Cisco CISCO2851 User Guide - Page 2

Cisco 2851 Routers

Page 2 highlights

Cisco 2851 Routers References This document deals only with operations and capabilities of the Cisco 2851 Integrated Services Router in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is available on the routers from the following sources: • The Cisco Systems website contains information on the full line of Cisco Systems routers. Please refer to the following website: http://www.cisco.com/en/US/products/hw/routers/index.html • For answers to technical or sales related questions please refer to the contacts listed on the Cisco Systems website at www.cisco.com. • The NIST Validated Modules website (http://csrc.nist.gov/cryptval) contains contact information for answers to technical or sales-related questions for the module. Terminology In this document, the Cisco 2851 router is referred to as the router, the module, or the system. Document Organization The Security Policy document is part of the FIPS 140-2 Submission Package. In addition to this document, the Submission Package contains: • Vendor Evidence document • Finite State Machine • Other supporting documentation as additional references This document provides an overview of the routers and explains their secure configuration and operation. This introduction section is followed by the "Cisco 2851 Routers" section on page 2, which details the general features and functionality of the router. The "Secure Operation of the Cisco 2851 Router" section on page 17 specifically addresses the required configuration for the FIPS-mode of operation. With the exception of this Non-Proprietary Security Policy, the FIPS 140-2 Validation Submission Documentation is Cisco-proprietary and is releasable only under appropriate non-disclosure agreements. For access to these documents, please contact Cisco Systems. Cisco 2851 Routers Branch office networking requirements are dramatically evolving, driven by web and e-commerce applications to enhance productivity and merging the voice and data infrastructure to reduce costs. The Cisco 2851 routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 2 requirements. This section describes the general features and functionality provided by the routers. The following subsections describe the physical characteristics of the routers. Cisco 2851 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy 2 OL-8717-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24

2
Cisco 2851 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy
OL-8717-01
Cisco 2851 Routers
References
This document deals only with operations and capabilities of the Cisco 2851 Integrated Services Router
in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is
available on the routers from the following sources:
The Cisco Systems website contains information on the full line of Cisco Systems routers. Please
refer to the following website:
For answers to technical or sales related questions please refer to the contacts listed on the Cisco
Systems website at
www.cisco.com
.
The NIST Validated Modules website (
) contains contact information
for answers to technical or sales-related questions for the module.
Terminology
In this document, the Cisco 2851 router is referred to as the router, the module, or the system.
Document Organization
The Security Policy document is part of the FIPS 140-2 Submission Package. In addition to this
document, the Submission Package contains:
Vendor Evidence document
Finite State Machine
Other supporting documentation as additional references
This document provides an overview of the routers and explains their secure configuration and
operation. This introduction section is followed by the
“Cisco 2851 Routers” section on page 2
, which
details the general features and functionality of the router. The
“Secure Operation of the Cisco 2851
Router” section on page 17
specifically addresses the required configuration for the FIPS-mode of
operation.
With the exception of this Non-Proprietary Security Policy, the FIPS 140-2 Validation Submission
Documentation is Cisco-proprietary and is releasable only under appropriate non-disclosure agreements.
For access to these documents, please contact Cisco Systems.
Cisco 2851 Routers
Branch office networking requirements are dramatically evolving, driven by web and e-commerce
applications to enhance productivity and merging the voice and data infrastructure to reduce costs. The
Cisco 2851 routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2
Level 2 requirements. This section describes the general features and functionality provided by the
routers. The following subsections describe the physical characteristics of the routers.