Cisco asa 5505 v11
This security policy describes how the modules meet the security requirements of FIPS Level 2 and how to run the modules in a FIPS mode of operation and may be freely distributed. 28ģ 1 Introduction 1.1 Purpose This is a non-proprietary Cryptographic Module Security Policy for the Cisco ASA 5500 Series Adaptive Security Appliances running Firmware referred to in this document as appliances.
1 Cisco ASA 5505, ASA 5510, ASA 5520, ASA 5540, ASA 5550, ASA, ASA, ASA 5585-X SSP-10, 5585-X SSP-20, 5585-X SSP-X SSP-60 Security Appliances FIPS Non Proprietary Security Policy Level 2 Validation Version 0.2 February 19, 2013Ģ Table of Contents 1 INTRODUCTION PURPOSE MODELS MODULE VALIDATION LEVEL REFERENCES TERMINOLOGY DOCUMENT ORGANIZATION CISCO ASA 5500 SECURITY APPLIANCES ASA 5500 AND CRYPTOGRAPHIC MODULE PHYSICAL CHARACTERISTICS MODULE INTERFACES ROLES AND SERVICES User Services Crypto Officer Services UNAUTHENTICATED SERVICES CRYPTOGRAPHIC KEY MANAGEMENT CRYPTOGRAPHIC ALGORITHMS Approved Cryptographic Algorithms Non-FIPS Approved Algorithms Allowed in FIPS Mode Non-Approved Cryptographic Algorithms SELF-TESTS PHYSICAL SECURITY ASA 5505 Opacity Shield ASA and Opacity Shield ASA 5585-X Opacity Shield ASA ASA 5510, 5520, 5540 and ASA ASA 5585-X Appling Tamper Evidence Labels SECURE OPERATION CRYPTO OFFICER GUIDANCE - SYSTEM INITIALIZATION CRYPTO OFFICER GUIDANCE - SYSTEM CONFIGURATION IDENTIFYING ROUTER OPERATION IN AN APPROVED MODE.