System information
Cisco Cat3K ST    6 June 2012 
50 
TOE SFRs  How the SFR is Met 
FCS_CKM.1(1) 
FCS_COP.1(1) 
The TOE generates RSA key establishment schemes conformant with FIPS 186-
3. RSA keys are used for encryption and decryption of keying material in 
SSHv2 used for remote administration of the TOE. (Refer to FIPS 140-2 
certificate # 1657) 
FCS_CKM.4  The TOE meets all requirements specified in FIPS 140-2 for destruction of keys 
through the module securely administering both cryptographic keys and other 
critical security parameters (CSPs) such as passwords. (Refer to FIPS 140-2 
certificate #1657) 
FCS_CKM.1(2) 
FCS_COP.1(2) 
FCS_COP.1(3) 
AES is used for RADIUS KeyWrap. The TOE provides key generation for AES 
128-bit and 256-bit keys using a Random Number Generator that meets NIST 
SP 800-90 DRBG as specified in FIPS 140-2 Annex C. The TOE provides 
symmetric encryption and decryption capabilities using AES in CBC mode 
(128, 256 bits) as described in FIPS PUB 197, “Advanced Encryption Standard 
(AES)” and NIST SP 800-38A. (Refer to FIPS 140-2 certificate #1657) 
FCS_COP.1(4)  The TOE provides MD5 hashing for authentication of neighbor routers via 
BGPv4, EIGRP, PIM-SMv2, and OSPFv2 with shared passwords. The hash 
mechanism is implemented as specified in MD5 RFC 1321 and applied in 
OSPFv2 (RFC 2328), BGPv4 (RFC 2385), MSDP (RFC 3618) for PIM-SMv2 
(RFC 4601), and EIGRP (Cisco proprietary). 
•  OSPFv2 uses MD5 for authentication of routing updates, as defined in 
appendix D of RFC 2328 (OSPF Version 2). 
•  BGPv4 uses MD5 for authentication of routing updates as defined in RFC 
2385 (Protection of BGP Sessions via the TCP MD5 Signature Option). 
•  MSDP uses MD5 to secure and authenticate control messages for TCP 
connections between two Multicast Source Discovery Protocol (MSDP) 
peers across Protocol-Independent Multicast sparse-mode (PIM-SM) 
domains, as defined in RFC 3618 (Multicast Source Discovery Protocol). 
•  EIGRP (Cisco proprietary) uses MD5 for authentication of routing updates. 
Routing tables for IPv4 and IPv6 can be created and maintained manually using 
static routes configured by the administrator. Use of routing protocols in IPv4 
or IPv6 is not required to support or enforce any TOE security functionality 
including filtering of IPv4 or IPv6 traffic. EIGRP supports MD5-authenticated 
routing updates with IPv6 or IPv4, as does BGPv4 and PIM-SMv2 while 
OSPFv2 routing protocol support MD5-authenticated routing updates for IPv4 
only. 
It is noted that per the FIPS Security Policy, that MD5 is not a validated 
algorithm during FIPS mode of operation. For additional security, it is 
recommended router protocol traffic also be isolated to separate VLANs. 
FCS_SSH_EXT.1  The TOE implements SSHv2 (telnet is disabled in the evaluated configuration). 
SSHv2 sessions are limited to a configurable session timeout period of 120 
seconds, a maximum number of failed authentication attempts limited to 3, and 
will be rekeyed upon request from the SSH client. SSH connections will be 
dropped if the TOE receives a packet larger than 35,000 bytes. The TOE’s 
implementation of SSHv2 supports hashing algorithms hmac-sha1, hmac-sha1-
96 and hmac-md5. The TOE can also be configured to use only one of the 
identified DH groups for key exchange. The available groups include Diffie 
Hellman group 14, group 16, and group 2. 










