EasyManua.ls Logo

Cisco Catalyst 4503-E - Page 45

Cisco Catalyst 4503-E
88 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Cisco Cat4K NDPP ST 11 March 2014
EDCS-1228241
45
SHA 256, SHA-512] and message digest sizes [160, 256, 512]
bits that meet the following: FIPS Pub 180-3 “Secure Hash
Standard.”
5.2.2.6 FCS_COP.1(4): Cryptographic operation (for keyed-hash message
authentication)
FCS_COP.1.1(4) The TSF shall perform [keyed-hash message authentication] in
accordance with a specified cryptographic algorithm HMAC-
[SHA-1, SHA-256, SHA-512], key size [128, 192, 256 bits],
and message digest sizes [160, 256, 512] bits that meet the
following: FIPS Pub 198-1 “The Keyed-Hash Message
Authentication Code”, and FIPS PUB 180-3, “Secure Hash
Standard.”
5.2.2.7 FCS_RBG_EXT.1: Cryptographic operation (random bit generation)
FCS_RBG_EXT.1.1 The TSF shall perform all random bit generation (RBG)
services in accordance with [NIST Special Publication 800-
90 using CTR_DRBG (AES)] seeded by an entropy source
that accumulated entropy from at least one independent TSF-
hardware-based noise source.
FCS_RBG_EXT.1.2 The deterministic RBG shall be seeded with a minimum of
[256 bits] of entropy at least equal to the greatest length of
the keys and authorization factors that it will generate.
5.2.2.8 FCS_COMM_PROT_EXT.1: Communications protection
FCS_COMM_PROT_EXT.1.1 The TSF shall protect communications using
[IPsec, SSH] and [no other protocol].
5.2.2.9 FCS_IPSEC_EXT.1: IPSEC
FCS_IPSEC_EXT.1.1 The TSF shall implement IPsec using the ESP protocol as
defined by RFC 4303 using the cryptographic algorithms
AES-CBC-128, AES-CBC-256 (both specified by RFC
3602), [no other algorithms] and using IKEv1 as defined
in RFCs 2407, 2408, 2409, and RFC 4109, [no other
methods] to establish the security association.
FCS_IPSEC_EXT.1.2 The TSF shall ensure that IKEv1 Phase 1 exchanges use
only main mode.

Table of Contents

Related product manuals