Cisco 2811 Series Операции - Страница 21

Просмотреть онлайн или скачать pdf Операции для Сетевой маршрутизатор Cisco 2811 Series. Cisco 2811 Series 31 страница. 2800 series integrated services routers
Также для Cisco 2811 Series: Информационный лист (20 страниц), Операции (31 страниц), Установка и модернизация (14 страниц), Краткое руководство по эксплуатации (47 страниц)

Cisco 2811 Series Операции
available in the DRAM; therefore this command will completely zeroize this key. The following
command will zeroize the pre-shared keys from the DRAM:
no set session-key inbound ah spi hex-key-data
no set session-key outbound ah spi hex-key-data
no set session-key inbound esp spi cipher hex-key-data [authenticator hex-key-data]
no set session-key outbound esp spi cipher hex-key-data [authenticator hex-key-data]
no crypto isakmp key
The DRAM running configuration must be copied to the start-up configuration in NVRAM in
order to completely zeroize the keys.
The RSA keys are zeroized by issuing the CLI command "crypto key zeroize rsa".
All SSL/TLS session keys are zeroized automatically at the end of the SSL/TLS session.
The module supports the following keys and critical security parameters (CSPs).
Key/CSP
Algorithm
Name
PRNG Seed
X9.31
PRNG Seed
X9.31
Key
Diffie
DH
Hellman
private
exponent
Diffie
DH
Hellman
public key
skeyid
Keyed SHA-1
skeyid_d
Keyed SHA-1
skeyid_a
HMAC-SHA-1
skeyid_e
TRIPLE-
DES/AES
© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
Description
This is the seed for X9.31 PRNG.
This CSP is stored in DRAM and
updated periodically after the
generation of 400 bytes – after this
it is reseeded with router-derived
entropy; hence, it is zeroized
periodically. Also, the operator can
turn off the router to zeroize this
CSP.
This is the seed key for the PRNG.
The private exponent used in
Diffie-Hellman (DH) exchange as
part of IKE. Zeroized after DH
shared secret has been generated.
The public key used in Diffie-
Hellman (DH) exchange as part of
IKE. Zeroized after the DH shared
secret has been generated.
Value derived from the shared
secret within IKE exchange.
Zeroized when IKE session is
terminated.
The IKE key derivation key for non
ISAKMP security associations.
The ISAKMP security association
authentication key.
The ISAKMP security association
encryption key.
21
Storage
Zeroization Method
Location
DRAM
Automatically every 400
bytes, or turn off the
router.
DRAM
Turn off the router
DRAM
Automatically after
shared secret generated.
DRAM
Automatically after
shared secret generated.
DRAM
Automatically after IKE
session terminated.
DRAM
Automatically after IKE
session terminated.
DRAM
Automatically after IKE
session terminated.
DRAM
Automatically after IKE
session terminated.