hit counter script

Cisco Catalyst 4503-E Manual page 66

Catalyst 4500 series
Hide thumbs Also See for Catalyst 4503-E:
Table of Contents

Advertisement

Cisco Cat4K NDPP ST
EDCS-1228241
TOE SFRs
FCS_COP.1(1)
FCS_COP.1(2)
How the SFR is Met
MACsec
secret
128/256
ICK
bits
SESA
SESA
AES
128 bits
Authoriza
tion Key
SESA
AES
128 bits
Master
Session
Key
SESA
AES
128
Derived
and
and
Session
HMAC
bits
Keys
-SHA-1
IKE session encrypt key - This structure contains all of the SA
items, including the skeyid, skeyid_d, IKE Session Encryption
Key and IKE Session Authentication Key. All values overwritten
by 0's (0x00) automatically after IKE session terminated.
IKE session authentication key - This structure contains all of the
SA items, including the skeyid, skeyid_d, IKE Session
Encryption Key and IKE Session Authentication Key. All values
overwritten by 0's (0x00) automatically after IKE session
terminated.
The TOE provides symmetric encryption and decryption
capabilities using AES in CBC and GCM mode (128, 256 bits) as
described in FIPS PUB 197, NIST SP 800-38A and NIST SP
800-38D.
The TOE will provide cryptographic signature services using
RSA with key size of 2048 and greater as specified in FIPS PUB
186-3, "Digital Signature Standard".
66
Used to verify
MACse
the
integrity
c PHY
and
(plainte
authenticity of
xt)
MPDUs
Used
to
NVRA
authorize
M
members of a
(plainte
single stack on
xt)
Incredible
Units.
Used as input
to
SP800-108
derivation
methods
to
derive
four
additional 128
fields
to
transfer
the
Master Session
Key
and
additional
aggressive
exchange
material
Used to derive
DRAM
SESA session
(plainte
key
xt)
bits
Used to protect
DRAM
192
traffic
over
(plainte
stacking ports
xt)
11 March 2014
Automati
cally
when
session
expires
"no fips
authorizat
ion-key"
Upon
completio
n of key
exchange
Upon
bringing
down the
stack

Advertisement

Table of Contents
loading

Table of Contents