Cisco Catalyst 4503-E, Catalyst 4506-E, Catalyst 4507R-E .

2y ago
30 Views
2 Downloads
681.68 KB
37 Pages
Last View : 9d ago
Last Download : 3m ago
Upload by : Milo Davies
Transcription

Cisco Catalyst 4503-E, Catalyst 4506-E, Catalyst 4507R-E,Catalyst 4507R E, Catalyst 4510R-E, Catalyst 4510R E,Catalyst C4500X-16SFP , Catalyst C4500X-F-16SFP ,Catalyst C4500X-32SFP , Catalyst C4500X-F-32SFP ,Catalyst C4500X-24X-ES, Catalyst C4500X-40X-ES, CatalystC4500X-24X-IPB with Supervisor Cards (WS-X45-SUP7-E,WS-X45-Sup7L-E) and Line Cards (WS-X4640-CSFP-E, WSX4712-SFP E, WS-X4748-UPOE E, WS-X4748-RJ45-E andWS-X4748-RJ45V E)FIPS 140-2 Level 2Non-Proprietary Security PolicyOverall Level 2 (Sections 3 and 10 Level 3) ValidationVersion 0.4April 2014

Introduction . 1Configuration . 2References . 4FIPS 140-2 Submission Package . 4Module Description . 5Module Validation Level . 8Cryptographic Boundary. 8Cryptographic Module Ports and Interfaces . 8Roles, Services, and Authentication . 9User Role . 9CO Role . 10Services . 10Cryptographic Key/CSP Management. 11Cryptographic Algorithms . 16Approved Cryptographic Algorithms . 16Non-Approved Algorithms Allowed in FIPS Mode . 17Non-Approved Algorithms . 17Self-Tests . 17Physical Security. 19Module Opacity . 19Tamper Evidence . 22Secure Operation. 28Initial Setup . 28System Initialization and Configuration . 28Remote Access . 29Identifying Switch Operation in an Approved Mode . 29Related Documentation. 30Obtaining Documentation . 30Cisco.com. 30Product Documentation DVD . 30Ordering Documentation . 31Documentation Feedback . 31Cisco Product Security Overview . 31Reporting Security Problems in Cisco Products . 32Obtaining Technical Assistance. 32Cisco Technical Support & Documentation Website . 32Submitting a Service Request . 33Definitions of Service Request Severity . 33Obtaining Additional Publications and Information . 34Definition List . 35

IntroductionThis is a non-proprietary Cryptographic Module Security Policy for the Cisco Catalyst4503-E, Catalyst 4506-E, Catalyst 4507R-E, Catalyst 4507R E, Catalyst 4510R-E,Catalyst 4510R E, Catalyst C4500X-16SFP , Catalyst C4500X-F-16SFP , CatalystC4500X-32SFP , Catalyst C4500X-F-32SFP , Catalyst C4500X-24X-ES, CatalystC4500X-40X-ES, Catalyst C4500X-24X-IPB with Supervisor Cards (WS-X45-SUP7-E,WS-X45-Sup7L-E) and Line Cards (WS-X4640-CSFP-E, WS-X4712-SFP E, WSX4748-UPOE E, WS-X4748-RJ45-E and WS-X4748-RJ45V E) referred to in thisdocument as the modules or switches. This security policy describes how modules meetthe security requirements of FIPS 140-2 and how to run the modules in a FIPS 140-2mode of operation and may be freely distributed.Versions: Catalyst 4503-E Catalyst 4506-E Catalyst 4507R-E Catalyst 4507R E Catalyst 4510R-E Catalyst 4510R E Catalyst C4500X-16SFP Catalyst C4500X-F-16SFP Catalyst C4500X-32SFP Catalyst C4500X-F-32SFP Catalyst C4500X-24X-ES Catalyst C4500X-40X-ES Catalyst C4500X-24X-IPB Supervisor Cards WS-X45-SUP7-E Supervisor Cards WS-X45-Sup7L-E Line Cards WS-X4640-CSFP-E Line Cards WS-X4712-SFP E Line Cards WS-X4748-UPOE E Line Cards WS-X4748-RJ45-E Line Cards WS-X4748-RJ45V E Catalyst 4503 FIPS kit packaging (WS-C4503-FIPS-KIT ) Catalyst 4506 FIPS kit packaging (WS-C4506-FIPS-KIT ) Catalyst 4507 FIPS kit packaging (WS-C4507-FIPS-KIT ) Catalyst 4510 FIPS kit packaging (WS-C4510-FIPS-KIT ) FIPS kit packaging (CVPN4500FIPS/KIT) Filler Plate (C4K-SLOT-CVR-E) IOS version: IOS-XE 3.5.2E1

ConfigurationThe switches included as part of the FIPS validation may be configured in the followingconfigurations.Chassis Part NumberSupervisor CardsSingle supervisor card WS‐X45‐SUP7‐EWS‐C4503‐ESingle supervisor card WS‐X45‐Sup7L‐ESingle supervisor card WS‐X45‐SUP7‐EWS‐C4506‐ESingle supervisor card WS‐X45‐Sup7L‐EDual supervisor card WS‐X45‐SUP7‐EwS‐C4507R EDual supervisor card WS‐X45‐Sup7L‐E2Line CardsUp to Two (2) of the following linecards in any configuration.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE EUp to Two (2) of the following linecards in any configuration.Single line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐RJ45‐EUp to Five (5) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Five (5) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Five (5) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Five (5) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐E

Chassis Part NumberSupervisor CardsDual supervisor card WS‐X45‐SUP7‐EwS‐C4507R‐EDual supervisor card WS‐X45‐Sup7L‐EDual supervisor card WS‐X45‐SUP7‐EWS‐C4510R EDual supervisor card WS‐X45‐Sup7L‐EDual supervisor card WS‐X45‐SUP7‐EWS‐C4510R‐EDual supervisor card WS‐X45‐Sup7L‐E3Line CardsSingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Five (5) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Five (5) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Eight (8) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Eight (8) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Eight (8) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐ESingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EUp to Eight (8) of the following linecards in any combination.Single line card WS‐X4748‐RJ45V ESingle line card WS‐X4712‐SFP ESingle line card WS‐X4640‐CSFP‐E

Chassis Part NumberWS‐C4500X‐16SFP WS‐C4500X‐F‐16SFP WS‐C4500X‐32SFP WS‐C4500X‐F‐32SFP 4500X‐24X‐IPBSupervisor CardsN/A ‐ integrated supervisor cardN/A ‐ integrated supervisor cardN/A ‐ integrated supervisor cardN/A ‐ integrated supervisor cardN/A ‐ integrated supervisor cardN/A ‐ integrated supervisor cardN/A ‐ integrated supervisor cardLine CardsSingle line card WS‐X4748‐UPOE ESingle line card WS‐X4748‐RJ45‐EN/A ‐ integrated LinecardN/A ‐ integrated LinecardN/A ‐ integrated LinecardN/A ‐ integrated LinecardN/A ‐ integrated LinecardN/A ‐ integrated LinecardN/A ‐ integrated LinecardTable 1: Module ConfigurationsReferencesThis document deals only with operations and capabilities of the module in the technicalterms of a FIPS 140-2 cryptographic module security policy. More information isavailable on the module from the following sources: The Cisco Systems website (http://www.cisco.com) contains information on thefull line of products from Cisco Systems.The NIST Cryptographic Module Validation Program .html) contains contact informationfor answers to technical or sales-related questions for the module.FIPS 140-2 (Federal Information Processing Standards Publication 140-2 —Security Requirements for Cryptographic Modules) details the U.S. Governmentrequirements for cryptographic modules. More information about the FIPS 140-2standard and validation program is available on the NIST website FIPS 140-2 Submission PackageThe security policy document is one document in a FIPS 140-2 Submission Package. Inaddition to this document, the submission package includes: Vendor Evidence Finite State Machine Other supporting documentation as additional referencesWith the exception of this non-proprietary security policy, the FIPS 140-2 validationdocumentation is proprietary to Cisco Systems, Inc. and is releasable only underappropriate non-disclosure agreements. For access to these documents, please contactCisco Systems, Inc. See “Obtaining Technical Assistance” section for more information.4

Module DescriptionBranch office networking requirements are dramatically evolving, driven by web and ecommerce applications to enhance productivity and merging the voice and datainfrastructure to reduce costs. The Catalyst 4500 series switches with the VPN ServicesPort Adapter offer versatility, integration, and security to branch offices. With numerousnetwork modules and service modules available, the modular architecture of the Ciscoswitches easily allows interfaces to be upgraded to accommodate network expansion. TheCatalyst 4500 series switches provide a scalable, secure, manageable remote accessserver that meets FIPS 140-2 Level 2 requirements, as a multi-chip standalone module.The switches include cryptographic algorithms implemented in IOS software, IOS-XEImage Signing software maintained and executed in Rommom, and hardware ASICs. Theline card ASICs implement Cisco TrustSec protocol (CTS) supporting IEEE 802.1AE forLayer 2 CTS and contain hardware implementations of the GCM and ECB modes of theAES algorithm.The switches support the Cisco TrustSec protocol which provides policy-based accesscontrol, identity-aware networking, and data confidentiality and integrity; and VirtualSwitching System which is a system virtualization technology that allows the pooling ofmultiple Catalyst 4500 switches into a single virtual switch.The switches also support SSH and TLS to provide remote administrative access to themodule.Figure 1: Catalyst 4503-E Switch5

Figure 2: Catalyst 4506-E SwitchFigure 3: Catalyst 4507R-E/ Catalyst 4507R E6

Figure 4: Catalyst 4510R-E/ Catalyst 4510R EFigure 5: Catalyst 4500X-16SFP and Catalyst 4500X-F-16SFP Front-to-Back airflowFigure 6: Catalyst 4500X-32SFP and Catalyst 4500X-F-32SFP Back-to-front AirflowFigure 7: Expansion module added to figure 5 and 6 creates Catalyst C4500X-24X-ESCatalyst C4500X-40X-ES or Catalyst C4500X-24X-IPB7

Module Validation LevelThe following table lists the level of validation for each area in the FIPS PUB 140-2.No.1234567891011OverallArea TitleLevelCryptographic Module SpecificationCryptographic Module Ports and InterfacesRoles, Services, and AuthenticationFinite State ModelPhysical SecurityOperational EnvironmentCryptographic Key managementElectromagnetic Interface/Electromagnetic CompatibilitySelf‐TestsDesign AssuranceMitigation of Other AttacksOverall module validation levelTable 2: Module Validation Level22322N/A2223N/A2Cryptographic BoundaryThe cryptographic boundary is defined as being the physical enclosure of the chassistogether with the respective opacity shields if applicable.All of the functionality described in this publication is provided by components withinthis cryptographic boundary. For Cisco Catalyst 4503-E, Catalyst 4506-E, Catalyst4507R E and Catalyst 4510R E, each module incorporates one or more supervisorblades and one or more linecards; for Catalyst C4500X-16SFP , Catalyst C4500X-F16SFP , Catalyst C4500X-32SFP , Catalyst C4500X-F-32SFP , Catalyst C4500X24X-ES, Catalyst C4500X-40X-ES and Catalyst C4500X-24X-IPB, each module is afixed configuration.Cryptographic Module Ports and InterfacesEach module provides a number of physical and logical interfaces to the device, and thephysical interfaces provided by the module are mapped to four FIPS 140-2 definedlogical interfaces: data input, data output, control input, and status output. The modulealso supports a power interface. The logical interfaces and their mapping are described inthe following tables:Physical InterfaceLogical Interface10/100/1000Mbps Ethernet ports10G SFP Ethernet portsConsole PortManagement Port10/100/1000Mbps Ethernet ports10G SFP Ethernet portsConsole PortData Input InterfaceData Output Interface8

Management Port10/100/1000Mbps Ethernet portsControl Input Interface10G SFP Ethernet portsConsole PortManagement Port10/100/1000Mbps Ethernet portsStatus Output Interface10G SFP Ethernet portsConsole PortManagement PortLEDsPower PlugPower InterfaceTable 3: Physical To Logical InterfacesNote: Two USB ports and Secure Digital slot on each module are disabled by TELs inFIPS modeRoles, Services, and AuthenticationAuthentication is identity-based. Each user is authenticated upon initial access to themodule. There are two roles in the Switch that operators may assume: the Crypto Officer(CO) role and the User role. The administrator of the Switch assumes the CO role inorder to configure and maintain the Switch using CO services, while the Users exercisesecurity services over the network. The module supports RADIUS for authentication.User RoleThe role assumed by users obtaining general security services. From a logical view, useractivity exists in the data-plane. Users access via network ports using CTS protocols.CTS uses 802.1X and EAP-FAST for authentication.CTS can use password based credentials – in such a case the user passwords must be atleast eight (8) characters long, including at least one letter and at least one numbercharacter, in length (enforced procedurally). If six (6) integers, one (1) special characterand one (1) alphabet are used without repetition for an eight (8) digit PIN, the probabilityof randomly guessing the correct sequence is one (1) in 251,596,800 (this calculation isbased on the assumption that the typical standard American QWERTY computerkeyboard has 10 Integer digits, 52 alphabetic characters, and 32 special charactersproviding 94 characters to choose from in total. The calculation should be 10 x 9 x 8 x 7x 6 x 5 x 32 x 52 251, 596, 800 ). Therefore, the associated probability of a successfulrandom attempt is approximately 1 in 251,596,800, which is less than 1 in 1,000,000required by FIPS 140-2.CTS can also use certificate credentials using RSA keys – in such a case the securitystrength is 112 bits, so an attacker would have a 1 in 2112 chance of a successfulauthentication which is much stronger than the one in a million chance required by FIPS140-2.9

CO RoleThe role assumed by an authorized CO connecting to the switch via CLI through theconsole port and performing management functions and module configuration. From alogical view, CO activity exists only in the control plane. IOS prompts the CO for theirusername and password, if the password is validated against the CO’s password in IOSmemory, the user is allowed entry to the IOS executive program. A CO can assignpermission to access the CO role to additional accounts, thereby creating additional COs.All CO passwords must be 8 characters up to 25 characters with a minimum of one letterand one number. If six (6) integers, one (1) special character and one (1) alphabet areused without repetition for an eight (8) digit PIN, the probability of randomly guessingthe correct sequence is one (1) in 251,596,800 (this calculation is based on theassumption that the typical standard American QWERTY computer keyboard has 10Integer digits, 52 alphabetic characters, and 32 special characters providing 94 charactersto choose from in total. The calculation should be 10 x 9 x 8 x 7 x 6 x 5 x 32 x 52 251,596, 800 ). Therefore, the associated probability of a successful random attempt isapproximately 1 in 251,596,800, which is less than 1 in 1,000,000 required by FIPS 1402.ServicesRoleUserAuthenticationMethodCTS, SSH, TLS, IPsecAuthenticationServicesStatus Functions: view state of interfaces, view state ofconnection, version of IOS currently running.Network Functions: connect to other network devices throughoutgoing telnet or PPP, and initiate diagnostic network services(for example, ping or mtrace).Terminal Functions: adjust the terminal session (that is, lockthe terminal and adjust flow control).Directory Services: display directory of files kept in flashmemory.CryptographicOfficerConsole loginPerform Self Tests: occurs upon system startup.Configure the switch: define network interfaces and settings,create command aliases, set the protocols the switch willsupport, enable interfaces and network services, set systemdate and time, and load authentication information.Define rules and filters: create packet filters that are applied touser data streams on each interface. Each filter consists of a setof rules, which define a set of packets to permit or deny basedon characteristics such as protocol ID, addresses, ports, TCPconnection establishment, or packet direction.Status functions: view the switch configuration, routing tables,and active sessions; view health, temperature, memory status,10

RoleAuthenticationMethodServicesvoltage, and packet statistics; review accounting logs, and viewphysical interface status.Manage the switch: log off users, shut down or reload theswitch, manually back up switch configurations, view completeconfigurations, manager user rights, and restore switchconfigurations.Set Encryption/Bypass ‐ Place module into Encryption orBypass state.Perform Self‐Tests ‐ Perform the FIPS 140 start‐up tests ondemand.UnauthenticatedZeroization: Delete all CSP dataShow status (viewing LEDs), passing traffic in bypass andpower‐cycling the device.Table 4: Module Roles/ServiceN/ACryptographic Key/CSP ManagementThe module securely administers both cryptographic keys and other critical securityparameters such as passwords. The tamper evidence seals provide physical protection forall keys. All keys are also protected by the password-protection on the CO role login, andcan be zeroized by the CO. All zeroization consists of overwriting the memory that storedthe key. Keys are exchanged and entered electronically. Persistent keys are entered bythe CO via the console port CLI, transient keys are generated or established and stored inDRAM.The module supports the following critical security parameters scriptionOriginStorageZeroizationMethodSP 800‐90CTR DRBG256‐bitsThis is the entropyfor SP 800‐90 RNG.Generated byinternal entropysourceDRAM(plaintext)power cycle thedeviceDRBG seed SP 800‐90CTR DRBG384‐bitsThis is the seed forSP 800‐90 RNG.Generated byentropy sourcevia theCTR DRBGderivationfunctionDRAM(plaintext)power cycle thedevice11

DRBG VSP 800‐90CTR DRBG128‐bitsInternal V value usedas part of SP800-90 CTR DRBGGenerated byentropy sourcevia theCTR DRBGderivationfunction. It isstored in DRAMwith plaintextform.DRAM(plaintext)power cycle thedeviceDRBG KeySP 800‐90CTR DRBG256‐bitsInternal Key valueused as part of SP800-90 CTR DRBGgenerated fromentropy sourcevia theCTR DRBGderivationfunctionDRAM(plaintext)power cycle thedeviceDiffie‐HellmanprivateexponentDH224 ‐ 379 bitsThe private exponent Generated using DRAMused in Diffie‐RNG(plaintext)Hellman (DH)exchange.Automaticallyafter tDH2048 – 4096bitsThe public exponentused in Diffie‐Hellman (DH)exchange.generated by the DRAMDiffie‐Hellman(plaintext)Key exchangeAutomaticallywhen sessionexpiresDiffie‐HellmansharedsecretDH2048 – 4096bitsShared secretgenerated by theDiffie‐Hellman KeyexchangeShared secretDRAMgenerated by the (plaintext)Diffie‐HellmanKey exchangeAutomaticallywhen sessionexpiresSecretPairwiseMasterKey (PMK)– 802.11x‐REV64 byte keyused to derivePTK which isused togenerate CTSsession MACandEncryptionkeys. Only thefirst 32 bytesare used byCTS.64 byte key used toderive PTK which isused to generateCTS session MAC andEncryption keys.Only the first 32bytes are used byCTS.ManuallyDRAMconfigured in(plaintext)CTS manualmode.Generated byACS and sent toAuthenticatorand generatedinternally bysupplicant in CTSdot1x mode.unconfigure thePMK in CTSmanual modeor unconfigurects dot1x in CTSdot1x mode.SessionKey ‐802.11x‐REVAES‐GCM128‐bitsUsed for bulkencryption of dataDerived by SAPDRAM(plaintext)Automaticallywhen sessionexpiresSAPPairwiseTransientKey (PTK)SharedSecret128‐bitConcatenation ofKCK and KEK.Concatenationof KCK and KEK.DRAM(plaintext)Automaticallywhen sessionexpires128‐bitUsed to encrypt SAPpayloads during SAPprotocolimplementations.Derived by SAPDRAM(plaintext)Automaticallywhen sessionexpiresSAP KeyAESEncryptionKey (KEK)12

SAP KeyHMAC‐Confirmati SHA‐1on Key(KCK)160‐bitUsed to protect SAPpayloads integrityduring SAP protocolimplementations.Derived by SAPDRAM(plaintext)Automaticallywhen sessionexpiresCTSpasswordSharedSecretUp to 256bytesThis is CTScredential. Used forCTS device toauthenticate itself.The maximum size is256 bytes.User configuredNVRAM(plaintext)Via thefollowing CLI,“clear ctscredentials”.CTS PACkeySecret256‐bitsCTS PAC is aGenerated andProtected Accesssent by ACS toCredential that isthe CTS devicemutually anduniquely sharedbetween the peerand ACS. It is used tosecure EAP‐FASTtunnel.NVRAM(plaintext)Via thefollowing CLI,“clear cts pacsSecureRADIUSKEKAES keywrap KEK256‐bits[pac] [keywrapencryption‐key secret message‐auth‐code‐key secret ][format {ascii hex}]key shared‐secret User configuredNVRAM(plaintext)Resetting orrebooting themoduleSecureRADIUSMACKAES key256‐bitswrap MACK[pac] [keywrapencryption‐key secret message‐auth‐code‐key secret ][format {ascii hex}]key shared‐secret User configuredNVRAM(plaintext)Resetting orrebooting themoduleSkeyidKeyed SHA‐ 160‐bits1Used to deriveskey d.Value derivedDRAMfrom the shared (plaintext)secret within IKEexchange.Zeroized whenIKE session isterminated.Automaticallyafter IKE sessionterminated.skeyid dKeyed SHA‐ 160‐bits1Derived as part ofthe IKE process.The IKE keyderivation keyfor non callyafter IKE sessionterminated.IKE session Triple‐encryption DES/AESkeyTriple‐DESThe IKE session(168‐bits)/AES encrypt key.(256‐bits)Generated byRNGDRAM(plaintext)Automaticallyafter IKE sessionterminated.IKE session SHA‐1authentica HMACtion key160‐bitsThe IKE sessionauthentication key.Generated aspart of IKEDRAM(plaintext)Automaticallyafter IKE sessionterminated.ISAKMPSecretpresharedAt least eightcharactersThe key used togenerate IKE skeyidConfigured byCONVRAM(plaintext)“# no cryptoisakmp key”13

during preshared‐keyauthentication. Thiskey can have twoforms based onwhether the key isrelated to thehostname or the IPaddress.IKE RSARSAAuthentication publicKey2048‐bitsRSA puplic key forIKE authentication.Generated orNVRAMentered with(plaintext)“crypto keyring”or “ca trust‐point”“# crypto keyzeroize rsa"IKE RSARSAAuthenticationprivateKey2048‐bitsRSA private key forIKE authentication.Generated orDRAMentered with(plaintext)“crypto keyring”or “ca trust‐point”“# crypto keyzeroize rsa"IPSecTriple‐encryption DES/AESkeyTriple‐DESThe IPSec encryption(168‐bits)/AES key. Zeroized when(256‐bits)IPSec session isterminated.Derived usingthe IKE hen IPSecsessionterminated.IPSecSHA‐1authentica HMACtion key160‐bitsThe IPSecauthentication key.The zeroization is thesame as above.Derived usingthe IKE hen IPSecsessionterminated.RSA2048‐bitsPrivate key used inSSH protocolcrypto keygenerate rsaNVRAM(plaintext)crypto keyzeroize rsaRSA public RSAkey (SSH)2048‐bitsPublic key used inSSH protocolcrypto keygenerate rsaDRAM(plaintext)crypto keyzeroize rsaRSAprivatekey (SSH)SSHsessionkeyTRIPLE‐DES 128, 192, 256/ AESbits (AES)168 bits(TRIPLE‐DES)This is the SSHEstablished using DRAMsession key. It is used DH/RSA(plaintext)to encrypt all SSHdata trafficstraversing betweenthe SSH client andSSH server.Zeroized whenSSH session isterminatedZeroized whenSSH session isterminatedSSHHMAC‐SHA‐1sessionauthentication key160‐bitsThis key is used toperform theauthenticationbetween the SSHclient and SSHserver.RSAprivatekey (TLS)2048 bitsIdentity certificatescrypto keyfor module itself and generate rsaalso used in TLSnegotiations. ThisCSP is used for bothSSL VPN and SIPGateway SignalingOver TLS Transport.RSA14Established using DRAMDH/RSA(plaintext)NVRAM(plaintext)crypto keyzeroize rsa

RSA public RSAkey (TLS)2048 bitsIdentity certificatescrypto keyfor module itself and generate rsaalso used in TLSnegotiations.DRAM(plaintext)crypto keyzeroize rsaTLS pre‐mastersecretSharedSecret384‐bitsShared secretcreated usingasymmetriccryptography fromwhich new HTTPSsession keys can becreated.Created as partof TLS sessionestablishmentDRAM(plaintext)Zeroized whenTLS session s/168‐bits/256‐bitsGenerated using theTLS protocol.Created as partof TLS sessionestablishmentDRAM(plaintext)Zeroized whenTLS session isterminatedVSL PMKSharedSecret256‐bitThe preshared keyused for VSSconnectionsUser configuredNVRAM(plaintext)clear switchvirtual pmkVSLsessionkeysAES‐GCM128‐bitUsed for bulkDerived fromencryption of data in VSL PMKthe event of failoverDRAM(plaintext)Automaticallywhen VSLsession expiresUserpasswordSharedSecretAt least eight Password of the user User configured(8) characters rolelong, includingat least oneletter and atleast onenumbercharacterNVRAM(plaintext)Set newpasswordEnablesecretSharedSecreteight (8)characterslongObfuscatedpassword of the COrole.User configuredNVRAM(plaintext)Set newpasswordRADIUSsecretSharedSecretAt least eight The RADIUS Shared(8) characters Secretlong, includingat least oneletter and atleast onenumbercharacterUser configuredNVRAM(plaintext)# no radius‐server keyTACACS secretSharedSecretAt least eight The TACACS shared User configured(8) characters secretlong, includingat least oneletter and atleast onenumbercharacterNVRAM(plaintext)# no tacacs‐server keyTable 5: CSP TableThe services accessing the CSPs, the type of access and which role accesses the CSPs arelisted below.15

RoleUser RoleCrypto‐Officer RoleServiceCritical Security ParametersNetwork FunctionsDRBG entropy input, DRBG seed, DRBG V, DRBG Key, KeyDH private exponent, DH shared secret, 802.11

documentation is proprietary to Cisco Systems, Inc. and is releasable only under appropriate non-disclosure agreements. For access to these documents, please contact . Figure 5: Catalyst 4500X-16SFP and Catalyst 4500X-F-16SFP Front-to-Back airflow Figure 6: Catalyst 4500X-32SFP and Catalyst

Related Documents:

Supported Devices - Cisco SiSi NetFlow supported Cisco devices Cisco Catalyst 3560 Cisco 800 Cisco 7200 Cisco Catalyst 3750 Cisco 1800 Cisco 7600 Cisco Catalyst 4500 Cisco 1900 Cisco 12000 Cisco Catalyst 6500 Cisco 2800 Cisco ASR se

Cisco Catalyst 3524 PWR XL 2 Y Cisco Catalyst 3524 XL 1 Y Cisco Catalyst 3500 48p 15 Y Cisco Catalyst 3550 95 5 Y Cisco Catalyst 3560-48PS 8 N Cisco Catalyst 3560G-48TS 6 N Cisco Catalyst 3560G-48PS 14 N Cisco Catalyst 3560E-48PD-F 20

Cisco Nexus 7706 Cisco ASR1001 . Cisco ISR 4431 Cisco Firepower 1010 Cisco Firepower 1140 Cisco Firepower 2110 Cisco Firepower 2130 Cisco FMC 1600 Cisco MDS 91485 Cisco Catalyst 3750X Cisco Catalyst 3850 Cisco Catalyst 4507 Cisco 5500 Wireless Controllers Cisco Aironet Access Points .

Cisco Catalyst 2950 &' * &' * Fast Ethernet Gigabit Ethernet Catalyst 2950 &' * &' * (Quality of Service QoS) (Multicast) LAN Catalyst 2950 Catalyst 3550 &' * IP &' * Catalyst 2950 Cisco Cluster Management Suite (CMS) Web & Catalyst &' * Cisco CMS &' * &' Cisco Catalyst 2950 &' &' Catalyst 2950G-48 -48 10/100 2 Gigabit (Gigabit Interface Converter, GBIC) Gigabit

Cisco ASA 5505 Cisco ASA 5505SP Cisco ASA 5510 Cisco ASA 5510SP Cisco ASA 5520 Cisco ASA 5520 VPN Cisco ASA 5540 Cisco ASA 5540 VPN Premium Cisco ASA 5540 VPN Cisco ASA 5550 Cisco ASA 5580-20 Cisco ASA 5580-40 Cisco ASA 5585-X Cisco ASA w/ AIP-SSM Cisco ASA w/ CSC-SSM Cisco C7600 Ser

Cisco Catalyst 3500 Series XL 3-20 Cisco Catalyst 3900 Series 3-23 Cisco Catalyst 4000 Series — Modular Configuration 3-25 Cisco Catalyst 4000 Series — Fixed Configuration 3-28 Cisco Catalyst 4840G 3-30 Cisco Catalyst 5000 Family 3-32 Cisco

Cisco Catalyst 3500 Series XL 2-10 Cisco Catalyst 3550 Series Intelligent Ethernet Switches 2-12 Cisco Catalyst 4500 Series 2-15 Cisco Catalyst 4000 Series — Fixed Configuration 2-17 Cisco Catalyst 5000 Family 2-18 Cisco Catalyst 6500 Family 2-20 Cisco

Tom Sawyer’s observations of his environment and the people he encounters. In addition, students will make their own observations about key aspects of the novel, and use the novel and the journal writing activity to make observations about their own world and the people they are surrounded by. This unit plan will allow students to examine areas of Missouri, both in Hannibal, and in their own .