3. MODES OF OPERATION.....................................................................................................................................4
4. PORTS AND INTERFACES .................................................................................................................................8
5. IDENTIFICATION AND AUTHENTICATION POLICY.................................................................................8
6. ACCESS CONTROL POLICY............................................................................................................................10
ROLES AND SERVICES..............................................................................................................................................11
DEFINITION OF CRITICAL SECURITY PARAMETERS (CSPS)......................................................................................12
DEFINITION OF CSPS MODES OF ACCESS ................................................................................................................13
11. MITIGATION OF OTHER ATTACKS POLICY...........................................................................................17
12. DEFINITIONS AND ACRONYMS...................................................................................................................17
Page 2
MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
1. Module Overview
The MNR S2500 router, also referred to as the S2500, is a multi-chip standalone cryptographic
module encased in a commercial grade metal case made of cold rolled steel. The module
cryptographic boundary is the routers enclosure which includes all components, including the
encryption module which is a separate part. Figure 1 illustrates the cryptographic boundary of
the MNR S2500 router. In the photo, blank plates cover slots that can hold optional network
interface cards. The FIPS validated firmware versions are XS-15.1.0.75, XS-15.1.0.76, XS-
15.2.0.20, and XS-15.4.0.60.
S2500 Base Unit S2500 Encryption Module Configurations
P/N Tanapa
Number
1 ST2500B CLN1713E B ST2516A CLN8262C C XS-15.1.0.75
2 ST2500B CLN1713E B ST2516A CLN8262C C XS-15.1.0.76
3 ST2500B CLN1713E B ST2516A CLN8262C C XS-15.2.0.20
4 ST2500B CLN1713E B ST2516A CLN8262C C XS-15.4.0.60
MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
2. Security Level
The cryptographic module meets the overall requirements applicable to Level 1 security of
FIPS 140-2.
Security Requirements Section Level
Cryptographic Module Specification 1
Module Ports and Interfaces 1
Roles, Services and Authentication 1
Finite State Model 1
Physical Security 1
Operational Environment N/A
Cryptographic Key Management 1
EMI/EMC 3
Self-Tests 1
Design Assurance 1
Mitigation of Other Attacks N/A
Table 2 – Module Security Level Specification
3. Modes of Operation
Approved mode of operation
In FIPS mode, the cryptographic module supports the following FIPS-Approved algorithms as
follows:
Hardware Implementations
a. Triple-DES– CBC mode (112 or 168 bit) for IPsec and FRF.17 encryption (Cert. #588)
b. AES - CBC mode(128, 192, 256 bit) for IPsec and FRF.17 encryption (Cert. #625)
c. HMAC-SHA-1 for IPsec and FRF.17 authentication (Cert. #342)
d. SHA-1 for message hash (Cert. #693)
Page 4
MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
Firmware Implementations
a. Triple-DES– CBC mode (112 and 168 bit) for IKE and SSHv2 encryption (Cert. #581)
b. AES - CBC (128, 192, 256 bit), ECB (128), and CFB (128) modes for IKE and SSHv2
encryption (Cert. #611)
c. HMAC-SHA-1 for IKE and SSHv2 authentication (Cert. # 322)
d. SHA-1 for message hash (Cert. # 659)
e. RSA v1.5 1024 bit – for public/private key pair generation and digital signatures (Cert.
#283)
f. DSA 1024 bit – for public/private key pair generation and digital signatures (Cert. #237)
g. ANSI X9.31 Deterministic Random Number Generator (DRNG) (Cert .#349)
The MNR S2500 router supports the commercially available IKE and Diffie-Hellman protocols
for key establishment, IPsec (ESP) and FRF.17 protocols to provide data confidentiality using
FIPS-approved encryption and authentication algorithms and SSHv2 for secure remote access.
Allowed Algorithms
• Diffie-Hellman: (allowed for key agreement per Annex D, key agreement methodology
provides 80 to 112 bits of encryption strength)
• Hardware non-deterministic RNG: Provides seed for approved deterministic RNG
• MD5: for hashing (Provides interoperability within supported protocols)
• HMAC-MD5
Non-FIPS approved algorithms
In a Non FIPS mode of operation, the cryptographic module provides non-FIPS Approved
algorithms as follows:
• DES for encryption/decryption
• Non approved SW RNG
• Diffie-Hellman (Group 1 - 768 bit)
Page 5
MNR S2500 Security Policy
Version 1.3, Revision Date: 1/13/2009
Entering FIPS Mode
To enter FIPS mode, the Crypto Officer must follow the procedure outlined in Table 3 below.
For details on individual router commands, use the online help facility or review the Enterprise OS Software User Guide, version 15.4 and the Enterprise OS Software Reference Guide, version
15.4.
Step Description
Configure the parameters for the IKE negotiations using the IKEProfile command. For FIPS
1.
mode, only the following values are allowed: Diffie-Hellman Group (Group 2 or Group 5),
Encryption Algorithm (AES or 3DES), Hash Algorithm (SHA), and Authentication Method
(PreSharedKey).
Manually establish via the local console port the pre-shared key (PSK) to be used for the IKE
The PSK must be at least 80 bits in length with at least 80 bits of entropy.
Configure Ipsec and FRF.17 selector lists using the command
3.
ADD –CRYPTO SelectorLIst
For FIPS mode, the selector list must be configured to encrypt all packets on an encrypted port,
e.g. ADD –CRYPTO SelectorLIst s1 1 Include ANY 0.0.0.0/0 0.0.0.0/0
If Ipsec is used, configure Ipsec transform lists using the ADD –CRYPTO TransformLIst
4.
command. For FIPS mode, only the following values are allowed: Encryption Transform (ESP3DES, or ESP-AES) and Authentication Transform (ESP-SHA).
If FRF.17 is used, configure FRF.17 transform lists using the ADD –CRYPTO
5.
TransformLIst command. For FIPS mode, only the following values are allowed: Encryption
Transform (FRF-3DES, or FRF-AES) and Authentication Transform (FRF-SHA).
For each port for which encrypted is required, bind a dynamic policy to the ports using