Protocols; 3.1/Tls Requirements And Cryptographic Algorithms; Remote Access - Cisco 2811 - Voice Security Bundle Router Operations

Integrated services routers with aim-vpn/epii-plus
Hide thumbs Also See for 2811 - Voice Security Bundle Router:
Table of Contents

Advertisement

3.4

Protocols

1. SNMP v3 over a secure IPSec tunnel may be employed for authenticated, secure SNMP
gets and sets. Since SNMP v2C uses community strings for authentication, only gets are
allowed under SNMP v2C.
3.5
SSLv3.1/TLS Requirements and Cryptographic Algorithms
When negotiating SSLv3.1/TLS cipher suites, only FIPS approved algorithms must be
specified.
All other versions of SSL except version 3.1 must not be used in FIPS mode of operation
The following algorithms are not FIPS approved and should not be used in the FIPS-
approved mode:
MD5
RC4
RC2
DES
3.6

Remote Access

1. Telnet access to the module is only allowed via a secure IPSec tunnel between the remote
system and the module. The Crypto officer must configure the module so that any remote
connections via telnet are secured through IPSec, using FIPS-approved algorithms. Note
that all users must still authenticate after remote access is granted.
2. SSH access to the module is only allowed if SSH is configured to use a FIPS-approved
algorithm. The Crypto officer must configure the module so that SSH uses only FIPS-
approved algorithms. Note that all users must still authenticate after remote access is
granted.
© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
30

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

28112821

Table of Contents