Page 2 of 72 
 
Table of Contents 
1  Introduction ............................................................................................................................. 7 
1.1  Audience ......................................................................................................................... 7 
1.2  Purpose ............................................................................................................................ 7 
1.3  Document References ..................................................................................................... 7 
1.4  Supported Hardware and Software ................................................................................. 9 
1.5  Operational Environment ................................................................................................ 9 
1.5.1  Supported non-TOE Hardware/Software/Firmware ................................................... 9 
1.6  Excluded Functionality ................................................................................................. 10 
2  Secure Acceptance of the TOE ............................................................................................. 11 
3  Secure Installation and Configuration .................................................................................. 16 
3.1  Physical Installation ...................................................................................................... 16 
3.2  Initial Setup via Direct Console Connection ................................................................ 16 
3.2.1  Options to be chosen during the initial setup of the ASR ......................................... 16 
3.2.2  Saving Configuration ................................................................................................ 16 
3.2.3  Enabling FIPS Mode ................................................................................................. 17 
3.2.4  Administrator Configuration and Credentials ........................................................... 17 
3.2.5  Session Termination.................................................................................................. 17 
3.2.6  User Lockout ............................................................................................................. 18 
3.3  Network Protocols and Cryptographic Settings ............................................................ 19 
3.3.1  Remote Administration Protocols ............................................................................. 19 
3.3.2  Authentication Server Protocols ............................................................................... 20 
3.3.3  Logging Configuration.............................................................................................. 20 
3.3.4  Logging Protection.................................................................................................... 22 
3.3.5  Base Firewall Rule set Configuration ....................................................................... 24 
3.3.6  Routing Protocols...................................................................................................... 26 
3.3.7  MACSEC and MKA Configuration.......................................................................... 26 
4  Secure Management .............................................................................................................. 27 
4.1  User Roles ..................................................................................................................... 27 
4.2  Passwords ...................................................................................................................... 27 
4.3  Clock Management ....................................................................................................... 30