Specifications

© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
3
1 Introduction
1.1 Purpose
This document is the non-proprietary Cryptographic Module Security Policy for the Cisco 3825
Integrated Services Router with AIM-VPN/SSL-3 and 3845 Integrated Services Routers Routers
with AIM-VPN/SSL-3 (Router Hardware Version: 3825 or 3845; Router Firmware Version: IOS
12.4 (15) T3; AIM-VPN/SSL-3 Hardware Version 1.0, Board Revision 01). This security policy
describes how the Cisco 3825 and 3845 Integrated Services Routers meet the security
requirements of FIPS 140-2, and how to operate the router with on-board crypto enabled in a
secure FIPS 140-2 mode. This policy was prepared as part of the Level 2 FIPS 140-2 validation
of the Cisco 3825 or 3845 Integrated Services Router.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security
Requirements for Cryptographic Modules) details the U.S. Government requirements for
cryptographic modules. More information about the FIPS 140-2 standard and validation program
is available on the NIST website at http://csrc.nist.gov/groups/STM/index.html.
1.2 References
This document deals only with operations and capabilities of the 3825 and 3845 routers with
AIM modules in the technical terms of a FIPS 140-2 cryptographic module security policy. More
information is available on the routers from the following sources:
The Cisco Systems website contains information on the full line of Cisco Systems
routers. Please refer to the following website:
http://www.cisco.com/en/US/products/hw/routers/index.html
For answers to technical or sales related questions please refer to the contacts listed on
the Cisco Systems website at www.cisco.com.
The NIST Validated Modules website
(http://csrc.nist.gov/groups/STM/cmvp/validation.html) contains contact information
for answers to technical or sales-related questions for the module.
1.3 Terminology
In this document, the Cisco 3825 or 3845 routers are referred to as the router, the module, or the
system.
1.4 Document Organization
The Security Policy document is part of the FIPS 140-2 Submission Package. In addition to this
document, the Submission Package contains:
Vendor Evidence document
Finite State Machine
Other supporting documentation as additional references