Cisco CISCO2821 Spezifikationen Seite 21

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 31
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 20
© Copyright 2007 Cisco Systems, Inc.
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
21
available in the DRAM; therefore this command will completely zeroize this key. The following
command will zeroize the pre-shared keys from the DRAM:
no set session-key inbound ah spi hex-key-data
no set session-key outbound ah spi hex-key-data
no set session-key inbound esp spi cipher hex-key-data [authenticator hex-key-data]
no set session-key outbound esp spi cipher hex-key-data [authenticator hex-key-data]
no crypto isakmp key
The DRAM running configuration must be copied to the start-up configuration in NVRAM in
order to completely zeroize the keys.
The RSA keys are zeroized by issuing the CLI command “crypto key zeroize rsa".
All SSL/TLS session keys are zeroized automatically at the end of the SSL/TLS session.
The module supports the following keys and critical security parameters (CSPs).
Key/CSP
Name
Algorithm Description Storage
Location
Zeroization Method
PRNG Seed X9.31 This is the seed for X9.31 PRNG.
This CSP is stored in DRAM and
updated periodically after the
generation of 400 bytes – after this
it is reseeded with router-derived
entropy; hence, it is zeroized
periodically. Also, the operator can
turn off the router to zeroize this
CSP.
DRAM Automatically every 400
bytes, or turn off the
router.
PRNG Seed
Key
X9.31 This is the seed key for the PRNG. DRAM Turn off the router
Diffie
Hellman
private
exponent
DH The private exponent used in
Diffie-Hellman (DH) exchange as
part of IKE. Zeroized after DH
shared secret has been generated.
DRAM Automatically after
shared secret generated.
Diffie
Hellman
public key
DH The public key used in Diffie-
Hellman (DH) exchange as part of
IKE. Zeroized after the DH shared
secret has been generated.
DRAM Automatically after
shared secret generated.
skeyid Keyed SHA-1 Value derived from the shared
secret within IKE exchange.
Zeroized when IKE session is
terminated.
DRAM Automatically after IKE
session terminated.
skeyid_d Keyed SHA-1 The IKE key derivation key for non
ISAKMP security associations.
DRAM Automatically after IKE
session terminated.
skeyid_a HMAC-SHA-1 The ISAKMP security association
authentication key.
DRAM Automatically after IKE
session terminated.
skeyid_e TRIPLE-
DES/AES
The ISAKMP security association
encryption key.
DRAM Automatically after IKE
session terminated.
Seitenansicht 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 30 31

Kommentare zu diesen Handbüchern

Keine Kommentare