Cryptographic Key Management; Initial Setup; System Initialization And Configuration - Cisco Router 7206 VXR User Manual

Cisco systems router user guide
Table of Contents

Advertisement

Cryptographic Key Management

The router securely administers both cryptographic keys and other critical security parameters such as
passwords. The tamper evidence seals provide physical protection for all keys. Keys are also password
protected and can be zeroized by the crypto officer. Keys are exchanged manually and entered
electronically via manual key exchange or Internet Key Exchange (IKE).
Self-Tests
In order to prevent any secure data from being released, it is important to test the cryptographic
components of a security module to insure all components are functioning correctly. The router includes
an array of self-tests that are run during startup and periodically during operations. The self-test run at
power-up includes a cryptographic known answer test (KAT) on the FIPS-approved cryptographic
algorithms (DES, 3DES), on the message digest (SHA-1), and on the Diffie-Hellman algorithm. Also
performed at startup are software integrity test using an EDC, and a set of Statistical Random Number
Generator (RNG) tests. The following tests are also run periodically or conditionally: a bypass mode test
performed conditionally prior to executing IPSec, a software load test for upgrades, and the continuous
random number generator test. If any of these self-tests fail, the router transitions into an error state.
Within the error state, all secure data transmission is halted and the router outputs status information
indicating the failure.
Secure Operation of the Cisco 7206 VXR NPE-400 Router
Cisco 7206 VXR NPE-400 router meets all the Level 2 requirements for FIPS 140-1. Follow the setting
instructions provided below to place the module in FIPS mode. Operating this router without
maintaining the following settings will remove the module from the FIPS approved mode of operation.

Initial Setup

System Initialization and Configuration

The crypto officer must apply tamper evidence labels as described in the
of this document. The crypto officer must securely store tamper evidence labels before use, and any
tamper evidence labels not used should also be stored securely.
Only a crypto officer can add and remove port adapters. When removing the tamper evidence label,
the crypto officer should remove the entire label from the router and clean the cover of any grease,
dirt, or oil with an alcohol-based cleaning pad. The crypto officer must reapply tamper evidence
labels on the router as described in the
The crypto officer must perform the initial configuration. The IOS version shipped with the router,
version 12.1(9)E, is the only allowable image. No other image can be loaded.
The value of the boot field must be 0x0101 (the factory default). This setting disables the break from
the console to the ROM monitor and automatically boots the IOS image. From the configure
terminal command line, the crypto officer enters the following syntax:
config-register 0x0101
Secure Operation of the Cisco 7206 VXR NPE-400 Router
"Physical
Security" section in this document.
Cisco 7206 VXR Router with ISA Security Policy
"Physical
Security" section
11

Advertisement

Table of Contents
loading

Table of Contents