Cisco 7609-S User Guide - Page 17

Cryptographic Algorithms

Page 17 highlights

12-15 Figure 6 - TEL placement for 7609-S 2.5 Cryptographic Algorithms The module implements a variety of approved and non-approved algorithms. 2.5.1 Approved Cryptographic Algorithms The routers support the following FIPS-2 approved algorithm implementations: © Copyright 2011 Cisco Systems, Inc. 17 This document may be freely reproduced and distributed whole and intact including this Copyright Notice.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22

© Copyright 2011 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
17
Figure 6 - TEL placement for 7609-S
2.5
Cryptographic Algorithms
The module implements a variety of approved and non-approved algorithms.
2.5.1
Approved Cryptographic Algorithms
The routers support the following FIPS-2 approved algorithm implementations:
12-15