Cisco 7609-S User Guide - Page 17
Cryptographic Algorithms
View all Cisco 7609-S manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 17 highlights
12-15 Figure 6 - TEL placement for 7609-S 2.5 Cryptographic Algorithms The module implements a variety of approved and non-approved algorithms. 2.5.1 Approved Cryptographic Algorithms The routers support the following FIPS-2 approved algorithm implementations: © Copyright 2011 Cisco Systems, Inc. 17 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
© Copyright 2011 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
17
Figure 6 - TEL placement for 7609-S
2.5
Cryptographic Algorithms
The module implements a variety of approved and non-approved algorithms.
2.5.1
Approved Cryptographic Algorithms
The routers support the following FIPS-2 approved algorithm implementations:
12-15