Page 2 of 72
Table of Contents
1 Introduction ............................................................................................................................. 7
1.1 Audience ......................................................................................................................... 7
1.2 Purpose ............................................................................................................................ 7
1.3 Document References ..................................................................................................... 7
1.4 Supported Hardware and Software ................................................................................. 9
1.5 Operational Environment ................................................................................................ 9
1.5.1 Supported non-TOE Hardware/Software/Firmware ................................................... 9
1.6 Excluded Functionality ................................................................................................. 10
2 Secure Acceptance of the TOE ............................................................................................. 11
3 Secure Installation and Configuration .................................................................................. 16
3.1 Physical Installation ...................................................................................................... 16
3.2 Initial Setup via Direct Console Connection ................................................................ 16
3.2.1 Options to be chosen during the initial setup of the ASR ......................................... 16
3.2.2 Saving Configuration ................................................................................................ 16
3.2.3 Enabling FIPS Mode ................................................................................................. 17
3.2.4 Administrator Configuration and Credentials ........................................................... 17
3.2.5 Session Termination.................................................................................................. 17
3.2.6 User Lockout ............................................................................................................. 18
3.3 Network Protocols and Cryptographic Settings ............................................................ 19
3.3.1 Remote Administration Protocols ............................................................................. 19
3.3.2 Authentication Server Protocols ............................................................................... 20
3.3.3 Logging Configuration.............................................................................................. 20
3.3.4 Logging Protection.................................................................................................... 22
3.3.5 Base Firewall Rule set Configuration ....................................................................... 24
3.3.6 Routing Protocols...................................................................................................... 26
3.3.7 MACSEC and MKA Configuration.......................................................................... 26
4 Secure Management .............................................................................................................. 27
4.1 User Roles ..................................................................................................................... 27
4.2 Passwords ...................................................................................................................... 27
4.3 Clock Management ....................................................................................................... 30