Cisco 2811 Series Opérations - Page 22

Parcourez en ligne ou téléchargez le pdf Opérations pour {nom_de_la_catégorie} Cisco 2811 Series. Cisco 2811 Series 31 pages. 2800 series integrated services routers
Également pour Cisco 2811 Series : Fiche technique (20 pages), Installation et mise à niveau (14 pages), Opérations (31 pages), Manuel de démarrage rapide (47 pages)

Cisco 2811 Series Opérations
Secure Operation of the Cisco 2811 or Cisco 2821 router
Secure Operation of the Cisco 2811 or Cisco 2821 router
The Cisco 2811 and Cisco 2821 routers meet all the Level 2 requirements for FIPS 140-2. Follow the
setting instructions provided below to place the module in FIPS-approved mode. Operating this router
without maintaining the following settings will remove the module from the FIPS approved mode of
operation.

Initial Setup

Once Password Recovery is disabled, administrative access to the module without the password will not
Note
be possible.

System Initialization and Configuration

Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy
22
3DES Known Answer Test
SHA-1 Known Answer Test
HMAC-SHA-1 Known Answer Test
The Crypto Officer must apply tamper evidence labels as described in the
section on page 12
of this document.
The Crypto Officer must disable IOS Password Recovery by executing the following commands:
configure terminal
no service password-recovery
end
show version
The Crypto Officer must perform the initial configuration. IOS version 12.3(11)T03, Advanced
Security build (advsecurity) is the only allowable image; no other image should be loaded.
The value of the boot field must be 0x0102. This setting disables break from the console to the ROM
monitor and automatically boots the IOS image. From the "configure terminal" command line, the
Crypto Officer enters the following syntax:
config-register 0x0102
The Crypto Officer must create the "enable" password for the Crypto Officer role. The password
must be at least 8 characters to include at least one number and one letter and is entered when the
Crypto Officer first engages the "enable" command. The Crypto Officer enters the following syntax
at the "#" prompt:
enable secret [PASSWORD]
The Crypto Officer must always assign passwords (of at least 8 characters) to users. Identification
and authentication on the console port is required for Users. From the "configure terminal"
command line, the Crypto Officer enters the following syntax:
line con 0
password [PASSWORD]
login local
"Physical Security"
OL-8663-01