
17
Cisco 2811 and Cisco 2821 Integrated Services Router FIPS 140-2 Non Proprietary Security Policy
OL-8663-01
Cisco 2811 and Cisco 2821 Routers
ISAKMP
preshared
Secret
The key used to generate IKE skeyid during
preshared-key authentication. “no crypto isakmp
key” command zeroizes it. This key can have two
forms based on whether the key is related to the
hostname or the IP address.
NVRAM
(plaintext )
“# no crypto isakmp
key”
IKE hash key
SHA-1
HMAC
This key generates the IKE shared secret keys.
This key is zeroized after generating those keys.
DRAM
(plaintext)
secret_1_0_0
The fixed key used in Cisco vendor ID generation.
This key is embedded in the module binary image
and can be deleted by erasing the Flash.
NVRAM
(plaintext)
IPSec
encryption key
DES/TDES
/AES
The IPSec encryption key. Zeroized when IPSec
session is terminated.
DRAM
(plaintext)
Automatically when
IPSec session
terminated.
IPSec
authentication
key
SHA-1
HMAC or
DES MAC
The IPSec authentication key. The zeroization is
the same as above.
DRAM
(plaintext)
Automatically when
IPSec session
terminated.
Configuration
encryption key
AES
The key used to encrypt values of the
configuration file. This key is zeroized when the
“no key config-key” is issued. Note that this
command does
not
decrypt the configuration file,
so zeroize with care.
NVRAM
(plaintext )
“# no key config-key”
Router
authentication
key 1
Shared
secret
This key is used by the router to authenticate itself
to the peer. The router itself gets the password
(that is used as this key) from the AAA server and
sends it onto the peer. The password retrieved
from the AAA server is zeroized upon completion
of the authentication attempt.
DRAM
(plaintext)
Automatically upon
completion of
authentication attempt.
PPP
authentication
key
RFC 1334
The authentication key used in PPP. This key is in
the DRAM and not zeroized at runtime. One can
turn off the router to zeroize this key because it is
stored in DRAM.
DRAM
(plaintext)
Turn off the router.
Router
authentication
key 2
Shared
Secret
This key is used by the router to authenticate itself
to the peer. The key is identical to Router
authentication key 1 except that it is retrieved
from the local database (on the router itself).
Issuing the “no username password” zeroizes the
password (that is used as this key) from the local
database.
NVRAM
(plaintext)
“# no username
password”
SSH session
key
Various
symmetric
This is the SSH session key. It is zeroized when
the SSH session is terminated.
DRAM
(plaintext)
Automatically when
SSH session terminated
User password Shared
Secret
The password of the User role. This password is
zeroized by overwriting it with a new password.
NVRAM
(plaintext)
Overwrite with new
password
Enable
password
Shared
Secret
The plaintext password of the CO role. This
password is zeroized by overwriting it with a new
password.
NVRAM
(plaintext)
Overwrite with new
password
Table 9
Cryptographic Keys and CSPs (Continued)