Specifications
© Copyright 2007 Cisco Systems, Inc. Page 2 of 26
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Table of Contents
1 INTRODUCTION.................................................................................................................. 3
1.1 P
URPOSE
............................................................................................................................. 3
1.2 R
EFERENCES
....................................................................................................................... 3
1.3
T
ERMINOLOGY
.................................................................................................................... 3
1.4
D
OCUMENT
O
RGANIZATION
................................................................................................ 3
2 CISCO 2851 ROUTERS............................................................................................................ 5
2.1
T
HE
2851
C
RYPTOGRAPHIC
M
ODULE
P
HYSICAL
C
HARACTERISTICS
...................................... 5
2.2
R
OLES AND
S
ERVICES
............................................................................................................. 8
2.2.1. User Services.................................................................................................. 9
2.2.2 Crypto Officer Services .................................................................................... 9
2.2.3 Unauthenticated Services............................................................................... 10
2.2.4 Strength of Authentication .............................................................................. 10
2.3
P
HYSICAL
S
ECURITY
............................................................................................................. 11
2.4
C
RYPTOGRAPHIC
K
EY
M
ANAGEMENT
.................................................................................. 13
2.5
S
ELF
-T
ESTS
....................................................................................................................... 21
2.5.1 Self-tests performed by the IOS image ....................................................... 21
2.5.2 Self-tests performed by AIM........................................................................ 21
2.5.3 Self-tests performed by Safenet.................................................................. 22
3 SECURE OPERATION OF THE CISCO 2851 ROUTER ............................................. 23
3.1
I
NITIAL
S
ETUP
................................................................................................................... 23
3.2
S
YSTEM
I
NITIALIZATION AND
C
ONFIGURATION
................................................................. 23
3.3
IPS
EC
R
EQUIREMENTS AND
C
RYPTOGRAPHIC
A
LGORITHMS
............................................. 24
3.4
P
ROTOCOLS
....................................................................................................................... 24
3.5
SSL
V
3.1/TLS
R
EQUIREMENTS AND
C
RYPTOGRAPHIC
A
LGORITHMS
................................ 24
3.6
R
EMOTE
A
CCESS
............................................................................................................... 25