Cisco 3825 Series Политика безопасности, не связанная с собственностью - Страница 23
Просмотреть онлайн или скачать pdf Политика безопасности, не связанная с собственностью для Сетевой маршрутизатор Cisco 3825 Series. Cisco 3825 Series 30 страниц. Integrated services routers
Также для Cisco 3825 Series: Установка и модернизация (20 страниц), Краткое руководство по эксплуатации (38 страниц), Краткое руководство по эксплуатации (40 страниц)
Secure Operation of the Cisco 3825 or Cisco 3845 router
The Cisco 3825 and Cisco 3845 routers meet all the Level 2 requirements for FIPS 140-2. Follow the
setting instructions provided below to place the module in FIPS-approved mode. Operating this router
without maintaining the following settings will remove the module from the FIPS approved mode of
operation.
Initial Setup
•
•
Once Password Recovery is disabled, administrative access to the module without the password will not
Note
be possible.
System Initialization and Configuration
•
•
•
•
•
OL-8662-01
The Crypto Officer must apply tamper evidence labels as described in the
section on page 13
of this document.
The Crypto Officer must disable IOS Password Recovery by executing the following commands:
configure terminal
no service password-recovery
end
show version
The Crypto Officer must perform the initial configuration. IOS version 12.3(11)T03, Advanced
Security build (advsecurity) is the only allowable image; no other image should be loaded.
The value of the boot field must be 0x0102. This setting disables break from the console to the ROM
monitor and automatically boots the IOS image. From the "configure terminal" command line, the
Crypto Officer enters the following syntax:
config-register 0x0102
The Crypto Officer must create the "enable" password for the Crypto Officer role. The password
must be at least 8 characters to include at least one number and one letter and is entered when the
Crypto Officer first engages the "enable" command. The Crypto Officer enters the following syntax
at the "#" prompt:
enable secret [PASSWORD]
The Crypto Officer must always assign passwords (of at least 8 characters) to users. Identification
and authentication on the console port is required for Users. From the "configure terminal"
command line, the Crypto Officer enters the following syntax:
line con 0
password [PASSWORD]
login local
RADIUS and TACACS+ shared secret key sizes must be at least 8 characters long, and must include
at least one number and one letter.
Cisco 3825 and Cisco 3845 Integrated Services Routers FIPS 140-2 Non Proprietary Security Policy
Secure Operation of the Cisco 3825 or Cisco 3845 router
"Physical Security"
23