Cisco 3745 Руководство пользователя - Страница 27

Просмотреть онлайн или скачать pdf Руководство пользователя для Сетевой маршрутизатор Cisco 3745. Cisco 3745 48 страниц. Non-proprietary security policy
Также для Cisco 3745: Обзор решений (16 страниц), Инструкции по обновлению (30 страниц), Краткое руководство по эксплуатации (33 страниц), Руководство по установке (12 страниц)

Cisco 3745 Руководство пользователя
All of these physical interfaces are separated into the logical interfaces from FIPS as described in
Table
Table 17
Router Physical Interface
10/100BASE-TX LAN Port
Port Adapter Interface
Console Port
Auxiliary Port
PCMCIA Slot
10/100BASE-TX LAN Port
Port Adapter Interface
Console Port
Auxiliary Port
PCMCIA Slot
Power Switch
Console Port
Auxiliary Port
10/100BASE-TX LAN Port LEDs
Enabled LED
PCMCIA LEDs
IO Pwr Ok LED
Console Port
Auxiliary Port
Power Plug
In addition to the built-in interfaces, the router also has additional port adapters that can optionally be
placed in an available slot. These port adapters have many embodiments, including multiple Ethernet,
token ring, and modem cards to handle frame relay, ATM, and ISDN connections.

Roles and Services

Authentication is role-based. There are two main roles in the router that operators may assume: the
Crypto Officer role and the User role. The administrator of the router assumes the Crypto Officer role
in order to configure and maintain the router using Crypto Officer services, while the Users exercise only
the basic User services. Both roles are authenticated by providing a valid username and password. The
configuration of the encryption and decryption functionality is performed only by the Crypto Officer
after authentication to the Crypto Officer role by providing a valid Crypto Officer username and
password. Once the Crypto Officer has configured the encryption and decryption functionality, the User
can use this functionality after authentication to the User role by providing a valid User username and
password. The Crypto Officer can also use the encryption and decryption functionality after
authentication to the Crypto Officer role. The module supports RADIUS and TACACS+ for
authentication and they are used in the FIPS mode. A complete description of all the management and
configuration capabilities of the Cisco Routers can be found in the Performing Basic System
Management manuals and in the online help for the routers.
The User and Crypto Officer passwords and the RADIUS/TACACS+ shared secrets must each be at least
8 alphanumeric characters in length. See the
2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers" section on page 42
Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, and 3745 Modular Access Routers and 7206-VXR NPE-400 Router FIPS 140-2 Non-Proprietary
OL-6083-01
The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers
17.
Cisco 7206 VXR NPE-400 FIPS 140-1 Logical Interfaces
FIPS 140-1 Logical Interface
Data Input Interface
Data Output Interface
Control Input Interface
Status Output Interface
Power Interface
"Secure Operation of the Cisco 1721, 1760, 2621XM,
for more information.
27