16
Cisco 1841 Integrated Services Router with AIM-VPN/BPII-Plus and Cisco 2801 Integrated Services Router with AIM-VPN/EPII-Plus
OL-8719-01
Cisco 1841 and Cisco 2801 Routers
Note
All RSA operations are prohibited by policy, and commands that can be executed by Officer are shown
“# command”.
Router
authentication
key 2
Shared
Secret
This key is used by the router to authenticate
itself to the peer. The key is identical to Router
authentication key 1 except that it is retrieved
from the local database (on the router itself).
Issuing the “no username password” zeroizes the
password (that is used as this key) from the local
database.
NVRAM
(plaintext)
“# no username password”
SSH session
key
Various
symmetric
This is the SSH session key. It is zeroized when
the SSH session is terminated.
DRAM
(plaintext)
Automatically when SSH
session terminated
User password
Shared
Secret
The password of the User role. This password is
zeroized by overwriting it with a new password.
NVRAM
(plaintext)
Overwrite with new
password
Enable
password
Shared
Secret
The plaintext password of the CO role. This
password is zeroized by overwriting it with a new
password.
NVRAM
(plaintext)
Overwrite with new
password
Enable secret
Shared
Secret
The ciphertext password of the CO role.
However, the algorithm used to encrypt this
password is not FIPS approved. Therefore, this
password is considered plaintext for FIPS
purposes. This password is zeroized by
overwriting it with a new password.
NVRAM
(plaintext)
Overwrite with new
password
RADIUS secret Shared
Secret
The RADIUS shared secret. This shared secret is
zeroized by executing the “no radius-server key”
command.
NVRAM
(plaintext),
DRAM
(plaintext)
“# no radius-server key”
secret
Shared
Secret
The shared secret. This shared secret
is zeroized by executing the “no tacacs-server
key” command.
NVRAM
(plaintext),
DRAM
(plaintext)
“# no tacacs-server key”
Table 8
Cryptographic Keys and CSPs (Continued)