FIPS 140-2 Validation Certificate The National Institute of Standards and Technology of the United States of America · The Communications Security Establishment of the Government of Canada Certificate No. 1036 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the Cryptographic Module identified as: Cisco 1841 Integrated Services Routers with AIM-VPN/BPII-Plus and Cisco 2801 Integrated Services Routers with AIM-VPN/EPII-Plus by Cisco Systems, Inc. (When operated in FIPS mode) in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems). Products which use the above identified cryptographic module may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM; A Cemtlcallon Mark o~ NIST, which does not Imply product endorsement by NtST, 1he U,S , or Canadian Governments FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Cisco 1841 Integrated Services Routers with AIM-VPN/BPII-Plus and Cisco 2801 Integrated Services Routers with AIM-VPN/EPII-Plus by Cisco Systems, Inc. (Hardware Versions: 1841 and 2801; AIM-VPN/BPII-Plus Version: 1.0, Board Version: C1; AIM-VPN/EPII-Plus Version: 1.0, Board Version: DO; Firmware Version: 12.4(15)T3; Hardware) Atlan Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 2 Cryptographic Module Ports and Interfaces: Level 2 Roles, Services, and Authentication: Level 2 Finite State Model: Level 2 Physical Security: Level 2 Cryptographic Key Management: Level 2 (Multi-Chip Standalone) EMlfEMC: Level 2 Self- Tests: Level 2 Design Assurance: Level 2 Mitigation of Other Attacks: Level N/A Operational Environment: Level N/A tested in the foflowing configuration(s): N/A The following FIPS approved Cryptographic Algorithms are used: AES (Certs. #100, #181 and #795); HMAC (Certs. #27, #38 and #436); RNG (Certs. #80 and #456); RSA (Certs. #379 and #383); SHS (Certs. #267, #401 and #794); Triple-DES (Certs. #213, #283 and #683) The cryptographic module also contains the following non-FIPS approved algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 80 or 96 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 80 and 112 bits of encryption strength); MD5; HMAC-MD5; RC4; DES Overall Level Achieved: 2 Signed on behalf 9f ~~9overnment of the United States Signed on behalf of the Government of Canada Signature: 9r./~ ~~v/ Signature: ~-.............. ~~ ~ ==::::::; Dated: O~/~ 2cJO Y Dated: 0 C '\:Db.:-r 3( d-~'t;. Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada FIPS 140-2 Validation Certificate The National Institute of Standards and Technology of the United States of America · The Communications Security Establishment of the Government of Canada Certificate No. 1037 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the Cryptographic Module identified as: Cisco 1841 and Cisco 2801 Integrated Services Routers by Cisco Systems, Inc. (When operated in FIPS mode) in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems). Products which use the above identified cryptographic module may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM- A CertUlcallO.... Marl< 01 NIST, which does nOllmply product endorsement by NIST the U S" or Canadian Governmems. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Cisco 1841 and Cisco 2801 Integrated Services Routers by Cisco Systems, Inc. (Hardware Versions: 1841 and 2801; Firmware Version: 12.4(15)T3; Hardware) Atlan Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 2 Cryptographic Module Ports and Interfaces: Level 2 Roles, Services, and Authentication: Level 2 Finite State Model: Level 2 Physical Security: Level 2 Cryptographic Key Management: Level 2 (Multi-Chip Standalone) EMlfEMC: Level 2 Self- Tests: Level 2 Design Assurance: Level 2 Mitigation of Other Attacks: Level N/A Operational Environment: Level N/A tested in the following configuration(s): N/A The following FIPS approved Cryptographic Algorithms are used: AES (Certs. #181 and #795); HMAC (Certs. #27 and #436); RNG (Cert. #456); RSA (Cert. #379); SHS (Certs. #267 and #794); Triple-DES (Certs. #283 and #683) The cryptographic module also contains the following non-FIPS approved algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 80 or 96 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 80 and 112 bits of encryption strength); MD5; HMAC-MD5; RC4; DES Overall Level Achieved: 2 Signed on behalf of the Government of the United States Signed on behalf of the Government of Canada fr.J~ ~/ Signature: Signature: c.--~ c::s ~ Dated: O~ /Lj; 2cJt::ft' Dated'. o<----1=6e-/' ~/ ·d..00 c( Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada FIPS 140-2 Validation Certificate The National Institute of Standards and Technology of the United States of America · The Communications Security Establishment of the Government of Canada Certificate No.1 038 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FIPS 140-2 testing results of the Cryptographic Module identified as: Cisco 2811 and Cisco 2821 Integrated Services Routers by Cisco Systems, Inc. (When operated in FIPS mode) in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (inclUding voice systems). Products which use the above identified cryptographic module may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM. A CeJ1iflcatlon Mark of NISr. which does not Imply prOduCt endorsement by NIST, the U.S., or Canadian Governments. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Cisco 2811 and Cisco 2821 Integrated Services Routers by Cisco Systems, Inc. (Hardware Versions: 2811 and 2821; Firmware Version: 12.4(15)T3; Hardware) At/an Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 2 Cryptographic Module Ports and Interfaces: Level 2 Roles, Services, and Authentication: Level 2 Finite State Model: Level 2 Physical Security: Level 2 Cryptographic Key Management' Level 2 (Multi-Chip Standalone) EMlfEMC: Level 2 Self- Tests: Level 2 Design Assurance: Level 2 Mitigation of Other Attacks: Level N/A Operational Environment: Level N/A tested in the following configuration(s): N/A The following FIPS approved Cryptographic Algorithms are used: AES (Certs. #265 and #795); HMAC (Certs. #77 and #436); RNG (Cert. #456); RSA (Cert. #379); SHS (Certs. #344 and #794); Triple-DES (Certs. #347 and #683) The cryptographic module also contains the following non-FIPS approved algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 80 or 96 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 80 and 112 bits of encryption strength); MD5; HMAC-MD5; RC4; DES Overall Level Achieved: 2 Signed on be~lf 7f the ~overnment of the United States Signed on behalf of the Government of Canada Signature: V~-! ~ Signature: ~ ~ ~ Dated: O~ /Lf,l 2cJCJ 51 Dated: OC+-O~· 3) ';;)u:J{, Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada FIPS 140-2 Validation Certificate ., The National Institute of Standards The Communications Security and Technology of the United States Establishment of the Government of America of Canada Certificate NO.1 039 The National Institute of Standards and Technology, as the United States FIPS 140-2 Cryptographic Module Validation Authority; and the Communications Security Establishment, as the Canadian FIPS 140-2 Cryptographic Module Validation Authority; hereby validate the FI PS 140-2 testing results of the Cryptographic Module identified as: Cisco 2851 Integrated Services Router by Cisco Systems, Inc. (When operated in FIPS mode) in accordance with the Derived Test Requirements for FIPS 140-2, Security Requirements for Cryptographic Modules. FIPS 140-2 specifies the security requirements that are to be satisfied by a cryptographic module utilized within a security system protecting Sensitive Information (United States) or Protected Information (Canada) within computer and telecommunications systems (including voice systems). Products which use the above identified cryptographic module may be labeled as complying with the requirements of FIPS 140-2 so long as the product, throughout its life cycle, continues to use the validated version of the cryptographic module as specified in this certificate. The validation report contains additional details concerning test results. No reliability test has been performed and no warranty of the products by both agencies is either expressed or implied. This certificate includes details on the scope of conformance and validation authority signatures on the reverse. TM: A Certification Mark 01 NIST. which does not Imply producl endorsement by NIST. the US, or Canadian Governmenrs. FIPS 140-2 provides four increasing, qualitative levels of security: Level 1, Level 2, Level 3, and Level 4. These levels are intended to cover the wide range and potential applications and environments in which cryptographic modules may be employed. The security requirements cover eleven areas related to the secure design and implementation of a cryptographic module. The scope of conformance achieved by the cryptographic modules as tested in the product identified as: Cisco 2851 Integrated Services Router by Cisco Systems, Inc. (Hardware Version: 2851; Firmware Version: 12.4(15)T3; Hardware) At/an Laboratories, NVLAP Lab Code 200492-0 and tested by the Cryptographic Module Testing accredited laboratory: CRYPTIK Version 7.0 is as follows: Cryptographic Module Specification: Level 2 Cryptographic Module Ports and Interfaces: Level 2 Roles, Services, and Authentication: Level 2 Finite State Model: Level 2 Physical Security: Level 2 Cryptographic Key Management: Level 2 (Multi-Chip Standalone) EMlfEMC: Level 2 Self-Tests: Level 2 Design Assurance: Level 2 Mitigation of Other Attacks: Level N/A Operational Environment: Level N/A tested in the following configuration(s): N/A The following FIPS approved Cryptographic Algorithms are used: AES (Certs. #96 and #795); HMAC (Certs. #50 and #436); RNG (Cert. #456); RSA (Cert. #379); SHS (Certs. #317 and #794); Triple-DES (Certs. #210 and #683) The cryptographic module also contains the following non-FIPS approved algorithms: Diffie-Hellman (key agreement; key establishment methodology provides 80 or 96 bits of encryption strength); RSA (key wrapping; key establishment methodology provides between 80 and 112 bits of encryption strength); MD5; HMAC·MD5; RC4; DES Overall Level Achieved: 2 Signed on behalf O~he ~overnm;,n~the Uy-ted States Signed on behalf of the Government of Canada Signature:~P~ Signature: ~~~~~ Dated: O~/~/ 2.~C/g' > Dated: oc+Ob>-r 2>/ '~o0'6 Chief, Computer Security Division Director, Industry Program Group National Institute of Standards and Technology Communications Security Establishment Canada