© Copyright 2011 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
17
Figure 6 - TEL placement for 7609-S
2.5
Cryptographic Algorithms
The module implements a variety of approved and non-approved algorithms.
2.5.1
Approved Cryptographic Algorithms
The routers support the following FIPS-2 approved algorithm implementations:
12-15