AIM0 LED, an AIM1 LED. The back panel consists of 6 LEDs: SYS LED, ACT LED, SYS PWR1 LED, AUX PWR1 LED, SYS PWR2 LED, an AUX PWR2 LED. The font panel contains the folloing: LEDs Poe sitch Poe input The ea panel contains the folloing: CF ive USB pots Console an Auxiliay pots HWIC pots LEDs HWIC pots GE pots SFP pot ENM slots 2 The secuity policy coves the configuation in hich one AIM ca is use. Copyight 2007 Cisco Systems, Inc. 10 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
The folloing tables povie moe etaile infomation conveye by the LEDs on the font an ea panel of the oute: Name State Desciption System Soli Geen Blinking Geen Ambe System Poe1 Auxiliay Poe1 System Poe2 Auxiliay Poe2 Activity Compact Flash PVDM3 PVDM2 PVDM1 PVDM0 AIM1 AIM0 Geen Ambe Geen Ambe Geen Ambe Geen Ambe Geen Soli Geen Blinking Geen Geen Ambe Geen Ambe Geen Ambe Geen Ambe Geen Ambe Geen Ambe Nomal System Opeation. Booting o in ROM monito (ROMMON) moe. Poee, but malfunctionaing. Route is not eceiving poe. Poe1 supply pesent an enable. Poe1 supply pesent an off o ith failue. Poe1 supply not pesent. Inicates IP phone poe1 supply pesent. Inicates IP phone poe1 supply pesent. IP phone poe1 supply not pesent. Poe2 supply pesent an enable. Poe2 supply pesent an off o ith failue. Poe2 supply not pesent. Inicates IP phone poe2 supply pesent. Inicates IP phone poe2 supply pesent. IP phone poe2 supply not pesent. Soli o blinking inicates packet activity. No inteupts o packet tansfe occuing. Compact Flash pesent an enable. Compact Flash accesse. Compact Flash not pesent. PVDM3 installe an initialize. PVDM3 installe an initialize eo. PVDM3 not installe. PVDM2 installe an initialize. PVDM2 installe an initialize eo. PVDM2 not installe. PVDM1 installe an initialize. PVDM1 installe an initialize eo. PVDM1 not installe. PVDM0 installe an initialize. PVDM0 installe an initialize eo. PVDM0 not installe. AIM1 pesent an enable. AIM1 pesent ith failue. AIM1 not installe. AIM0 pesent an enable. AIM0 pesent ith failue. AIM0 not installe. Table 5 Cisco 3845 Font Panel Inicatos The folloing table escibes the meaning of Ethenet LEDs on the font panel: Name State Desciption Spee One Blinking Geen To Blinking Geen 10 Mbps 100 Mbps Thee Blinking Geen 1000Mbps Copyight 2007 Cisco Systems, Inc. 11 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Link SFP Soli Geen Soli Geen Ethenet link is establishe No link establishe SFP fibe link is establishe No link establishe Table 6 Cisco 3845 Ethenet Inicatos The physical intefaces ae sepaate into the logical intefaces fom FIPS 140-2 as escibe in the folloing table: Route Physical Inteface 10/100/1000 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slots SFP USB Pots 10/100/1000 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slots SFP USB Pots 10/100/1000 Ethenet LAN Pots HWIC Pots Console Pot Auxiliay Pot ENM Slots SFP 10/100/1000 Ethenet LAN LEDs SFP LED AIM LEDs PVDM LEDs System Poe LEDs System Activity LED System LED Compact Flash LED Auxiliay Poe LEDs Console Pot Auxiliay Pot USB Pots Poe Plug FIPS 140-2 Logical Inteface Data Input Inteface Data Output Inteface Contol Input Inteface Status Output Inteface Poe Inteface Table 7 Cisco 3845 FIPS 140-2 Logical Intefaces The CF ca that stoe the IOS image is consiee an intenal memoy moule. The eason is the IOS image stoe in the ca cannot be moifie o upgae. The ca itself must neve be emove fom the ive. Tampe evient seal ill be place ove the ca in the ive. Copyight 2007 Cisco Systems, Inc. 12 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
2.3 Roles an Sevices Authentication in Cisco 3825 an 3845 is ole-base. Thee ae to main oles in the oute that opeatos can assume: the Cypto ice ole an the Use ole. The aministato of the oute assumes the Cypto ice ole in oe to configue an maintain the oute using Cypto ice sevices, hile the Uses execise only the basic Use sevices. The moule suppots RADIUS an TACACS+ fo authentication. A complete esciption of all the management an configuation capabilities of the oute can be foun in the Pefoming Basic System Management manual an in the online help fo the oute. 2.3.1. Use Sevices Uses ente the system by accessing the console pot ith a teminal pogam o IPSec potecte telnet o SSH session to a LAN pot. The IOS pompts the Use fo usename an passo. If the passo is coect, the Use is alloe enty to the IOS executive pogam. The sevices available to the Use ole consist of the folloing: Status Functions Netok Functions Teminal Functions Diectoy Sevices SSL-TLS/VPN EASY VPN Vie state of intefaces an potocols, vesion of IOS cuently unning. Connect to othe netok evices though outgoing telnet, PPP, etc. an initiate iagnostic netok sevices (i.e., ping, mtace). Ajust the teminal session (e.g., lock the teminal, ajust flo contol). Display iectoy of files kept in flash memoy. Negotiation an encypte ata tanspot via SSL/TLS. Negotiation an encypte ata tanspot via EASY VPN. 2.3.2 Cypto ice Sevices Duing initial configuation of the oute, the Cypto ice passo (the enable passo) is efine. A Cypto ice can assign pemission to access the Cypto ice ole to aitional accounts, theeby ceating aitional Cypto ices. The Cypto ice ole is esponsible fo the configuation an maintenance of the oute. The Cypto ice sevices consist of the folloing: Configue the oute Define netok intefaces an settings, ceate comman aliases, set the potocols the oute ill suppot, enable intefaces an netok sevices, set system ate an time, an loa authentication infomation. Copyight 2007 Cisco Systems, Inc. 13 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Define Rules an Filtes Ceate packet Filtes that ae applie to Use ata steams on each inteface. Each Filte consists of a set of Rules, hich efine a set of packets to pemit o eny base on chaacteistics such as potocol ID, aesses, pots, TCP connection establishment, o packet iection. Vie Status Functions Vie the oute configuation, outing tables, active sessions, use gets to vie SNMP MIB statistics, health, tempeatue, memoy status, voltage, packet statistics, evie accounting logs, an vie physical inteface status. Manage the oute Log off uses, shuton o eloa the oute, ease the flash memoy, manually back up oute configuations, vie complete configuations, manage use ights, an estoe oute configuations. Set Encyption/Bypass Set up the configuation tables fo IP tunneling. Set peshae keys an algoithms to be use fo each IP ange o allo plaintext packets to be set fom specifie IP aess. Bypass Moe The outes implement an altenating bypass capability, in hich some connections may be cyptogaphically authenticate an encypte hile othes may not. To inepenent intenal actions ae equie in oe to tansition into each bypass state: Fist, the bypass state must be configue by the Cypto ice using match aess <ACL-name>" sub-comman une cypto map hich efines hat taffic is encypte. Secon, the moule must eceive a packet that is estine fo an IP that is not configue to eceive encypte ata. The configuation table uses an eo etection coe to etect integity failues, an if an integity eo is etecte, the moule ill ente an eo state in hich no packets ae oute. Theefoe, a single eo in the configuation table cannot cause plaintext to be tansmitte to an IP aess fo hich it shoul be encypte. 2.3.3 Unauthenticate Sevices The sevices available to unauthenticate uses ae: Vieing the status output fom the moule s LEDs Poeing the moule on an off using the poe sitch Sening packets in bypass 2.3.4 Stength of Authentication The secuity policy stipulates that all use passos must be 8 alphanumeic chaactes, so the passo space is 2.8 tillion possible passos. The possibility of anomly guessing a passo is thus fa less than one in one million. To excee a one in 100,000 pobability of a successful anom passo guess in one minute, an attacke oul have to be capable of 28 million passo attempts pe minute, hich fa excees the opeational capabilities of the moule to suppot. Copyight 2007 Cisco Systems, Inc. 14 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
When using RSA base authentication, RSA key pai has moulus size of 1024 bit to 2048 bit, thus poviing beteen 80 bits an 112 bits of stength. Assuming the lo en of that ange, an attacke oul have a 1 in 280 chance of anomly obtaining the key, hich is much stonge than the one in a million chance equie by FIPS 140-2. To excee a one in 100,000 pobability of a successful anom key guess in one minute, an attacke oul have to be capable of appoximately 1.8x1021 attempts pe minute, hich fa excees the opeational capabilities of the moules to suppot. When using peshae key base authentication, the secuity policy stipulates that all peshae keys must be 8 alphanumeic chaactes, so the key space is 2.8 tillion possible combinations. The possibility of anomly guessing this is thus fa less than one in one million. To excee a one in 100,000 pobability of a successful anom guess in one minute, an attacke oul have to be capable of 28 million attempts pe minute, hich fa excees the opeational capabilities of the moule to suppot. 2.4 Physical Secuity The oute is entiely encase by a metal, opaque case. The ea of the unit contains auxiliay pot, console pot, Gigabit Ethenet pots, HWIC pots, an ENM slots. The font of the unit contains USB connectos, CF ive, poe inlets, poe sitch, an LEDs. The top, sie, an font potion of the chassis can be emove to allo access to the motheboa, memoy, AIM slots, an expansion slots. The Cisco 3825 an Cisco 3845 outes equie that a special opacity shiel be installe ove the sie ai vents in oe to opeate in FIPS-appove moe. The shiel eceases the suface aea of the vent holes, eucing visibility ithin the cyptogaphic bounay to FIPS-appove specifications. Install the opacity plates as specifie in the pictues belo: Copyight 2007 Cisco Systems, Inc. 15 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Figue 7 3825 Opacity Shiel Placement Figue 8 3845 Opacity Shiel Placement Once the oute has been configue in to meet FIPS 140-2 Level 2 equiements, the oute cannot be accesse ithout signs of tampeing. To seal the system, apply seialize tampeevience labels as follos: Fo Cisco 3825: 1. Clean the cove of any gease, it, o oil befoe applying the tampe evience labels. Alcohol-base cleaning pas ae ecommene fo this pupose. The tempeatue of the oute shoul be above 10 C. 2. Tampe evience label A shall be place so that one half of the label coves the top of the font panel an the othe half coves the enclosue. 3. Tampe evience label B shall be place so that one half of the label coves the bottom of the font panel an the CF ca an the othe half coves the enclosue. 4. Tampe evience labels C an D shoul be place so that the one half of the label coves the enclosue an the othe half coves the left an ight uppe ENM slots. 5. Tampe evience label E shoul be place so that the one half of the label coves the loe ight ENM slot an the othe half coves the enclosue. 6. Tampe evience label F shoul be place so that the one half of the label coves the left uppe an loe HWIC slots an the othe half coves the enclosue. 7. Tampe evience label G shoul be place so that the one half of the label coves the ight uppe an loe HWIC slots an the othe half coves the enclosue. Copyight 2007 Cisco Systems, Inc. 16 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
8. Tampe evience labels H an I shoul be place on the top an bottom of the opacity shiel such that the one half of each label coves opacity shiel an the othe half coves the enclosue. 9. The labels completely cue ithin five minutes. Figues 9, 10 an 11 sho the tampe evience label placements fo the 3825. Note that each iagam only shos cetain label placement locations. Figue 9 3825 Tampe Evient Label Placement (Font Vie) Figue 10 3825 Tampe Evient Label Placement (Back Vie) Figue 11-3825 Tampe Evient Label Placement (Sie Vie) Fo Cisco 3845: Copyight 2007 Cisco Systems, Inc. 17 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
1. Clean the cove of any gease, it, o oil befoe applying the tampe evience labels. Alcohol-base cleaning pas ae ecommene fo this pupose. The tempeatue of the oute shoul be above 10 C. 2. Tampe evience labels A an B shoul be place so that one half of the label coves the font panel an the othe half coves the enclosue. 3. Tampe evience label C shoul be place so that one half of the label coves the left uppe an loe ENM moules an the othe half coves the enclosue. 4. Tampe evience labels D an E shoul be place so that one half of each label coves the sie of ight ENM moules an the othe half coves the enclosue. 5. Tampe evience labels F, G, H an I shoul be place so that one half of each label coves the top sie of HWIC moules an the othe half coves the enclosue. 6. Tampe evience label J shoul be place ove the CF slot. 7. Tampe evience labels K, L, M an N shoul be place on each of the opacity shiels so that one half of each label coves the opacity shiel an the othe half coves the enclosue. 8. The labels completely cue ithin five minutes. Figues 12, 13 an 14 sho the tampe evience label placements fo the 3845. Figue 12 Cisco 3845 Tampe Evient Label Placement (Font Vie) Figue 13 Cisco 3845 Tampe Evient Label Placement (Back Vie) Copyight 2007 Cisco Systems, Inc. 18 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Figue 14 - Cisco 3845 Tampe Evient Label Placement (Sie Vies) The tampe evience seals ae pouce fom a special thin gauge vinyl ith self-ahesive backing. Any attempt to open the oute ill amage the tampe evience seals o the mateial of the moule cove. Since the tampe evience seals have non-epeate seial numbes, they can be inspecte fo amage an compae against the applie seial numbes to veify that the moule has not been tampee. Tampe evience seals can also be inspecte fo signs of tampeing, hich inclue the folloing: cule cones, bubbling, cinkling, ips, teas, an slices. The o OPEN may appea if the label as peele back. 2.5 Cyptogaphic Key Management The oute secuely aministes both cyptogaphic keys an othe citical secuity paametes such as passos. The tampe evience seals povie physical potection fo all keys. All keys ae also potecte by the passo-potection on the Cypto ice ole login, an can be zeoize by the Cypto ice. All zeoization consists of oveiting the memoy that stoe the key. Keys ae exchange an entee electonically o via Intenet Key Exchange (IKE) o SSL/TLS hanshake potocols. The outes suppot the folloing FIPS-2 appove algoithm implementations: Algoithm Algoithm Cetificate Numbe Softae (IOS) Implementations Copyight 2007 Cisco Systems, Inc. 19 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
AES 795 Tiple-DES 683 SHA-1, SHA-256, SHA-512 794 HMAC-SHA-1 436 X9.31 PRNG 456 RSA 379 Onboa Safenet Implementations AES 96 Tiple-DES 210 SHA-1 317 HMAC-SHA-1 50 AIM Moule Implementations AES 173 Tiple-DES 275 SHA-1 258 HMAC-SHA-1 39 X9.31 PRNG 83 RSA 382 The oute is in the appove moe of opeation only hen FIPS 140-2 appove algoithms ae use (except DH an RSA key tanspot hich ae alloe in the appove moe fo key establishment espite being non-appove). Note: The moule suppots DH key sizes of 1024 an 1536 bits an RSA key sizes of 1024, 1536 an 2048 bits. Theefoe, the Diffie Hellmann Key ageement, key establishment methoology povies beteen 80-bits an 96-bits of encyption stength pe NIST 800-57. RSA Key apping, key establishment methoology povies beteen 80-bits an 112-bits of encyption stength pe NIST 800-57. The folloing ae not FIPS 140-2 appove Algoithms: DES, RC4, MD5, HMAC-MD5, RSA key apping an DH; hoeve again DH an RSA ae alloe fo use in key establishment. The moule contains a HiFn 7855 cyptogaphic acceleato chip, integate in the AIM ca. Unless the AIM ca is isable by the Cypto ice ith the no cypto engine aim comman, the HiFn 7855 povies AES (128-bit, 192-bit, an 256-bit), an Tiple-DES (168-bit) encyption/ecyption; MD5 an SHA-1 hashing; an haae suppot fo DH, X9.31 PRNG, RSA encyption/ecyption, an RSA signatue/veification. The moule suppots to types of key management schemes: 1. Pe-shae key exchange via electonic key enty. Tiple-DES/AES key an HMAC- SHA-1 key ae exchange an entee electonically. 2. Intenet Key Exchange metho ith suppot fo pe-shae keys exchange an entee electonically. The pe-shae keys ae use ith Diffie-Hellman key ageement technique to eive Tiple-DES o AES keys. The pe-shae key is also use to eive HMAC-SHA-1 key. Copyight 2007 Cisco Systems, Inc. 20 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
3. RSA igital signatues base authentication is use fo IKE, ith Diffie-Hellman Key ageement technique to eive AES o Tiple-DES keys. 4. RSA encypte nonces base authentication is use fo IKE, ith Diffie-Hellman Key ageement technique to eive AES o Tiple-DES keys. 5. RSA key tanspot is use to eive the Tiple-DES o AES keys uing SSLv3.1/TLS hanshake. The moule suppots commecially available Diffie-Hellman an RSA key tanspot fo key establishment. All pe-shae keys ae associate ith the CO ole that ceate the keys, an the CO ole is potecte by a passo. Theefoe, the CO passo is associate ith all the pe-shae keys. The Cypto ice nees to be authenticate to stoe keys. All Diffie-Hellman (DH) keys agee upon fo iniviual tunnels ae iectly associate ith that specific tunnel only via the IKE potocol. RSA Public keys ae entee into the moules using igital cetificates hich contain elevant ata such as the name of the public key's one, hich associates the key ith the coect entity. All othe keys ae associate ith the use/ole that entee them. Key Zeoization: Each key can be zeoize by sening the no comman pio to the key function commans. This ill zeoize each key fom the, the unning configuation. Clea Cypto IPSec SA ill zeoize the IPSec Tiple-DES/AES session key (hich is eive using the Diffie-Hellman key ageement technique) fom the. This session key is only available in the ; theefoe this comman ill completely zeoize this key. The folloing comman ill zeoize the pe-shae keys fom the : no set session-key inboun ah spi hex-key-ata no set session-key outboun ah spi hex-key-ata no set session-key inboun esp spi ciphe hex-key-ata [authenticato hex-key-ata] no set session-key outboun esp spi ciphe hex-key-ata [authenticato hex-key-ata] no cypto isakmp key The unning configuation must be copie to the stat-up configuation in NVRAM in oe to completely zeoize the keys. The RSA keys ae zeoize by issuing the CLI comman cypto key zeoize sa". All SSL/TLS session keys ae zeoize automatically at the en of the SSL/TLS session. The moule suppots the folloing keys an citical secuity paametes (CSPs). Key/CSP Name Algoithm Desciption Stoage Location Zeoization Metho Copyight 2007 Cisco Systems, Inc. 21 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
PRNG See X9.31 This is the see fo X9.31 PRNG. This CSP is stoe in an upate peioically afte the geneation of 400 bytes afte this it is eseee ith oute-eive entopy; hence, it is zeoize peioically. Also, the opeato can tun off the oute to zeoize this CSP. PRNG See Key X9.31 This is the sse key fo X9.31 PRNG. Automatically evey 400 bytes, o tun off the oute. Tun off the oute. Diffie Hellman pivate exponent Diffie Hellman public key DH DH The pivate exponent use in Diffie-Hellman (DH) exchange as pat of IKE. Zeoize afte DH shae secet has been geneate. The public key use in Diffie- Hellman (DH) exchange as pat of IKE. Zeoize afte the DH shae secet has been geneate. skeyi Keye SHA-1 Value eive fom the shae secet ithin IKE exchange. Zeoize hen IKE session is teminate. skeyi_ Keye SHA-1 The IKE key eivation key fo non ISAKMP secuity associations. skeyi_a HMAC-SHA-1 The ISAKMP secuity association authentication key. Automatically afte shae secet geneate. Automatically afte shae secet geneate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. Automatically afte IKE session teminate. skeyi_e TRIPLE- DES/AES The ISAKMP secuity association encyption key. Automatically afte IKE session teminate. IKE session encypt key TRIPLE- DES/AES The IKE session encypt key. Automatically afte IKE session teminate. IKE session authentication key ISAKMP peshae HMAC-SHA-1 Shae secet The IKE session authentication key. The key use to geneate IKE skeyi uing peshae-key authentication. no cypto isakmp key comman zeoizes it. This key can have to foms base on hethe the key is elate to the hostname o the IP aess. IKE hash key HMAC-SHA-1 This key geneates the IKE shae secet keys. This key is zeoize afte geneating those keys. IKE RSA Authentication pivate Key RSA RSA pivate key fo IKE authentication. Geneate o entee like any RSA key, set as IKE RSA Authentication Key ith the cypto keying o ca tustpoint comman. NVRAM NVRAM Copyight 2007 Cisco Systems, Inc. 22 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice. Automatically afte IKE session teminate. # no cypto isakmp key Automatically afte geneating IKE shae secet keys. # cypto key zeoize sa"
IKE RSA Authentication Public Key IKE RSA Encypte Nonce Pivate Key IKE RSA Encypte Nonce Public Key IPSec encyption key IPSec authentication key Configuation encyption key Route authentication key 1 PPP authentication key Route authentication key 2 SSH session key RSA RSA RSA DES/TRIPLE- DES/AES HMAC-SHA-1 AES Shae secet RFC 1334 Shae Secet Vaious symmetic RSA public key fo IKE authentication. Geneate o entee like any RSA key, set as IKE RSA Authentication Key ith the cypto keying o ca tustpoint comman. RSA pivate key fo IKE encypte nonces. Geneate like any RSA, ith the usage-keys paamete inclue. RSA public key fo IKE encypte nonces. Geneate like any RSA, ith the usage-keys paamete inclue. The IPSec encyption key. Zeoize hen IPSec session is teminate. The IPSec authentication key. The zeoization is the same as above. The key use to encypt values of the configuation file. This key is zeoize hen the no key configkey is issue. Note that this comman oes not ecypt the configuation file, so zeoize ith cae. This key is use by the oute to authenticate itself to the pee. The oute itself gets the passo (that is use as this key) fom the AAA seve an sens it onto the pee. The passo etieve fom the AAA seve is zeoize upon completion of the authentication attempt. The authentication key use in PPP. This key is in the an not zeoize at untime. One can tun off the oute to zeoize this key because it is stoe in. This key is use by the oute to authenticate itself to the pee. The key is ientical to Route authentication key 1 except that it is etieve fom the local atabase (on the oute itself). Issuing the no usename passo zeoizes the passo (that is use as this key) fom the local atabase. This is the SSH session key. It is zeoize hen the SSH session is teminate. NVRAM NVRAM NVRAM NVRAM NVRAM # cypto key zeoize sa" # cypto key zeoize sa" # cypto key zeoize sa" # Clea Cypto IPSec SA # Clea Cypto IPSec SA # no key config-key Automatically upon completion of authentication attempt. Tun off the oute. # no usename passo Automatically hen SSH session teminate Copyight 2007 Cisco Systems, Inc. 23 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Use passo Shae Secet The passo of the Use ole. This passo is zeoize by oveiting it ith a ne passo. Enable passo Shae Secet The plaintext passo of the CO ole. This passo is zeoize by oveiting it ith a ne passo. Enable secet Shae Secet The ciphetext passo of the CO ole. Hoeve, the algoithm use to encypt this passo is not FIPS appove. Theefoe, this passo is consiee plaintext fo FIPS puposes. This passo is zeoize by oveiting it ith a ne passo. RADIUS secet secet_1_0_0 TACACS+ secet TLS seve pivate key TLS seve public key TLS pemaste secet TLS Encyption Key TLS Integity Key Shae Secet Shae Secet RSA RSA Shae Secet AES/TRIPLE- DES HMAC-SHA-1 The RADIUS shae secet. This shae secet is zeoize by executing the no aius-seve key comman. The fixe key use in Cisco veno ID geneation. This key is embee in the moule binay image an can be elete by easing the Flash. The TACACS+ shae secet. This shae secet is zeoize by executing the no tacacs-seve key comman. 1024/1536/2048 bit RSA pivate key use fo SSLV3.1/TLS. 1024/1536/2048 bit RSA public key use fo SSLV3.1/TLS. Shae Secet ceate using asymmetic cyptogaphy fom hich ne TLS session keys can be ceate Key use to encypt TLS session ata HMAC-SHA-1 use fo TLS ata integity potection Table 8 - Cyptogaphic Keys an CSPs NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM NVRAM Oveite ith ne passo Oveite ith ne passo Oveite ith ne passo # no aius-seve key Delete by easing the Flash. # no tacacs-seve key # cypto key zeoize sa" # cypto key zeoize sa" Automatically hen TLS session is teminate Automatically hen TLS session is teminate Automatically hen TLS session is teminate Copyight 2007 Cisco Systems, Inc. 24 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
SRDI/Role/Sevice Access Policy ( = ea, = ite, = elete) Roles/Sevice Secuity Relevant Data Item PRNG See PRNG See Key Diffie Hellman pivate exponent Diffie Hellman public key skeyi skeyi_ skeyi_a skeyi_e IKE session encypt key IKE session authentication key ISAKMP peshae IKE hash key IKE RSA Authentication pivate Key Use Role Status Functions Netok Functions Teminal Functions Diectoy Sevices SSL-TLS/VPN EASY VPN Cypto ice Role Configue the Route Define Rules an Filtes Status Functions Manage the Route Set Encyption/Bypass Change WAN Inteface Cas Copyight 2007 Cisco Systems, Inc. 25 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
IKE RSA Authentication Public Key IKE RSA Encypte Nonce Pivate Key IKE RSA Encypte Nonce Public Key IPSec encyption key IPSec authentication key Configuation encyption key Route authentication key 1 PPP authentication key Route authentication key 2 SSH session key Use passo Enable passo Enable secet RADIUS secet secet_1_0_0 TACACS+ secet TLS seve pivate key TLS seve public key Copyight 2007 Cisco Systems, Inc. 26 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
TLS pe-maste secet TLS Encyption Key TLS Integity Key Table 9 Role an Sevice Access to CSP Copyight 2007 Cisco Systems, Inc. 27 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
2.6 Self-Tests In oe to pevent any secue ata fom being elease, it is impotant to test the cyptogaphic components of a secuity moule to insue all components ae functioning coectly. The oute inclues an aay of self-tests that ae un uing statup an peioically uing opeations. All self-tests ae implemente by the softae. An example of self-tests un at poe-up is a cyptogaphic knon anse test (KAT) on each of the FIPS-appove cyptogaphic algoithms an on the Diffie-Hellman algoithm. Examples of tests un peioically o conitionally inclue: a bypass moe test pefome conitionally pio to executing IPSec, an a continuous anom numbe geneato test. If any of the self-tests fail, the oute tansitions into an eo state. In the eo state, all secue ata tansmission is halte an the oute outputs status infomation inicating the failue. Examples of the eos that cause the system to tansition to an eo state: IOS image integity checksum faile Micopocesso oveheats an buns out Knon anse test faile NVRAM moule malfunction. Tempeatue high aning 2.6.1 Self-tests pefome by the IOS image IOS Self Tests o POST tests AES Knon Anse Test RSA Signatue Knon Anse Test (both signatue/veification) Softae/fimae test Poe up bypass test RNG Knon Anse Test Diffie Hellman test HMAC-SHA-1 Knon Anse Test SHA-1/256/512 Knon Anse Test Tiple-DES Knon Anse Test o Conitional tests Paiise consistency test fo RSA signatue keys Conitional bypass test Continuous anom numbe geneation test fo appove an nonappove RNGs 2.6.2 Self-tests pefome by Safenet Safenet Self Tests o POST tests AES Knon Anse Test Copyight 2007 Cisco Systems, Inc. 28 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
Tiple-DES Knon Anse Test HMAC-SHA-1 Knon Anse Test SHA-1 Knon Anse Test 2.6.3 Self-tests pefome by AIM AIM Self Tests o POST tests AES Knon Anse Test Tiple-DES Knon Anse Test SHA-1 Knon Anse Test HMAC-SHA-1 Knon Anse Test RNG Knon Anse Test Fimae integity test Diffie Hellman Test RSA signatue gen/ve knon anse test o Conitional Tests Paiise consistency test fo RSA signatue keys Continuous RNG test fo the haae RNG Copyight 2007 Cisco Systems, Inc. 29 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
3 Secue Opeation of the Cisco 3825 o 3845 oute The Cisco 3825 an 3845 outes meet all the Level 2 equiements fo FIPS 140-2. Follo the instuctions povie belo to place the moule in FIPS-appove moe. Opeating this oute ithout maintaining the folloing settings ill emove the moule fom the FIPS appove moe of opeation. 3.1 Initial Setup 1. The Cypto ice must apply tampe evience labels as escibe in Section 2.4 of this ocument. 2. The Cypto ice must isable IOS Passo Recovey by executing the folloing commans: configue teminal no sevice passo-ecovey en sho vesion NOTE: Once Passo Recovey is isable, aministative access to the moule ithout the passo ill not be possible. 3.2 System Initialization an Configuation 1. The Cypto ice must pefom the initial configuation. IOS vesion IOS 12.4 (15) T3, Avance Secuity buil (avsecuity) is the only alloable image; no othe image shoul be loae. 2. The value of the boot fiel must be 0x0102. This setting isables beak fom the console to the ROM monito an automatically boots the IOS image. Fom the configue teminal comman line, the Cypto ice entes the folloing syntax: config-egiste 0x0102 3. The Cypto ice must ceate the enable passo fo the Cypto ice ole. The passo must be at least 8 chaactes to inclue at least one numbe an one lette an is entee hen the Cypto ice fist engages the enable comman. The Cypto ice entes the folloing syntax at the # pompt: enable secet [PASSWORD] 4. The Cypto ice must alays assign passos (of at least 8 chaactes) to uses. Ientification an authentication on the console pot is equie fo Uses. Fom the configue teminal comman line, the Cypto ice entes the folloing syntax: line con 0 passo [PASSWORD] login local 5. RADIUS an TACACS+ shae secet key sizes must be at least 8 chaactes long, an Copyight 2007 Cisco Systems, Inc. 30 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
must inclue at least one numbe an one lette. 3.3 IPSec Requiements an Cyptogaphic Algoithms 1. The only type of key management that is alloe in FIPS moe is Intenet Key Exchange (IKE). 2. Although the IOS implementation of IKE allos a numbe of algoithms, only the folloing algoithms ae alloe in a FIPS 140-2 configuation: ah-sha-hmac esp-sha-hmac esp-tiple-des esp-aes 3. The folloing algoithms ae not FIPS appove an shoul not be use uing FIPSappove moe: DES MD-5 fo signing MD-5 HMAC 3.4 SSLv3.1/TLS Requiements an Cyptogaphic Algoithms When negotiating SSLv3.1/TLS ciphe suites, only FIPS appove algoithms must be specifie. All othe vesions of SSL except vesion 3.1 must not be use in FIPS moe of opeation. The folloing algoithms ae not FIPS appove an shoul not be use in the FIPSappove moe: MD5 RC4 RC2 DES 3.5 Potocols 1. SNMP v3 ove a secue IPSec tunnel may be employe fo authenticate, secue SNMP gets an sets. Since SNMP v2c uses community stings fo authentication, only gets ae alloe une SNMP v2c. 3.6 Remote Access 1. Telnet access to the moule is only alloe via a secue IPSec tunnel beteen the emote system an the moule. The Cypto office must configue the moule so that any emote connections via telnet ae secue though IPSec, using FIPS-appove algoithms. Note that all uses must still authenticate afte emote access is gante. Copyight 2007 Cisco Systems, Inc. 31 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
2. SSH access to the moule is only alloe if SSH is configue to use a FIPS-appove algoithm. The Cypto office must configue the moule so that SSH uses only FIPSappove algoithms. Note that all uses must still authenticate afte emote access is gante. Copyight 2007 Cisco Systems, Inc. 32 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.
CISCO EDITOR S NOTE: You may no inclue all stana Cisco infomation inclue in all ocumentation pouce by Cisco. Be sue that the folloing line is in the legal statements at the en of the ocument: By pinting o making a copy of this ocument, the use agees to use this infomation fo pouct evaluation puposes only. Sale of this infomation in hole o in pat is not authoize by Cisco Systems. Copyight 2007 Cisco Systems, Inc. 33 This ocument may be feely epouce an istibute hole an intact incluing this Copyight Notice.