Cisco Systems 7206VXR NPE-400 manual LED Label Color State Function, Enable, Boot, Error

Page 5

Module Interfaces

LED

Indication

Description

 

 

 

Link

Green

Indicates that the Ethernet RJ-45 receptacle has

 

 

established a valid link with the network.

 

 

 

 

Off

This LED remains off during normal operation of the

 

 

router unless there is an incoming carrier signal.

 

 

 

100 Mbps

Green

Indicates that the port is configured for 100-Mbps

 

 

operation (speed 100), or if configured for auto

 

 

negotiation (speed auto), the port has detected a valid link

 

 

at 100 Mbps.

 

 

 

 

Off

If the port is configured for 10-Mbps operation, or if it is

 

 

configured for auto negotiation and the port has detected a

 

 

valid link at 10 Mbps, the LED remains off.

 

 

 

The VPN Acceleration Module (VAM) is a single-width acceleration module that provides high-performance, hardware-assisted tunneling and encryption services suitable for virtual private network (VPN) remote access, site-to-site intranet, and extranet applications. It also provides platform scalability and security while working with all services necessary for successful VPN deployments—security, quality of service (QoS), firewall and intrusion detection, and service-level validation and management. The VAM off-loads IPSec processing from the main processor, thus freeing resources on the processor engines for other tasks.

The VAM has three LEDs, as shown in Figure 3.

Figure 3

VAM LEDs

 

ENCRYPT/COMP

ENABLE

SA-VAM

 

BOOT ERROR

 

61177

LED Label

Color

State

Function

 

 

 

 

ENABLE

Green

On

Indicates the VAM is powered up and enabled for

 

 

 

operation.

 

 

 

 

BOOT

Amber

Pulses

Indicates the VAM is operating.

 

 

 

 

 

 

On

Indicates the VAM is booting or a packet is being

 

 

 

encrypted or decrypted.

 

 

 

 

ERROR

Amber

On

Indicates an encryption error has occurred. This

 

 

 

LED is normally off.

 

 

 

 

All physical interfaces are separated into the logical interfaces from FIPS as shown in Table 1.

FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM

 

OL-3959-01

5

 

 

 

Image 5
Contents Introduction Overview Fips 140-2 Submission PackageModule Interfaces Cryptographic ModuleIndication Description IO Power OKBoot EnableError LED Label Color State FunctionRouter Physical Interface Fips 140-2 Logical Interface Roles and ServicesUser Role Crypto Officer RolePhysical Security Cryptographic Key Management Cryptographic Key ManagementCSP Name Description Storage CSP15 CSP14CSP16 CSP17CSP26 CSP25CSP27 CSP28Role and Service Access to CSPs Cryptographic Key Management Key Zeroization Self-TestsDES KAT Tdes KAT AES KAT SHA-1 KAT Prng KAT HMAC-SHA-1 KATSecure Operation Initial SetupSystem Initialization and Configuration Obtaining Documentation Remote AccessIPSec Requirements and Cryptographic Algorithms ProtocolsOrdering Documentation Documentation FeedbackObtaining Technical Assistance Cisco Technical Support Website Submitting a Service RequestDefinitions of Service Request Severity Obtaining Additional Publications and Information Obtaining Additional Publications and Information OL-3959-01