Specifications
© Copyright 2007 Cisco Systems, Inc. Page 3 of 26
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
1 Introduction
1.1 Purpose
This document is the non-proprietary Cryptographic Module Security Policy for the Cisco 2851
Integrated Services Routers with AIM-VPN/SSL-2 (Router Hardware Version: 2851, Router
Firmware Version: IOS 12.4 (15) T3; AIM-VPN/SSL-2 Hardware Version 1.0, Board Revision
01). This security policy describes how the Cisco 2851 Integrated Services Routers meet the
security requirements of FIPS 140-2, and how to operate the router with on-board crypto enabled
in a secure FIPS 140-2 mode. This policy was prepared as part of the Level 2 FIPS 140-2
validation of the Cisco 2851 Integrated Services router.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security
Requirements for Cryptographic Modules) details the U.S. Government requirements for
cryptographic modules. More information about the FIPS 140-2 standard and validation program
is available on the NIST website at http://csrc.nist.gov/groups/STM/index.html.
1.2 References
This document deals only with operations and capabilities of the 2851 routers with AIM modules
in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is
available on the routers from the following sources:
The Cisco Systems website contains information on the full line of Cisco Systems
routers. Please refer to the following website:
http://www.cisco.com/en/US/products/hw/routers/index.html
For answers to technical or sales related questions please refer to the contacts listed on
the Cisco Systems website at www.cisco.com.
The NIST Validated Modules website
(http://csrc.nist.gov/groups/STM/cmvp/validation.html) contains contact information
for answers to technical or sales-related questions for the module.
1.3 Terminology
In this document, the Cisco 2851 routers are referred to as the router, the module, or the system.
1.4 Document Organization
The Security Policy document is part of the FIPS 140-2 Submission Package. In addition to this
document, the Submission Package contains:
Vendor Evidence document
Finite State Machine
Other supporting documentation as additional references
This document provides an overview of the routers and explains their secure configuration and
operation. This introduction section is followed by Section 2, which details the general features