Cisco 2811 and Cisco 2821 Integrated Services Routers with AIM-VPN/EPII-Plus FIPS 140-2 Non Proprietary Security Policy Level 2 Validation Version 1.6 September 08, 2008 © Copyright 2007 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Table of Contents 1 INTRODUCTION.................................................................................................................. 3 1.1 PURPOSE ............................................................................................................................. 3 1.2 REFERENCES ....................................................................................................................... 3 1.3 TERMINOLOGY .....................................................................
1 Introduction 1.1 Purpose This document is the non-proprietary Cryptographic Module Security Policy for the Cisco 2811 and 2821 Integrated Services Routers with AIM-VPN/EPII-Plus installed. This security policy describes how the Cisco 2811 and 2821 Integrated Services Routers (Hardware Version: 2811 or 2821; Firmware Version: IOS 12.4 (15) T3) meet the security requirements of FIPS 140-2, and how to operate the router enabled in a secure FIPS 140-2 mode.
and functionality of the router. Section 3 specifically addresses the required configuration for the FIPS-mode of operation. With the exception of this Non-Proprietary Security Policy, the FIPS 140-2 Validation Submission Documentation is Cisco-proprietary and is releasable only under appropriate nondisclosure agreements. For access to these documents, please contact Cisco Systems. © Copyright 2007 Cisco Systems, Inc.
2 Cisco 2811 and 2821 Routers Branch office networking requirements are dramatically evolving, driven by web and ecommerce applications to enhance productivity and merging the voice and data infrastructure to reduce costs. The Cisco 2811 and 2821 routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 2 requirements. This section describes the general features and functionality provided by the routers.
Figure 3 – Rear Panel Physical Interfaces The Cisco 2811 router features a console port, an auxiliary port, two Universal Serial Bus (USB) ports, four high-speed WAN interface card (HWIC) slots, two10/100 Gigabit Ethernet RJ45 ports, an Enhanced Network Module (ENM) slot, and a Compact Flash (CF) drive.
Auxiliary Power Activity Compact Flash Off Solid Green Solid Orange Off Blinking Green Solid Green Off Solid Green -48V PS and RPS not present -48V PS or RPS present and functional -48V PS or RPS present and failure detected No interrupts or packet transfer occurring System is servicing interrupts System is actively transferring packets No ongoing accesses, eject permitted Device is busy, do not eject Table 1 – 2811 Front Panel Indicators Name State Description PVDM1 Off Solid Green Solid Orange O
Router Physical Interface 10/100 Ethernet LAN Ports HWIC Ports Console Port Auxiliary Port ENM Slot USB Ports 10/100 Ethernet LAN Ports HWIC Ports Power Switch Console Port Auxiliary Port ENM Slot 10/100 Ethernet LAN Port LEDs AIM LEDs PVDM LEDs Power LED Activity LEDs Auxiliary LED Compact Flash LED Console Port Auxiliary Port USB Ports Main Power Plug Redundant Power Supply Plug FIPS 140-2 Logical Interface Data Output Interface Control Input Interface Status Output Interface Power Interface Table 4
The cryptographic boundary of the module is the device’s case. All of the functionality discussed in this document is provided by components within this cryptographic boundary. The interfaces for the router are located on the front and rear panels as shown in Figure 5 and Figure 6, respectively.
• • • • (4) USB ports (5) CF drive (6) LEDs described in table 1.
Solid Orange AIM0 installed and initialized error Table 6 – 2821 Rear Panel Indicators The following table describes the meaning of Ethernet LEDs on the front panel: Name State Activity Off Solid/Blinking Green Off Solid Green One Blink Green Two Blink Green Off Solid Green Duplex Speed Link Description Not receiving packets Receiving packets Half-Duplex Full-Duplex 10 Mbps 100 Mbps No link established Ethernet link is established Table 7 – 2821 Ethernet Indicators The physical interfaces are sepa
Router Physical Interface Main Power Plug Redundant Power Supply Plug FIPS 140-2 Logical Interface Power Interface Table 8 – 2821 FIPS 140-2 Logical Interfaces The CF card that stored the IOS image is considered an internal memory module. The reason is the IOS image stored in the card cannot be modified or upgraded. The card itself must never be removed from the drive. Tamper evident seal will be placed over the card in the drive. 2.
Configure the router Define network interfaces and settings, create command aliases, set the protocols the router will support, enable interfaces and network services, set system date and time, and load authentication information. Define Rules and Filters Create packet Filters that are applied to User data streams on each interface.
2.3.4 Strength of Authentication The security policy stipulates that all user passwords must be 8 alphanumeric characters, so the password space is 2.8 trillion possible passwords. The possibility of randomly guessing a password is thus far less than one in one million.
Figure 7- 2811 – Opacity Shields Figure 8 - 2821 opacity shield placement Once the router has been configured in to meet FIPS 140-2 Level 2 requirements, the router cannot be accessed without signs of tampering. To seal the system, apply serialized tamperevidence labels as follows: For Cisco 2811: © Copyright 2007 Cisco Systems, Inc. 15 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
1. Clean the cover of any grease, dirt, or oil before applying the tamper evidence labels. Alcohol-based cleaning pads are recommended for this purpose. The temperature of the router should be above 10°C. 2. The tamper evidence label should be placed so that one half of the label covers the front panel and the other half covers the enclosure. 3. The tamper evidence label should be placed over the CF card in the slot so that any attempt to remove the card will show sign of tampering. 4.
Figure 11 – 2811 Tamper Evident Label Placement on the Opacity Shield For Cisco 2821: 1. Clean the cover of any grease, dirt, or oil before applying the tamper evidence labels. Alcohol-based cleaning pads are recommended for this purpose. The temperature of the router should be above 10°C. 2. The tamper evidence label should be placed so that one half of the label covers the front panel and the other half covers the enclosure. 3.
Figure 12 – Cisco 2821 Tamper Evident Label Placement (Back View) Figure 13 – Cisco 2821 Tamper Evident Label Placement (Front View) Figure 14 – Cisco 2821 Tamper Evident Label Placement on the Opacity Shield © Copyright 2007 Cisco Systems, Inc. 18 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
The tamper evidence seals are produced from a special thin gauge vinyl with self-adhesive backing. Any attempt to open the router will damage the tamper evidence seals or the material of the module cover. Since the tamper evidence seals have non-repeated serial numbers, they can be inspected for damage and compared against the applied serial numbers to verify that the module has not been tampered.
Key wrapping, key establishment methodology provides between 80-bits and 112-bits of encryption strength per NIST 800-57. The following are not FIPS 140-2 approved Algorithms: DES, RC4, MD5, HMAC-MD5, RSA key wrapping and DH; however again DH and RSA are allowed for use in key establishment. The module contains a HiFn 7814-W cryptographic accelerator chip, integrated in the AIM card.
available in the DRAM; therefore this command will completely zeroize this key.
IKE session encrypt key TRIPLEDES/AES The IKE session encrypt key. DRAM Automatically after IKE session terminated. IKE session authentication key ISAKMP preshared HMAC-SHA-1 The IKE session authentication key. DRAM Automatically after IKE session terminated. Shared secret NVRAM “# no crypto isakmp key” IKE hash key HMAC-SHA-1 DRAM IKE RSA Authentication private Key RSA Automatically after generating IKE shared secret keys.
PPP authentication key RFC 1334 Router authentication key 2 Shared Secret SSH session key Various symmetric User password Shared Secret Enable password Shared Secret Enable secret Shared Secret RADIUS secret Shared Secret secret_1_0_0 TACACS+ secret Shared Secret TLS server private key TLS server public key TLS premaster secret RSA RSA Shared Secret AAA server is zeroized upon completion of the authentication attempt. The authentication key used in PPP.
TLS Encryption Key TLS Integrity Key AES/TRIPLEDES Key used to encrypt TLS session data DRAM HMAC-SHA-1 HMAC-SHA-1 used for TLS data integrity protection DRAM Automatically when TLS session is terminated Automatically when TLS session is terminated Security Relevant Data Item PRNG Seed d r PRNG Seed Key d r Diffie Hellman private exponent r Diffie Hellman public key r skeyid r w d r w d r w d r w d r w d r w d r skeyid_d r skeyid_a r skeyid_e r IKE session encrypt key r IKE session authe
ISAKMP preshared r w d r w d r w d r w d r w d r w d r w d r w d r IKE hash key r IKE RSA Authentication private Key IKE RSA Authentication Public Key IKE RSA Encrypted Nonce Private Key IKE RSA Encrypted Nonce Public Key r r r r IPSec encryption key r IPSec authentication key r Configuration encryption key Router authentication key 1 PPP authentication key Router authentication key 2 r w d r w d r w d r w d r w d r w d r w d r w d r w r w r w r w r w d r w d r r w d r d r w d r SSH sess
TACACS+ secret TLS server private key r TLS server public key r TLS pre-master secret r TLS Encryption Key r TLS Integrity Key r r w d r w d r w d r w d r w d r w r w Table 6 – Role and Service Access to CSP © Copyright 2007 Cisco Systems, Inc. 26 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
2.6 Self-Tests In order to prevent any secure data from being released, it is important to test the cryptographic components of a security module to insure all components are functioning correctly. The router includes an array of self-tests that are run during startup and periodically during operations. All self-tests are implemented by the software.
2.6.
3.2 System Initialization and Configuration 1. The Crypto Officer must perform the initial configuration. IOS version 12.4 (15) T3, Advanced Security build (advsecurity) is the only allowable image; no other image should be loaded. 2. The value of the boot field must be 0x0102. This setting disables break from the console to the ROM monitor and automatically boots the IOS image. From the “configure terminal” command line, the Crypto Officer enters the following syntax: config-register 0x0102 3.
3.4 Protocols 1. SNMP v3 over a secure IPSec tunnel may be employed for authenticated, secure SNMP gets and sets. Since SNMP v2C uses community strings for authentication, only gets are allowed under SNMP v2C. 3.5 SSLv3.1/TLS Requirements and Cryptographic Algorithms When negotiating SSLv3.1/TLS cipher suites, only FIPS approved algorithms must be specified. All other versions of SSL except version 3.
CISCO EDITOR’S NOTE: You may now include all standard Cisco information included in all documentation produced by Cisco. Be sure that the following line is in the legal statements at the end of the document: By printing or making a copy of this document, the user agrees to use this information for product evaluation purposes only. Sale of this information in whole or in part is not authorized by Cisco Systems. © Copyright 2007 Cisco Systems, Inc.