Cisco 7206VXR NPE-400 User Manual
Page 12

12
FIPS 140-2 Nonproprietary Security Policy for Cisco 7206VXR NPE-400 Router with VAM
OL-3959-01
Cryptographic Key Management
The services accessing the CSPs, the type of access and which role accesses the CSPs are listed in the
25
CSP25
This key is used by the router to authenticate
itself to the peer. The key is identical to #22
except that it is retrieved from the local
database (on the router itself). Issuing the no
username password command zeroizes the
password (that is used as this key) from the
local database.
NVRAM
(plaintext)
26
CSP26
This is the SSH session key. It is zeroized
when the SSH session is terminated.
DRAM
(plaintext)
27
CSP27
The password of the User role. This
password is zeroized by overwriting it with a
new password.
NVRAM
(plaintext)
28
CSP28
The plaintext password of the Crypto Officer
role. This password is zeroized by
overwriting it with a new password.
NVRAM
(plaintext)
29
CSP29
The ciphertext password of the Crypto
Officer role. However, the algorithm used to
encrypt this password is not FIPS approved.
Therefore, this password is considered
plaintext for FIPS purposes. This password
is zeroized by overwriting it with a new
password.
NVRAM
(plaintext)
30
CSP30
The RADIUS shared secret. This shared
secret is zeroized by executing the “no” form
of the RADIUS shared secret set command.
DRAM
(plaintext),
NVRAM
(plaintext)
31
CSP31
The TACACS+ shared secret. This shared
secret is zeroized by executing the “no” form
of the TACACS+ shared secret set command.
DRAM
(plaintext),
NVRAM
(plaintext)
Table 2
Critical Security Parameters (Continued)
#
CSP Name
Description
Storage