Cryptographic Key Management
Figure 4 Tamper Evidence Label Placement (Front View)
Port adapters
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 6 |
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ETHERNET 10BT |
|
|
|
|
|
|
|
|
|
|
|
|
| FAST ETHERNET |
| |||
| ENABLED |
|
|
| M |
| L |
| K | R |
| 5 |
|
|
|
|
|
| |
|
|
|
|
| II | IN | J 4 |
|
|
|
|
| 4 | ||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||||
3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 0 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| FAST SERIAL | EN |
|
|
|
|
|
|
|
|
|
|
|
|
| X |
| ||
|
| TX | RX | TX | RX |
|
|
| TX |
|
| RX | TX | R | X | T | 2 | ||
|
| RX |
|
|
|
|
| 4 |
| ||||||||||
1 |
|
| 0 |
| 1 | 2 |
|
|
|
|
|
|
| 3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Port adapter | Cisco 7200 |
|
|
| SLOT | 1 | FE | MII |
|
| FAST ETHERNET INPUT/OUTPUT CONTROLLER | |
|
|
|
|
|
|
|
| |||||
lever | Series | ENABLED |
|
|
|
|
|
|
|
|
| 0 |
|
|
|
|
|
|
|
|
|
| |||
|
|
|
|
|
|
|
|
|
|
| ||
| PCMCIA | EJECT | SLOT | 0 |
|
| EN | EN | LINK |
|
| |
|
|
|
|
|
|
|
| MII | RJ45 | RJ45 |
|
|
I/O controller |
|
|
|
|
|
|
|
|
|
|
|
|
|
| PC card slots |
|
|
|
|
|
|
| Auxiliary | Console | |
|
|
| Optional Fast Ethernet port | port | port | |||||||
|
|
| (MII receptacle and |
|
119934
Figure 5 Tamper Evidence Label Placement (Rear View)
Chassis | Internal fans | |
grounding | ||
| ||
receptacles | ||
Power supply | ||
filler plate | receptacle |
| 119933 |
| NETWORK PROCESSING |
Network processing engine | |
or network services engine | power supply |
Power switch |
Cryptographic Key Management
The router securely administers both cryptographic keys and other critical security parameters such as passwords. The tamper evidence seals provide physical protection for all keys. All keys are also protected by the
The modules contain a cryptographic accelerator card (VAM), which provides DES
The module supports the following critical security parameters (CSPs):
FIPS
| 9 |
| |
|
|