FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM Introduction This is a non-proprietary Cryptographic Module Security Policy for Cisco Systems. This security policy describes how the 7206 VXR NPE-400 with VPN Acceleration Module (VAM) (Hardware Version: 7206-VXR; VAM: Hardware Version 1.0, Board Version A0; Firmware Version: Cisco IOS software Version12.3(3d)) meets the security requirements of FIPS 140-2 and how to run the module in a secure FIPS 140-2 mode. This policy was prepared as part of the Level 2 FIPS 140-2 validation of the module. Note This document may be copied in its entirety and without modification. All copies must include the copyright notice and statements on the last page. FIPS 140-2 (Federal Information Processing Standards Publication 140-2 -- Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules. More information about the FIPS 140-2 standard and validation program is available on the NIST website at http://csrc.nist.gov/cryptval/. This document includes the following sections: · Introduction, page 1 · FIPS 140-2 Submission Package, page 2 · Overview, page 2 · Cryptographic Module, page 3 · Module Interfaces, page 3 · Roles and Services, page 6 · Physical Security, page 8 · Cryptographic Key Management, page 9 · Self-Tests, page 15 · Secure Operation, page 16 · Obtaining Documentation, page 17 Corporate Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA Copyright © 2004 Cisco Systems, Inc. All rights reserved. FIPS 140-2 Submission Package · Documentation Feedback, page 18 · Obtaining Technical Assistance, page 18 · Obtaining Additional Publications and Information, page 20 FIPS 140-2 Submission Package The Security Policy document is one item in the FIPS 140-2 Submission Package. In addition to this document, the Submission Package includes: · Vendor evidence document · Finite state machine · Module software listing · Other supporting documentation as additional references With the exception of this Non-Proprietary Security Policy, the FIPS 140-2 Validation Submission Documentation is proprietary to Cisco Systems, Inc. and is releasable only under appropriate non-disclosure agreements. For access to these documents, contact Cisco Systems, Inc. See "Obtaining Technical Assistance" section on page 18. Overview Cisco 7206VXR routers support gigabit capabilities to improve data, voice, and video integration in both the service provider and enterprise environments. Cisco 7206VXR routers support a high-speed network services engine (NSE), the high-speed network processing engine (NPE-400), and other network processing engines. Cisco 7206VXR routers accommodate a variety of network interface port adapters and an Input/Output (I/O) controller. A Cisco 7206VXR router equipped with an NPE-400 supports up to six high-speed port adapters and higher-speed port adapter interfaces including Gigabit Ethernet and OC-12 ATM (Optical Carrier-12 Asynchronous Transfer Mode). Cisco 7206VXR routers accommodate up to two AC-input or DC-input power supplies. Cisco 7206VXR routers support the following features: · Online insertion and removal (OIR)--Adds, replaces, or removes port adapters without interrupting the system. · Dual hot-swappable, load-sharing power supplies--Provides system power redundancy; if one power supply or power source fails, the other power supply maintains system power without interruption. Also, when one power supply is powered off and removed from the router, the second power supply immediately takes over the router power requirements without interrupting normal operation of the router. · Environmental monitoring and reporting functions--Maintains normal system operation by resolving adverse environmental conditions prior to loss of operation. · Downloadable software--Loads new images into Flash memory remotely, without having to physically access the router. The Cisco 7206 VXR router incorporates a single VPN Acceleration Module (VAM) cryptographic accelerator card. The VAM is installed in one of the port adapter slots. FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM 2 OL-3959-01 Cryptographic Module Cryptographic Module The Cisco 7206VXR NPE-400 router with VAM is a multiple-chip standalone cryptographic module. The Cisco 7206VXR supports multi-protocol routing and bridging with a wide variety of protocols and port adapter combinations available for Cisco 7200 series routers. The metal casing that fully encloses the module establishes the cryptographic boundary for the router, all the functionality discussed in this document is provided by components within the casing. The Cisco 7206VXR has six slots for port adapters, one slot for an input/output (I/O) controller, and one slot for a network processing engine or network services engine. Figure 1 Cisco 7206VXR NPE-400 Router (Front View) Port adapters TOKEN RING 6 3 2 1 0 5 FAST ETHERNET ETHERNET 10BT D LE 5 K RJ4 AB LINK 4 LIN D 3 MII 2 1 0 LE EN AB 3 1 EN 3 2 0 0 ETHERNET-10BFL FAST SERIAL EN TX RX EN TX RX TX RX CD RC LB RD TX RX TC TD CD RC LB TX RD RX TC 2 TD CD RC LB RD TC TD CD RC LB RD TC TD 4 3 2 1 0 1 Port adapter Cisco 7200 ET FAST ETHERNET INPUT/OUTPUT CONTROLLER 1 II ES T M O R FE SL PU 45 J- C R H5997 Series 0 D LE lever AB EN K R N 5 T O PW 0 IN 5 E J4 IA E II EC L J4 M T K N C R O R 1O EJ M SL PC I/O controller PC card slots Auxiliary Console Optional Fast Ethernet port port port (MII receptacle and RJ-45 receptacle) The Cisco 7206VXR NPE-400 uses an RM7000 microprocessor that operates at an internal clock speed of 350 MHz. The NPE-400 uses SDRAM for storing all packets received or sent from network interfaces. The SDRAM memory array in the system allows concurrent access by port adapters and the processor. The NPE-400 has three levels of cache: a primary and a secondary cache that are internal to the microprocessor, and a tertiary 4-MB external cache that provides additional high-speed storage for data and instructions. The Cisco 7206VXR router comes equipped with one 280W AC-input power supply. (A 280W DC-input power supply option is available.) A power supply filler plate is installed over the second power supply bay. A fully configured Cisco 7206VXR router operates with only one installed power supply; however, a second, optional power supply of the same type provides hot-swappable, load-sharing, redundant power. Module Interfaces The interfaces for the router are located on the front panel Input/Output (I/O) Controller, with the exception of the power switch and power plug. The module has two Fast Ethernet (10/100 RJ-45) connectors for data transfers in and out. The module also has two other RJ-45 connectors for a console terminal for local system access and an auxiliary port for remote system access or dial backup using a modem. FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM OL-3959-01 3 Module Interfaces Table 1 shows the front panel LEDs, which provide overall status of the router operation. The front panel displays whether or not the router is booted, if the redundant power is attached and operational, and overall activity/link status. Figure 2 Cisco 7206VXR Router Front Panel LEDs 1 DUAL FAST ETHERNET INPUT/OUTPUT CONTROLLER C7200-I/O-2FE/E OT K K SL LIN LIN 33444 D LE R AB PW EN IO K O U 0 bp s 0 bp s 1 CP ET E IA EC T OT S AU X OL MC M FE /E M FE /E RE NS PC EJ SL 10 0 10 0 CO 1 OT NK SL LI D LE R AB PW EN IO K O U 0 bp s CP ET OT M RE S SL 10 0 LED Indication Description Enabled Green Indicates that the network processing engine or network services engine and the I/O controller are enabled for operation by the system; however, it does not mean that the Fast Ethernet port on the I/O controller is functional or enabled. This LED goes on during a successful router boot and remains on during normal operation of the router. IO POWER OK Amber Indicates that the I/O controller is on and receiving DC power from the router midplane. This LED comes on during a successful router boot and remains on during normal operation of the router. Off Power off or failed Slot 0 Green These LEDs indicate which PC Card slot is in use by coming on when either slot is being accessed by the Slot 1 system. These LEDs remain off during normal operation of the router. FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM 4 OL-3959-01 Module Interfaces LED Indication Description Link Green Indicates that the Ethernet RJ-45 receptacle has established a valid link with the network. Off This LED remains off during normal operation of the router unless there is an incoming carrier signal. 100 Mbps Green Indicates that the port is configured for 100-Mbps operation (speed 100), or if configured for auto negotiation (speed auto), the port has detected a valid link at 100 Mbps. Off If the port is configured for 10-Mbps operation, or if it is configured for auto negotiation and the port has detected a valid link at 10 Mbps, the LED remains off. The VPN Acceleration Module (VAM) is a single-width acceleration module that provides high-performance, hardware-assisted tunneling and encryption services suitable for virtual private network (VPN) remote access, site-to-site intranet, and extranet applications. It also provides platform scalability and security while working with all services necessary for successful VPN deployments--security, quality of service (QoS), firewall and intrusion detection, and service-level validation and management. The VAM off-loads IPSec processing from the main processor, thus freeing resources on the processor engines for other tasks. The VAM has three LEDs, as shown in Figure 3. Figure 3 VAM LEDs ENCRYPT/COMP LE SA-VAM AB EN T OR B OO ERR 61177 LED Label Color State Function ENABLE Green On Indicates the VAM is powered up and enabled for operation. BOOT Amber Pulses Indicates the VAM is operating. On Indicates the VAM is booting or a packet is being encrypted or decrypted. ERROR Amber On Indicates an encryption error has occurred. This LED is normally off. All physical interfaces are separated into the logical interfaces from FIPS as shown in Table 1 FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM OL-3959-01 5 Roles and Services Table 1 FIPS 140-2 Logical Interface Router Physical Interface FIPS 140-2 Logical Interface 10/100BASE-TX LAN Port Data Input Interface Port Adapter Interface Console Port Auxiliary Port PCMCIA Slot 10/100BASE-TX LAN Port Data Output Interface Port Adapter Interface Console Port Auxiliary Port PCMCIA Slot Power Switch Control Input Interface Console Port Auxiliary Port 10/100BASE-TX LAN Port LEDs Status Output Interface Enabled LED PCMCIA LEDs IO Pwr Ok LED VAM LEDs Console Port Auxiliary Port Power Plug Power Interface In addition to the built-in interfaces, the router also has additional port adapters that can optionally be placed in an available slot. These port adapters have many embodiments, including multiple Ethernet, token ring, and modem cards to handle frame relay, ATM, and ISDN connections. Note These additional port adapters were excluded from this FIPS 140-2 Validation. Roles and Services Authentication is role-based. There are two main roles in the router that operators may assume: the Crypto Officer role and the User role. The administrator of the router assumes the Crypto Officer role to configure and maintain the router using Crypto Officer services, while Users exercise only the basic User services. Both roles are authenticated by providing a valid username and password. The configuration of the encryption and decryption functionality is performed only by the Crypto Officer after authentication to the Crypto Officer role by providing a valid Crypto Officer username and password. Once the Crypto Officer configured the encryption and decryption functionality, the User can use this functionality after authentication to the User role by providing a valid User username and password. The Crypto Officer can also use the encryption and decryption functionality after authentication to the Crypto Officer role. The module supports RADIUS and TACACS+ for authentication and they are used in the FIPS mode. See the Cisco 7206VXR Installation and Configuration Guide for more configuration information. FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM 6 OL-3959-01 Roles and Services The User and Crypto Officer passwords and the RADIUS/TACACS+ shared secrets must each be at least 8 alphanumeric characters in length. See the "Secure Operation" section on page 16 for more information. If only integers 0-9 are used without repetition for an 8 digit PIN, the probability of randomly guessing the correct sequence is 1 in 1,814,400. Including the rest of the alphanumeric characters drastically decreases the odds of guessing the correct sequence. Crypto Officer Role During initial configuration of the router, the Crypto Officer password (the "enable" password) is defined. A Crypto Officer assigns permission to access the Crypto Officer role to additional accounts, thereby creating additional Crypto Officers. The Crypto Officer role is responsible for the configuration and maintenance of the router. The Crypto Officer services consist of the following: · Configures the Router: Defines network interfaces and settings, creates command aliases, sets the protocols the router will support, enables interfaces and network services, sets system date and time, and loads authentication information. · Defines Rules and Filters: Creates packet filters that are applied to User data streams on each interface. Each Filter consists of a set of rules, which define a set of packets to permit or deny based characteristics such as protocol ID, addresses, ports, TCP connection establishment, or packet direction. · Status Functions: Views the router configuration, routing tables, active sessions; views SNMP MIB II statistics, health, temperature, memory status, voltage, packet statistics; reviews accounting logs, and views physical interface status. · Manages the Router: Logs off users, shuts down or reloads the router, manually backs up router configurations, views complete configurations, manager user rights, and restores router configurations. · Sets Encryption/Bypass: Sets up the configuration tables for IP tunneling; sets keys and algorithms to be used for each IP range or allow plaintext packets to be set from specified IP address. · Changes Port Adapters: Inserts and removes adapters in a port adapter slot. User Role A User enters the system by accessing the console port with a terminal program. The IOS prompts the User for their password. If the password is correct, the User is allowed entry to the IOS executive program. The services available to the User role consist of the following: · Status Functions: Views state of interfaces, state of layer 2 protocols, and version of IOS currently running · Network Functions: Connects to other network devices (via outgoing telnet or PPP) and initiates diagnostic network services (i.e., ping, mtrace) · Terminal Functions: Adjusts the terminal session (e.g., lock the terminal, adjust flow control) · Directory Services: Displays directory of files kept in flash memory FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM OL-3959-01 7 Physical Security Physical Security The router is encased in a steel chassis. The front of the router includes six port adapter slots. The rear of the router includes on-board LAN connectors, PC Card slots, and Console/Auxiliary connectors, power cable connection, a power switch, and access to the Network Processing Engine. Any port adapter slot not populated with a port adapter must be populated with a slot cover (blank port adapter) to operate in FIPS compliant mode. Slot covers are included with each router; additional covers may be ordered from Cisco. You apply the same procedure for labeling port adapters covers as for the port adapters. Once the router has been configured to meet FIPS 140-2 Level 2 requirements, the router cannot be accessed without signs of tampering. The word `Open' may appear on the label if it was peeled away from the surface of the module. The Crypto Officer should be instructed to record serial numbers, and to inspect for signs of tampering or changed numbers periodically. To seal the system, apply serialized tamper-evidence labels as described below, and as shown in Figure 4 and Figure 5: Step 1 Clean the cover of any grease, dirt, or oil before applying the tamper evidence labels. Alcohol-based cleaning pads are recommended for this purpose. The ambient air must be above 10C, otherwise the labels may not properly cure. Step 2 The tamper evidence label should be placed so that the one half of the label covers the enclosure and the other half covers the 7206 VXR NPE-400 Input/Output Controller. Step 3 The tamper evidence label should be placed over the Flash PC Card slots on the Input/Output Controller. Step 4 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the port adapter slot 1. Step 5 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the port adapter slot 2. Step 6 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the port adapter slot 3. Step 7 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the port adapter slot 4. Step 8 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the port adapter slot 5. Step 9 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the port adapter slot 6. Step 10 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the network processing engine. Step 11 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the power supply plate. Step 12 The tamper evidence label should be placed so that one half of the label covers the enclosure and the other half covers the redundant power supply plate. Step 13 Allow the labels to cure for five minutes. FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM 8 OL-3959-01 Cryptographic Key Management Figure 4 Tamper Evidence Label Placement (Front View) Port adapters TOKEN RING 6 3 2 1 0 5 FAST ETHERNET ETHERNET 10BT D LE 5 K RJ4 AB LINK 4 LIN D 3 MII 2 1 0 LE EN AB 3 1 EN 3 2 0 0 ETHERNET-10BFL FAST SERIAL EN TX RX EN TX RX TX RX CD RC LB RD TX RX TC TD CD RC LB TX RD RX TC 2 TD CD RC LB RD TC TD CD RC LB RD TC TD 4 3 2 1 0 1 Port adapter Cisco 7200 ET FAST ETHERNET INPUT/OUTPUT CONTROLLER 1 II ES T M O R 119934 FE SL PU 45 J- C R Series 0 D LE lever AB EN K R N 5 T O PW 0 5 E J4 IA E II EC L J4 M T K N C R O IN R 1O EJ M SL PC I/O controller PC card slots Auxiliary Console Optional Fast Ethernet port port port (MII receptacle and RJ-45 receptacle) Figure 5 Tamper Evidence Label Placement (Rear View) Chassis Internal fans grounding receptacles Power supply AC-input filler plate receptacle 119933 NETWORK PROCESSING ENGINE-150 Network processing engine AC-input or network services engine power supply Power switch Cryptographic Key Management The router securely administers both cryptographic keys and other critical security parameters such as passwords. The tamper evidence seals provide physical protection for all keys. All keys are also protected by the password-protection on the Crypto Officer role login, and can be zeroized by the Crypto Officer. Keys are exchanged manually and entered electronically via manual key exchange or Internet Key Exchange (IKE). The modules contain a cryptographic accelerator card (VAM), which provides DES (56-bit) (only for legacy systems), and 3DES (168-bit) IPSec encryption, MD5 and SHA-1 hashing, and has hardware support for DH and RSA key generation. The module supports the following critical security parameters (CSPs): FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM OL-3959-01 9 Cryptographic Key Management The module supports the following critical security parameters (CSPs): Table 2 Critical Security Parameters # CSP Name Description Storage 1 CSP 1 This is the seed key for X9.31 PRNG. This DRAM key is stored in DRAM and updated (plaintext) periodically after the generation of 400 bytes; hence, it is zeroized periodically. Also, the operator can turn off the router to zeroize this key. 2 CSP2 The private exponent used in Diffie-Hellman DRAM (DH) exchange. Zeroized after DH shared (plaintext) secret has been generated. 3 CSP3 The shared secret within IKE exchange. DRAM Zeroized when IKE session is terminated. (plaintext) 4 CSP4 Same as above DRAM (plaintext) 5 CSP5 Same as above DRAM (plaintext) 6 CSP6 Same as above DRAM (plaintext) 7 CSP7 The IKE session encrypt key. The DRAM zeroization is the same as above. (plaintext) 8 CSP8 The IKE session authentication key. The DRAM zeroization is the same as above. (plaintext) 9 CSP9 The RSA private key. "crypto key zeroize" NVRAM command zeroizes this key. (plaintext) 10 CSP10 The key used to generate IKE skeyid during NVRAM preshared-key authentication. The no crypto (plaintext) isakmp key command zeroizes it. This key can have two forms based on whether the key is related to the hostname or the IP address. 11 CSP11 This key generates keys 3, 4, 5 and 6. This DRAM key is zeroized after generating those keys. (plaintext) 12 CSP12 The RSA public key used to validate DRAM signatures within IKE. These keys are (plaintext) expired either when CRL (certificate revocation list) expires or 5 secs after if no CRL exists. After above expiration happens and before a new public key structure is created this key is deleted. This key does not need to be zeroized because it is a public key; however, it is zeroized as mentioned here. 13 CSP13 The fixed key used in Cisco vendor ID NVRAM generation. This key is embedded in the (plaintext) module binary image and can be deleted by erasing the Flash. FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM 10 OL-3959-01 Cryptographic Key Management Table 2 Critical Security Parameters (Continued) # CSP Name Description Storage 14 CSP14 The IPSec encryption key. Zeroized when DRAM IPSec session is terminated. (plaintext) 15 CSP15 The IPSec authentication key. The DRAM zeroization is the same as above. (plaintext) 16 CSP16 The RSA public key of the CA. The no NVRAM crypto ca trust