Cisco 3825 Series Tescilli Olmayan Güvenlik Politikası - Sayfa 19

Ağ Yönlendiricisi Cisco 3825 Series için çevrimiçi göz atın veya pdf Tescilli Olmayan Güvenlik Politikası indirin. Cisco 3825 Series 30 sayfaları. Integrated services routers
Ayrıca Cisco 3825 Series için: Kurulum ve Yükseltmeler (20 sayfalar), Hızlı Başlangıç Kılavuzu (38 sayfalar), Hızlı Başlangıç Kılavuzu (40 sayfalar)

Cisco 3825 Series Tescilli Olmayan Güvenlik Politikası
Table 8
Cryptographic Keys and CSPs (Continued)
Enable secret
Shared
Secret
RADIUS secret Shared
Secret
TACACS+
Shared
secret
Secret
All RSA operations are prohibited by policy, and commands that can be executed by Officer are shown
Note
"# command".
.
Table 9
SRDI/Role/Service Access Policy
Security Relevant Data Item
PRNG Seed
DH private exponent
DH public key
OL-8662-01
The ciphertext password of the CO role. However,
the algorithm used to encrypt this password is not
FIPS approved. Therefore, this password is
considered plaintext for FIPS purposes. This
password is zeroized by overwriting it with a new
password.
The RADIUS shared secret. This shared secret is
zeroized by executing the "no radius-server key"
command.
The TACACS+ shared secret. This shared secret is
zeroized by executing the "no tacacs-server key"
command.
Role and Service Access to CSP
Cisco 3825 and Cisco 3845 Integrated Services Routers FIPS 140-2 Non Proprietary Security Policy
Cisco 3825 and Cisco 3845 Routers
NVRAM
Overwrite with new
(plaintext or
password
encrypted)
NVRAM
"# no radius-server key"
(plaintext or
encrypted),
DRAM
(plaintext)
NVRAM
"# no tacacs-server key"
(plaintext or
encrypted),
DRAM
(plaintext)
r
r
r
d
r
w
d
r
w
d
r
w
d
19