
Security Target Version 1.02, 08/16/2013
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
IPsec
authentication
Keys
ANSI X9.31 /
3DES-AES / DH
Exchanged using the IKE
protocol and the
public/private key pairs.
These are 3DES or AES
keys.
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
ANSI X9.31 /
3DES-AES / DH
Exchanged using the IKE
protocol and the
public/private key pairs.
These are 3DES or AES
keys.
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
IPsec
authentication
Keys
3DES or AES Keys are
manually configured for
IPsec security associations.
FLASH (cipher text) and
RAM (plain text)
IPsec keys exist in a FLASH
start-up configuration file
and are added, deleted, or
changed when that file is
edited by an authorized
administrator.
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
3DES or AES Keys are
manually configured for
IPsec security associations.
FLASH (cipher text) and
RAM (plain text)
IPsec keys exist in a FLASH
start-up configuration file
and are added, deleted, or
changed when that file is
edited by an authorized
administrator.
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
Entered by the Crypto-
Officer in plain text form
and used for authentication
during IKE
FLASH (cipher text) and
RAM (plain text)
IKE keys exist in a FLASH
start-up configuration file
and are added, deleted, or
changed when that file is
edited by an authorized
administrator.
Alternately, the keys will be
overwritten once with zeroes
when a clear FLASH
command is issued.
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
Generated using
IKE
(X9.31+HMAC-
SHA1+DH).
Algorithms:
3DES, AES,
SHA-1
Used to encrypt and
authenticate IKE
negotiations
Keys in RAM will be
zeroized upon resetting or
rebooting the security
appliance.
Kommentare zu diesen Handbüchern