- ページ 3
ネットワーク・ルーター Cisco 2821 SeriesのPDF オペレーションをオンラインで閲覧またはダウンロードできます。Cisco 2821 Series 31 ページ。 2800 series integrated services routers
Cisco 2821 Series にも: インストールとアップグレード (21 ページ), データシート (20 ページ), オペレーション (31 ページ), クイック・スタート・マニュアル (47 ページ)
1
Introduction
1.1
Purpose
This document is the non-proprietary Cryptographic Module Security Policy for the Cisco 2811
and 2821 Integrated Services Routers with AIM-VPN/EPII-Plus installed. This security policy
describes how the Cisco 2811 and 2821 Integrated Services Routers (Hardware Version: 2811 or
2821; Firmware Version: IOS 12.4 (15) T3) meet the security requirements of FIPS 140-2, and
how to operate the router enabled in a secure FIPS 140-2 mode. This policy was prepared as part
of the Level 2 FIPS 140-2 validation of the Cisco 2811 or 2821 Integrated Services router.
FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security
Requirements for Cryptographic Modules) details the U.S. Government requirements for
cryptographic modules. More information about the FIPS 140-2 standard and validation program
is available on the NIST website at http://csrc.nist.gov/groups/STM/index.html.
1.2
References
This document deals only with operations and capabilities of the 2811 and 2821 routers with
AIM modules in the technical terms of a FIPS 140-2 cryptographic module security policy.
More information is available on the routers from the following sources:
The Cisco Systems website contains information on the full line of Cisco Systems
routers. Please refer to the following website:
http://www.cisco.com/en/US/products/hw/routers/index.html
For answers to technical or sales related questions please refer to the contacts listed on
the Cisco Systems website at www.cisco.com.
The NIST Validated Modules website
(http://csrc.nist.gov/groups/STM/cmvp/validation.html) contains contact information
for answers to technical or sales-related questions for the module.
1.3
Terminology
In this document, the Cisco 2811 or 2821 routers are referred to as the router, the module, or the
system.
1.4
Document Organization
The Security Policy document is part of the FIPS 140-2 Submission Package. In addition to this
document, the Submission Package contains:
Vendor Evidence document
Finite State Machine
Other supporting documentation as additional references
This document provides an overview of the routers and explains their secure configuration and
operation. This introduction section is followed by Section 2, which details the general features
© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
3