Specifications
© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
2
Table of Contents
1 INTRODUCTION.................................................................................................................. 3
1.1 P
URPOSE
............................................................................................................................. 3
1.2 R
EFERENCES
....................................................................................................................... 3
1.3
T
ERMINOLOGY
.................................................................................................................... 3
1.4
D
OCUMENT
O
RGANIZATION
................................................................................................ 3
2 CISCO 3825 AND 3845 ROUTERS......................................................................................... 5
2.1
T
HE
3825
C
RYPTOGRAPHIC
M
ODULE
P
HYSICAL
C
HARACTERISTICS
...................................... 5
2.2
T
HE
C
ISCO
3845
C
RYPTOGRAPHIC
M
ODULE
P
HYSICAL
C
HARACTERISTICS
............................ 9
2.3
R
OLES AND
S
ERVICES
........................................................................................................... 13
2.3.1. User Services................................................................................................ 13
2.3.2 Crypto Officer Services .................................................................................. 13
2.3.3 Unauthenticated Services............................................................................... 14
2.3.4 Strength of Authentication .............................................................................. 14
2.4
P
HYSICAL
S
ECURITY
............................................................................................................. 15
2.5
C
RYPTOGRAPHIC
K
EY
M
ANAGEMENT
.................................................................................. 19
2.6
S
ELF
-T
ESTS
....................................................................................................................... 28
2.6.1 Self-tests performed by the IOS image ....................................................... 28
2.6.2 Self-tests performed by Safenet.................................................................. 28
2.6.3 Self-tests performed by AIM........................................................................ 29
3 SECURE OPERATION OF THE CISCO 3825 OR 3845 ROUTER ............................. 30
3.1
I
NITIAL
S
ETUP
................................................................................................................... 30
3.2
S
YSTEM
I
NITIALIZATION AND
C
ONFIGURATION
................................................................. 30
3.3
IPS
EC
R
EQUIREMENTS AND
C
RYPTOGRAPHIC
A
LGORITHMS
............................................. 31
3.4
SSL
V
3.1/TLS
R
EQUIREMENTS AND
C
RYPTOGRAPHIC
A
LGORITHMS
................................ 31
3.5
P
ROTOCOLS
....................................................................................................................... 31
3.6
R
EMOTE
A
CCESS
............................................................................................................... 31