© Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Cisco ISR 4000 Series Routers with MACsec Firmware version: Cisco IOS-XE 16.12 Hardware versions: ISR 4321, ISR 4331, ISR 4351 and ISR 4451 Network Interface Module versions: NIM-2GE-CU-SFP FIPS-140 Non-Proprietary Security Policy- Security Level 1 Cisco Systems, Inc. Version 1.4 i Table of Contents 1 Introduction................................................................................................................. 1 1.1 References............................................................................................................ 1 1.2 FIPS 140-2 Submission Package.......................................................................... 1 2 Module Description .................................................................................................... 2 2.1 Cisco ISR (4321, 4331, 4351 and 4451).............................................................. 2 2.2 Network Interface Module (NIM-2GE-CU-SFP) ................................................ 4 2.3 Validated & Vendor Affirmed Hardware............................................................. 5 2.4 FIPS and non-FIPS modes of operation............................................................... 5 2.5 Module Validation Level ..................................................................................... 6 3 Cryptographic Boundary............................................................................................. 7 4 Cryptographic Module Ports and Interfaces ............................................................... 7 5 Roles, Services, and Authentication ......................................................................... 12 5.1 User Services...................................................................................................... 12 5.2 Cryptographic Officer Services.......................................................................... 13 5.3 Unauthenticated User Services........................................................................... 14 6 Cryptographic Key/CSP Management...................................................................... 15 6.1 User Services and CSP Access........................................................................... 22 6.2 Crypto Officer Services and CSP Access .......................................................... 23 7 Cryptographic Algorithms ........................................................................................ 25 7.1 Approved Cryptographic Algorithms................................................................. 25 7.2 Non-Approved Algorithms allowed for use in FIPS-mode ............................... 26 7.3 Non-Approved Algorithms ................................................................................ 27 7.4 Self-Tests............................................................................................................ 27 8 Physical Security....................................................................................................... 29 9 Secure Operation....................................................................................................... 30 ii 9.1 System Initialization and Configuration ............................................................ 30 9.2 IPsec Requirements and Cryptographic Algorithms.......................................... 31 9.3 Protocols............................................................................................................. 32 9.4 Remote Access................................................................................................... 32 9.5 Key Strength....................................................................................................... 32 10 Related Documentation............................................................................................. 32 11 Definitions List ......................................................................................................... 33 Page 1 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 1 Introduction This is a non-proprietary Cryptographic Module Security Policy for Cisco ISR 4K network router modules. This security policy describes how modules meet the security requirements of FIPS 140-2 and how to run the modules in a FIPS 140-2 mode of operation. FIPS 140-2 (Federal Information Processing Standards Publication 140-2 — Security Requirements for Cryptographic Modules) details the U.S. Government requirements for cryptographic modules. More information about the FIPS 140-2 standard and validation program is available on the NIST website at http://csrc.nist.gov/groups/STM/cmvp/index.html. 1.1 References This document deals only with operations and capabilities of the module in the technical terms of a FIPS 140-2 cryptographic module security policy. More information is available on the module from the following sources: • The Cisco Systems website (http://www.cisco.com) contains information on the full line of products from Cisco Systems. • The NIST Cryptographic Module Validation Program website (http://csrc.nist.gov/groups/STM/cmvp/index.html) contains contact information for answers to technical or sales-related questions for the module. 1.2 FIPS 140-2 Submission Package The security policy document is one document in a FIPS 140-2 Submission Package. In addition to this document, the submission package includes: • Vendor Evidence • Finite State Machine • Other supporting documentation as additional references With the exception of this non-proprietary security policy, the FIPS 140-2 validation documentation is proprietary to Cisco Systems, Inc. and is releasable only under appropriate non-disclosure agreements. For access to these documents, please contact Cisco Systems, Inc. See “Obtaining Technical Assistance” section for more information. Page 2 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 2 Module Description 2.1 Cisco ISR (4321, 4331, 4351 and 4451) The Cisco ISR 4000 Series Routers (4321, 4331, 4351 and 4451) revolutionize WAN communications in the enterprise branch. With new levels of built-in intelligent network capabilities and convergence, it specifically addresses the growing need for application- aware networking in distributed enterprise sites. These locations tend to have lean IT resources. But they often also have a growing need for direct communication with both private data centers and public clouds across diverse links, including Multiprotocol Label Switching (MPLS) VPNs and the Internet. Cisco 4000 Family ISRs provide you with Cisco® Software Defined WAN (SDWAN) software features and a converged branch infrastructure. Along with superior throughput, these capabilities form the building blocks of next-generation branch-office WAN solutions. Figure 1: ISR 4321 Page 3 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Figure 2: ISR 4331 Figure 3: ISR 4351 Page 4 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Figure 4: ISR 4451 2.2 Network Interface Module (NIM-2GE-CU-SFP) The 2GE-CU-SFP Network Interface Module (NIM) are software-configurable high- speed connectivity routing port network interface modules for the Cisco ISR 4000 Series Integrated Services Routers (ISR). This network interface modules provide increased density of Ethernet interfaces on the Cisco ISR 4000 Series. Figure 5 shows the network interface module. Figure 5: NIM-2GE-CU-SFP Page 5 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 2.3 Validated & Vendor Affirmed Hardware The validated configurations are comprised of the following components: Chassis Hardware Configurations Line Card ISR 4321 NIM-2GE-CU-SFP ISR 4331 ISR 4351 ISR 4451 Table 1: Module Hardware Configurations running Cisco IOS-XE 16.12 The vendor affirmed configurations are comprised of the following components: Chassis Vendor Affirmed Hardware Configurations Line Card ISR 4221 NIM-1GE-CU-SFP, NIM-ES2-8 ISR 4431 ISR 4461 Table 2: Vendor Affirmed Models1 2.4 FIPS and non-FIPS modes of operation The ISR 4000 Series supports a FIPS and non-FIPS mode of operation. The non-FIPS mode of operation is not a recommended operational mode but because the module allows for non-approved algorithms and non-approved key sizes, a non-approved mode of operation exists. The following services are available in a FIPS-Approved mode of operation: • SSH • IPSec • SNMPv3 • MACsec The following services are available in a non-FIPS-Approved mode of operation: • SSH • TLS • IPSec • SNMPv3 • MACsec 1 Vendor affirmed devices use the same firmware image (Cisco IOS-XE 16.12) as the modules tested. No claim to conformance can be made as these models were not tested by a CSTL or reviewed by CMVP. Page 6 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. When the services are used in non-FIPS mode they are considered to be non-compliant. If the device is in the non-FIPS mode of operation, the Cryptographic Officer must follow the instructions in section 9.1 of this security policy to transfer into a FIPS approved mode of operation. 2.5 Module Validation Level The following table lists the level of validation for each area in the FIPS PUB 140-2. No. Area Title Level 1 Cryptographic Module Specification 1 2 Cryptographic Module Ports and Interfaces 1 3 Roles, Services, and Authentication 3 4 Finite State Model 1 5 Physical Security 1 6 Operational Environment N/A 7 Cryptographic Key management 1 8 Electromagnetic Interface/Electromagnetic Compatibility 1 9 Self-Tests 1 10 Design Assurance 3 11 Mitigation of Other Attacks N/A Overall Overall module validation level 1 Table 3: Module Validation Level Page 7 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 3 Cryptographic Boundary The cryptographic boundary for the Cisco ISR 4321, 4331, 4351 and ISR 4451 are defined as encompassing the “top,” “bottom,” “front,” “back,” “left” and “right” surfaces of the case; all portions of the "backplane" of the case. Figure 6: Cryptographic Boundary 4 Cryptographic Module Ports and Interfaces Each module provides a number of physical and logical interfaces to the device, and the physical interfaces provided by the module are mapped to four FIPS 140-2 defined logical interfaces: data input, data output, control input, and status output. The logical interfaces and their mapping are described in the following tables: Physical Interfaces FIPS 140-2 Logical Interfaces Ethernet Ports (2) Backplane (2) SFP Port (1) Network Interface Module (2) Console (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Input Interface Ethernet Ports (2) Backplane (2) SFP Port (1) Network Interface Module (2) Console/Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Output Interface Ethernet Ports (2) Backplane (2) SFP Port (1) Network Interface Module (2) Console/Auxiliary Port (1) Control Input Interface Page 8 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Physical Interfaces FIPS 140-2 Logical Interfaces USB Port (1) 10/100/1000 Management Ethernet Port (1) Power Switch (1) Ethernet Ports (2) Backplane (2) SFP Port (1) Network Interface Module (2) LEDs USB Port (1) Console/Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Status Output Interface Power Plug Power interface Table 4: ISR 4321 Physical Interfaces FIPS 140-2 Logical Interfaces Ethernet Ports (3) Backplane (2) SFP Port (2) Network Interface Module (2) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Input Interface Ethernet Ports (3) Backplane (2) SFP Port (2) Network Interface Module (2) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Output Interface Ethernet Ports (3) Backplane (2) SFP Port (2) Network Interface Module (2) Console Port (1) Auxiliary Port (1) USB Port (1) 10/100/1000 Management Ethernet Port (1) Power Switch (1) Control Input Interface Ethernet Ports (3) Status Output Interface Page 9 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Physical Interfaces FIPS 140-2 Logical Interfaces SFP Port (2) Network Interface Module (2) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) LEDs USB Port (1) Power Plug Power interface Table 5: ISR 4331 Physical Interfaces FIPS 140-2 Logical Interfaces Ethernet Ports (3) SFP Port (3) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Input Interface Ethernet Ports (3) SFP Port (3) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Output Interface Ethernet Ports (3) SFP Port (3) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Power Switch Control Input Interface Page 10 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Ethernet Ports (3) SFP Port (3) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) LEDs USB (2) Status Output Interface Power Plug Power interface Table 6: ISR 4351 Physical Interfaces FIPS 140-2 Logical Interfaces Ethernet Ports (4) SFP Port (4) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Input Interface Ethernet Ports (4) SFP Port (4) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Data Output Interface Ethernet Ports (4) SFP Port (4) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) Power Switch Control Input Interface Ethernet Ports (4) SFP Port (4) Network Interface Module (3) Console Port (1) Auxiliary Port (1) 10/100/1000 Management Ethernet Port (1) LEDs USB (2) Status Output Interface Power Plug Power interface Table 7: ISR 4451 Page 11 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Physical Interfaces FIPS 140-2 Logical Interfaces RJ45 Ethernet Ports (2) SFP Ports (2) Data Input Interface RJ45 Ethernet Ports (2) SFP Ports (2) Data Output Interface RJ45 Ethernet Ports (2) SFP Ports (2) Control Input Interface RJ45 Ethernet Ports (2) SFP Ports (2) Status Output Interface Table 8: NIM-2GE-CU-SFP Page 12 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 5 Roles, Services, and Authentication Authentication is identity-based. Each user is authenticated upon initial access to the module. There are two main roles in the router that operators may assume: the Crypto Officer role and the User role. The administrator of the router assumes the Crypto Officer role in order to configure and maintain the router using Crypto Officer services, while the Users exercise only the basic User services. The module supports RADIUS and TACACS+ for authentication. A complete description of all the management and configuration capabilities of the modules can be found in the Cisco ISR 4000 Series Integrated Services Routers Software Configuration Guide Manual2 and in the online help for the modules. The User and Crypto Officer passwords and all shared secrets must each be at least eight (8) characters long, including at least one letter and at least one number character, in length (enforced procedurally). See the Secure Operation section for more information. If six (6) integers, one (1) special character and one (1) alphabet are used without repetition for an eight (8) digit PIN, the probability of randomly guessing the correct sequence is one (1) in 251,596,800 (this calculation is based on the assumption that the typical standard American QWERTY computer keyboard has 10 Integer digits, 52 alphabetic characters, and 32 special characters providing 94 characters to choose from in total. Since it is claimed to be for 8 characters with no repetition, then the calculation should be, 10x9x8x7x6x5x32x52. In order to successfully guess the sequence in one minute would require the ability to make over 4,193,280 guesses per second, which far exceeds the operational capabilities of the module. Additionally, when using RSA-based authentication, RSA key pair has a modulus size of either 2048 or 3072 bits, thus providing at least 112 bits of strength. Assuming the low end of that range (2048 bits), an attacker would have a 1 in 2112 chance of randomly obtaining the key, which is much stronger than the one-in-a-million chance required by FIPS 140-2. To exceed a one in 100,000 probability of a successful random key guess in one minute, an attacker would have to be capable of approximately 8.6 x 1031 (5.2 x 1033 /60 = 8.6 x 1031 ) attempts per second, which far exceeds the operational capabilities of the modules to support. It should be noted that the same services are available to both Users and Cryptographic officers, regardless of whether or not they are in a non-FIPS approved mode of operation or a FIPS approved mode of operation. 5.1 User Services A User enters the system by accessing the console/auxiliary port with a terminal program or SSH v2 session to a LAN port or the 10/100/1000 Management Ethernet Port. The module prompts the User for their username/password combination. If the username/password combination is correct, the User is allowed entry to the module 2 Link located in Section 10. Page 13 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. management functionality. The services available to the User role consist of the following: • Status Functions - View state of interfaces and protocols, firmware version • Terminal Functions - Adjust the terminal session (e.g., lock the terminal, adjust flow control) • Directory Services - Display directory of files kept in memory • Perform Self-Tests – Perform the FIPS 140 start-up tests on demand • Perform Cryptography – Use the cryptography provided by the module: o SSH o IPSec o SNMPv3 o MACsec 5.2 Cryptographic Officer Services A Crypto Officer enters the system by accessing the console/auxiliary port with a terminal program or SSH v2 session to a LAN port or the 10/100/1000 Management Ethernet Port. The Crypto Officer authenticates in the same manner as a User. The Crypto Officer is identified by accounts that have a privilege level 15 (versus the privilege level 1 for users). A Crypto Officer may assign permission to access the Crypto Officer role to additional accounts, thereby creating additional Crypto Officers. The Crypto Officer role is responsible for the configuration and maintenance of the router. The Crypto Officer services consist of the following: • Configure the module - Define network interfaces and settings, create command aliases, set the protocols the router will support, enable interfaces and network services, set system date and time, and load authentication information. • Define Rules and Filters - Create packet Filters that are applied to User data streams on each interface. Each Filter consists of a set of Rules, which define a set of packets to permit or deny based characteristics such as protocol ID, addresses, ports, TCP connection establishment, or packet direction. • Status Functions - View the module configuration, routing tables, active sessions, use get commands to view SNMP MIB statistics, health, temperature, memory status, voltage, packet statistics, review accounting logs, and view physical interface status. • Manage the module - Log off users, shutdown or reload the router, manually back up router configurations, view complete configurations, manage user rights, initiate power-on self-tests on demand and restore router configurations. • Set Encryption - Set up the configuration tables for IP tunneling. Set keys and algorithms to be used for each IP range or allow plaintext packets to be set from specified IP address. Page 14 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. • Perform Self-Tests – Perform the FIPS 140 start-up tests on demand. • Zeroization – Erasing electronically stored data, cryptographic keys, and CSPs by altering or deleting the contents of the data storage to prevent recovery of the data. 5.3 Unauthenticated User Services The services for someone without an authorized role are to view the status output from the module’s LED pins and cycle power. Page 15 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 6 Cryptographic Key/CSP Management The module securely administers both cryptographic keys and other critical security parameters such as passwords. All keys and CSPs are protected by the password- protection of the Crypto Officer role login and can be zeroized by the Crypto Officer. Zeroization consists of overwriting the memory that stored the key or refreshing the volatile memory. Keys are exchanged and entered electronically via Internet Key Exchange (IKE) or SSH. The module supports the following critical security parameters (CSPs): Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization General Keys/CSPs DRBG entropy input CTR (using AES- 256) 256-bit This is the entropy for SP 800-90 RNG. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power cycle the device DRBG Seed (IOS XE) CTR (using AES- 256) 384-bits This DRBG seed is collected from the onboard Act2Lite cryptographic processor. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically every 400 bytes or turn off the router. DRBG V CTR (using AES- 256) 256-bit Internal V value used as part of SP 800-90 CTR_DRBG DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power cycle the device DRBG Key CTR (using AES- 256) 256-bit Internal Key value used as part of SP 800-90 CTR_DRBG DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power cycle the device Diffie-Hellman Shared Secret DH 2048 – 4096 bits The shared exponent used in Diffie-Hellman (DH) exchange. Created per the Diffie-Hellman protocol. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Zeroized upon deletion. Page 16 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization Diffie Hellman private key DH 224-379 bits The private exponent used in Diffie-Hellman (DH) exchange. This CSP is created using the SP 800-90 CTR_DRBG. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Zeroized upon deletion. Diffie Hellman public key DH 2048 – 4096 bits The p used in Diffie-Hellman (DH) exchange. This CSP is created using the SP 800-90 CTR_DRBG. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Zeroized upon deletion. EC Diffie- Hellman private key ECDH (Curves: P-256, P-384) Used for key agreement DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power cycle the device EC Diffie- Hellman public key ECDH (Curves: P-256, P-384) Used for key agreement DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power cycle the device EC Diffie- Hellman shared secret ECDH (Curves: P-256, P-384) Used for key agreement DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power cycle the device Operator password Password, at least eight characters The password of the operator. This CSP is entered by the Cryptographic Officer. NVRAM (plaintext) Externally generated and entered by the User and/or CO when logging in Never output from the module Overwrite with new password Enable password Password, at least eight characters The plaintext password of the CO role. This CSP is entered by the Cryptographic Officer. NVRAM (plaintext) Externally generated and entered by the CO. Never output from the module Overwrite with new password Page 17 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization Enable secret Password, at least eight characters The obfuscated password of the CO role. However, the algorithm used to obfuscate this password is not FIPS approved. Therefore, this password is considered plaintext for FIPS purposes. This password is zeroized by overwriting it with a new password. The Cryptographic Operator optionally configures the module to obfuscate the Enable password. This CSP is entered by the Cryptographic Officer. NVRAM (plaintext) Externally generated and entered by the CO. Never output from the module Overwrite with new password RADIUS secret Shared Secret, 16 characters The RADIUS shared secret. This CSP is entered by the Cryptographic Officer. NVRAM (plaintext), DRAM (plaintext) Externally generated and entered by the CO. Never output from the module # no radius- server key RADIUSOverIP SecEncryptionK ey AES-CBC, AES-GCM, AES- KW AES-128/AES- 256 encryption/decry ption key, used in IPSec tunnel between module and RADIUS to encrypt/decrypt EAP keys. NVRAM (plaintext), DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power Cycle Page 18 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization RADIUSOverIP SecIntegrityKey HMAC Integrity/authenti cation key, used in IPSec tunnel between module and RADIUS NVRAM (plaintext), DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Power Cycle TACACS+ secret Shared Secret, 16 characters The TACACS+ shared secret. This CSP is entered by the Cryptographic Officer. NVRAM (plaintext), DRAM (plaintext) Externally generated and entered by the CO. Never output from the module # no tacacs- server key IKE/IPSec skeyid HMAC SHA-1 160-bits Value derived per the IKE protocol based on the peer authentication SSH method chosen. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically after IKE session terminated. skeyid_a HMAC SHA-1 160-bits The IKE key derivation key for non ISAKMP security associations. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically after IKE session terminated. skeyid_d HMAC SHA-1 160-bits The IKE key derivation key for non ISAKMP security associations. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically after IKE session terminated. skeyid_e HMAC SHA-1 160-bits The IKE key derivation key for non ISAKMP security associations. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically after IKE session terminated. IKE session encrypt key AES -128, 192, or 256 bits The IKE session encrypt key. This key is created per the Internet Key Exchange Key Establishment protocol. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically after IKE session terminated. Page 19 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization IKE session authentication key SHA-1 HMAC 160-bits The IKE session authentication key. This key is created per the Internet Key Exchange Key Establishment protocol. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically after IKE session terminated. ISAKMP preshared Secret At least eight characters The key used to generate IKE skeyid during preshared-key authentication. # no crypto isakmp key command zeroizes it. This key can have two forms based on whether the key is related to the hostname or the IP address. This CSP is entered by the Cryptographic Officer. NVRAM (plaintext) Externally generated and entered by the CO. Never output from the module # no crypto isakmp key IKE RSA Private Key RSA (Private Key) 2048 – 3072 bits The key used in IKE authentication. # crypto key zeroize rsa command zeroizes it. NVRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module # crypto key zeroize rsa IKE RSA Public Key RSA (Public Key) 2048 – 3072 bits The key used in IKE authentication. # crypto key zeroize rsa command zeroizes it. NVRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module # crypto key zeroize rsa Page 20 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization IPsec encryption key AES -128, 192, or 256 bits The IPsec encryption key. This key is created per the Internet Key Exchange Key Establishment protocol. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically when IPsec session terminated. IPsec authentication key SHA-1 HMAC 160-bits The IPsec authentication key. This key is created per the Internet Key Exchange Key Establishment protocol. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically when IPsec session terminated. SSH SSH Private Key RSA (Private Key) 2048 – 3072 bits The SSH private key for the module. NVRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module SSH private key is zeroized by either deletion (via # crypto key zeroize rsa) or by overwriting with a new value of the key EC Diffie- Hellman P-256, P-384 AES 128-, 192-, or 256-bits SSH Public Key RSA (Public Key) 2048 – 3072 bits The SSH public key for the module. NVRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Zeroized upon deletion. EC Diffie- Hellman P-256, P-384 AES 128-, 192-, or 256- bits Page 21 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization SSH Session Key AES 128-, 192-, or 256- bits The SSH session key. This key is created through SSH key establishment. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically when the SSH session is terminated. SSH Integrity Key SHA-1 HMAC 160-bits Used for SSH connections integrity to assure the traffic integrity. DRAM (plaintext) Generated internally via a call to the DRBG. Never output from the module Automatically when the SSH session is terminated. SNMPv3 SNMPv3 Password Secret 256 bits This secret is used to derive HMAC-SHA1 key for SNMPv3 Authentication DRAM Externally generated and entered by the CO. Never output from the module Powercycle snmpEngineID Shared secret 32- bits Unique string to identify the SNMP engine NVRAM Externally generated and entered by the CO. Never output from the module # no snmp- server engineID local engineid- string, overwritten with new engine ID SNMP session key AES 128-bit Encrypts SNMP traffic DRAM Internally generated via SNMP KDF Never output from the module Power cycle MACSec MACsec Security Association Key (SAK) AES-GCM 128/256 bits Used for creating Security Associations (SA) for encrypting/decry pting the MACSec traffic in the MACSec hardware. MACsec PHY (plaintext) Derived from the CAK using the SP800-108 KDF. Output from the module to other members of a MACsec connectivity association when encrypted by the KEK Automatically when session expires Page 22 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Key/CSP Name Key Type Description Storage Generation /Input Output Zeroization MACsec Connectivity Association Key (CAK) AES-GCM 128/256 bits A secret key possessed by members of a MACSec connectivity association. MACsec PHY (plaintext) Externally generated and entered by the CO. Never output from the module Automatically when session expires MACsec KEK AES-GCM 128/256 bits Used to transmit SAKs to other members of a MACSec connectivity association MACsec PHY (plaintext) Derived from the CAK using the SP800-108 KDF. Never output from the module Automatically when session expires MACsec ICK Secret Used to verify the integrity and authenticity. MACsec PHY (plaintext) Derived from the CAK using the SP800-108 KDF. Never output from the module Automatically when session expires Table 9: CSPs 6.1 User Services and CSP Access The services accessing the CSPs, the type of access – read (r), write (w) and zeroized/delete (d) – and which role accesses the CSPs are listed below. Services & Access Description Keys & CSPs View Status Functions View state of interfaces and protocols, firmware version. Operator password – r Terminal Functions Adjust the terminal session (e.g., lock the terminal, adjust flow control). Operator password – r Directory Services Display directory of files kept in memory. Operator password – r Self-Tests Execute the FIPS 140 start-up tests on demand N/A Random Number Generation Key generation and seeds for asymmetric key generation DRBG entropy input, DRBG seed, DRBG V, DRBG Key – r, w, d Key Exchange Key exchange over Diffie-Hellman and EC Diffie-Hellman Diffie-Hellman public key, Diffie-Hellman private key, Diffie-Hellman shared secret, EC Diffie-Hellman Public Key, EC Diffie- Hellman Private Key, EC Diffie-Hellman shared secret – w, d TACACS+ User & CO authentication to the module using TACACS+. TACACS+ secret,– r Page 23 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. RADIUS Key Wrap Establishment and subsequent receive 802.11 PMK from the RADIUS server. RADIUSOverIPSecEncryptionKey, RADIUSOverIPSecIntegrityKey, RADIUS Server Shared Secret – w, d SSH Functions Negotiation and encrypted data transport via SSH Operator password, SSH private key, SSH public key, SSH integrity key, SSH Session Key – r Module Read-only Configuration Viewing of configuration settings Operator password – r Table 10: User CSP Access 6.2 Crypto Officer Services and CSP Access Services & Access Description Keys & CSPs3 View Status Functions View the switch configuration, routing tables, active sessions, health, temperature, memory status, voltage, packet statistics, review accounting logs, and view physical interface status. Operator password, Enable password – r, w, d Define Rules and Filters Create packet Filters that are applied to User data streams on each interface. Each Filter consists of a set of Rules, which define a set of packets to permit or deny based on characteristics such as protocol ID, addresses, ports, TCP connection establishment, or packet direction. Operator password, Enable password – r, w, d Self-Tests Execute the FIPS 140 start-up tests on demand N/A Random Number Generation Key generation and seeds for asymmetric key generation DRBG entropy input, DRBG seed, DRBG V, DRBG Key – r, w, d Key Exchange Key exchange over Diffie-Hellman and EC Diffie-Hellman Diffie-Hellman public key, Diffie-Hellman private key, Diffie-Hellman shared secret, EC Diffie-Hellman Public Key, EC Diffie-Hellman Private Key, EC Diffie- Hellman shared secret – w, d TACACS+ User & CO authentication to the module using TACACS+. TACACS+ secret – w, d 3 r = CSP is read by module, w = CSP is generated, derived and/or used by module =, d = CSP is zeroized by module. Page 24 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Zeroization Zeroize CSPs and cryptographic keys by cycling power to zeroize all cryptographic keys stored in SDRAM. The CSPs (password, secret, engineID) stored in Flash can be zeroized by overwriting with a new value. All Keys and CSPs will be destroyed Module Configuration Selection of non-cryptographic configuration settings N/A SNMPv3 Non-security related monitoring by the CO using SNMPv3 snmpEngineID, SNMPv3 Password, SNMP session key – w, d SSH Establishment and subsequent data transfer of an SSH session for use between the module and the CO. Operator password, SSH private key, SSH public key, SSH integrity key, Session Key – w, d IPsec Configure IPsec VPN parameters, provide entry and output of CSPs. skeyid, skeyid_a, skeyid_d, skeyid_e, IKE session encrypt key, IKE session authentication key, ISAKMP preshared, IKE RSA private Key, IKE RSA public key, IPsec encryption key, IPsec authentication key, DRBG entropy input, DRBG V, DRBG Key – w, d RADIUS Key Wrap Establishment and subsequent receipt of 802.11 PMK from the RADIUS server. RADIUSOverIPSecEncryptionKey, RADIUSOverIPSecIntegrityKey, RADIUS Server Shared Secret – w, d MACSec Functions Establishment and subsequent data transfer of an MACSec session for use between the module and the CO MACsec Security Association Key, MACsec Connectivity Association Key, MACsec KEK, MACsec ICK – w, d Table 11: CO services and CSPs Page 25 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 7 Cryptographic Algorithms 7.1 Approved Cryptographic Algorithms The Cisco ISR 4000 supports many different cryptographic algorithms. However, only FIPS approved algorithms may be used while in the FIPS mode of operation. The following table identifies the approved algorithms included in the ISR 4000 for use in the FIPS mode of operation. Algorithm4 Supported Mode Cert. # IC2M AES ECB (128 , 192 , 256); CBC (128 , 192 , 256); CMAC (128 , 192 , 256); GMAC (128 , 192 , 256); CFB128 (128 , 192 , 256); GCM (128, 192, 256); KW (128, 256) A1462 SHS SHA-1, -256, -384, and -512 (Byte Oriented) A1462 HMAC SHA-1, -256, -384, and -512 A1462 DRBG CTR (using AES-256) A1462 ECDSA KeyGen, KeyVer, SigGen, SigVer (P-256, P-384) A1462 RSA Key Generation (2048-3072 bits); PKCS#1 v.1.5, 1024-4096 bit key SigGen, SigVer • 1024-bit keys allowed for signature verification only. A1462 CVL IKEv2 KDF, SSH KDF, SNMP KDF Note: The IKEv2, SSH, and SNMP protocols have not been reviewed or tested by the CAVP and CMVP. A1462 KAS-ECC-SSC (NIST SP 800-56Arev3) KAS-ECC-SSC: - Curves: o P-256 o P-384 A1462 KAS-FFC-SSC (SP 800- 56Arev3) KAS-FFC-SSC: - modp-2048 - modp-3072 - modp-4096 A1462 KBKDF (SP800-108)5 HMAC-SHA1 A1462 CKG Vendor affirmed 4 Not all algorithms/modes tested on the CAVP validation certificates are implemented in the module. 5 KBKDF tested in counter mode Page 26 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. Algorithm4 Supported Mode Cert. # Microsemi VSC 8584/ NIM-2GE-CU-SFP AES ECB (128, 256), GCM (128, 256), GMAC (128, 256) 3504 Table 12: FIPS -Approved Algorithms • The module’s AES-GCM implementation conforms to IG A.5 scenario #1 following RFC 7296 for IPSec/IKEv2. The module uses RFC 7296 compliant IKEv2 to establish the shared secret from which the AES GCM encryption keys are derived. When the IV exhausts the maximum number of possible values for a given session key, the first party, client or server, to encounter this condition will trigger a handshake to establish a new encryption key. In case the module’s power is lost and then restored, a new key for use with the AES GCM encryption/decryption shall be established. • When supporting the MACsec protocol in the FIPS approved modes of operation the implementation (see CAVP cert # AES 4853) conforms to IG A.5, scenario #3, when operating in a FIPS approved mode of operation. AES GCM, IVs are generated both internally and deterministically and are a minimum of 96-bits in length as specified in SP 800-38D, Section 8.2.1. • KTS (AES Cert. #A1462; key wrapping; key establishment methodology provides between 128 and 256 bits of encryption strength) • KAS (KAS-SSC Cert. #A1462, CVL Cert. #A1462; key establishment methodology provides between 128 and 192 bits of encryption strength) • KAS (KAS-SSC Cert. #A1462, CVL Cert. #A1462; key establishment methodology provides between 112 and 152 bits of encryption strength) The KAS FFC and KAS ECC strengths are as follows: KAS-ECC-SSC: 128 and 192 bits of encryption strength KAS-FFC-SSC: 112 and 152 bits of encryption strength 7.2 Non-Approved Algorithms allowed for use in FIPS-mode The ISR 4000 cryptographic module implements the following non-Approved algorithms that are allowed for use in FIPS-mode: • NDRNG to seed FIPS approved DRBG (256 bits) Page 27 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 7.3 Non-Approved Algorithms The ISR 4000 cryptographic module implements the following non-approved algorithms that are not permitted for use in FIPS 140-2 mode of operations: Service Non-Approved Algorithm SSH (non- compliant) Hashing: MD5 MACing: HMAC MD5 Symmetric: DES, Triple-DES Asymmetric: 1024-bit RSA, 1024-bit Diffie-Hellman TLS (non- compliant) Hashing: MD5, SHA MACing: HMAC MD5, HMAC SHA Symmetric: AES, DES, RC4, Triple-DES Asymmetric: ECDSA, RSA, DH, ECDH KDF: TLS KDF IPsec (non- compliant) Hashing: MD5 MACing: HMAC MD5 Symmetric: DES, RC4, Triple-DES Asymmetric: 1024-bit RSA, 1024-bit Diffie-Hellman SNMP (non- compliant) Hashing: MD5 MACing: HMAC MD5 Symmetric: DES, RC4 Asymmetric: 1024-bit RSA, 1024-bit Diffie-Hellman RSA Key Wrapping RSA Key Wrapping (Key establishment providing 112 or 128 bits of security strength Table 13: Non-Approved Algorithms 7.4 Self-Tests The modules include an array of self-tests that are run during startup and periodically during operations to prevent any secure data from being released and to ensure all components are functioning correctly. The modules implement the following power-on self-tests: • Known Answer Tests: o IC2M: ▪ AES KAT, Page 28 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. ▪ AES-GCM KAT, ▪ SHA-1 KAT, ▪ SHA-256 KAT, ▪ SHA-384 KAT, ▪ SHA-512 KAT, ▪ HMAC SHA-1 KAT, ▪ HMAC SHA-256 KAT, ▪ HMAC SHA-384 KAT, ▪ HMAC SHA-512 KAT, ▪ DRBG KAT, ▪ KAS ECC Primitive “Z” KAT (NIST SP 800-56Arev3), ▪ KAS FFC Primitive “Z” KAT (NIST SP 800-56Arev3), ▪ IKEv2 KDF KAT, ▪ SNMP KDF KAT, ▪ SRTP KDF KAT, ▪ SSH KDF KAT, ▪ RSA KAT. o Firmware Integrity Test (RSA 2048 w/ SHA-256) o NIM-2GE-CU-SFP (MACsec): ▪ AES-GCM KAT The modules perform all power-on self-tests automatically at boot. All power-on self- tests must be passed before any operator can perform cryptographic services. The power- on self-tests are performed after the cryptographic systems are initialized but prior any other operations; this prevents the module from passing any data during a power-on self- test failure. In addition, the modules also provide the following conditional self-tests: • Continuous Random Number Generator test for the FIPS-approved DRBG • Continuous Random Number Generator test for the non-approved RNG • Pair-Wise Consistency Test for RSA signature keys • Pair-Wise Consistency Test for RSA keys used in key establishment • Firmware Load Test Page 29 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 8 Physical Security The modules are production grade multi-chip standalone cryptographic modules that meet level 1 physical security requirements. Page 30 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 9 Secure Operation The module meets all the Level 1 requirements for FIPS 140-2. The module is shipped only to authorized operators by the vendor, and the module is shipped in Cisco boxes with Cisco adhesive, so if tampered with the recipient will notice. Follow the setting instructions provided below to place the module in FIPS-approved mode. Operating this module without maintaining the following settings will remove the module from the FIPS approved mode of operation. Upon initial boot from the factory, the ISR is in a non-FIPS mode of operation. To transition from a non-FIPS mode of operation to a FIPS mode of operation, the Cryptographic Officer must follow all steps detailed in section 9.1 of this security policy 9.1 System Initialization and Configuration Step1 - The value of the boot field must be 0x2102. This setting disables break from the console to the ROM monitor and automatically boots. From the “configure terminal” command line, the Crypto Officer enters the following syntax: config-register 0x2102 Step 2 - The Crypto Officer must create the “enable” password for the Crypto Officer role. Procedurally, the password must be at least 8 characters, including at least one letter and at least one number, and is entered when the Crypto Officer first engages the “enable” command. The Crypto Officer enters the following syntax at the “#” prompt: enable secret [PASSWORD] Step 3 - The Crypto Officer must set up the operators of the module. The Crypto Officer enters the following syntax at the “#” prompt: Username [USERNAME] Password [PASSWORD] Step 4 – For the created operators, the Crypto Officer must always assign passwords (of at least 8 characters, including at least one letter and at least one number) to users. Identification and authentication on the console/auxiliary port is required for Users. From the “configure terminal” command line, the Crypto Officer enters the following syntax: line con 0 password [PASSWORD] login local Step 5 - The Crypto Officer may configure the module to use RADIUS or TACACS+ for authentication. Configuring the module to use RADIUS or TACACS+ for authentication is optional. If the module is configured to use RADIUS or TACACS+, the Crypto-Officer Page 31 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. must define RADIUS or TACACS+ shared secret keys that are at least 16 characters long, including at least one letter and at least one number. Step 6 - Dual IOS mode is not allowed. ROMMON variable IOSXE_DUAL_IOS must be set to 0. Step 7 - In service software upgrade (ISSU) is not allowed. The operator should not perform in service software upgrade of an ISR4000 FIPS validated firmware image Step 8 - Use of the debug.conf file is not allowed. The operator should not create the bootflash:/debug.conf file and use it for setting environment variables values. Step 9 – Execute the “platform ipsec fips-mode” command. Step 10 – After executing reload/ reboot command. The device will enter the FIPS mode. NOTE: The keys and CSPs generated in the cryptographic module during FIPS mode of operation cannot be used when the module transitions to non-FIPS mode and vice versa. While the module transitions from FIPS to non-FIPS mode or from non-FIPS to FIPS mode, all the keys and CSPs are to be zeroized by the Crypto Officer. 9.2 IPsec Requirements and Cryptographic Algorithms Step 1 - The only type of key management that is allowed in FIPS mode is Internet Key Exchange (IKE). Step 2 - Although the IOS implementation of IKE allows a number of algorithms, only the following algorithms are allowed in a FIPS 140-2 configuration: • ah-sha-hmac • ah-sha256-hmac • ah-sha384-hmac • ah-sha512-hmac • esp-sha-hmac • esp-sha256-hmac • esp-sha384-hmac • esp-sha512-hmac • esp-aes • esp-gcm Step 3 - The following algorithms shall not be used: Page 32 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. • MD-5 for signing • MD-5 HMAC • DES 9.3 Protocols Secure DNS and GDOI is not allowed in FIPS mode of operation and shall not be configured. 9.4 Remote Access SSH access to the module is allowed in FIPS approved mode of operation, using SSH v2 and a FIPS approved algorithm. SNMPv3 communications with the module are allowed in FIPS approved mode. 9.5 Key Strength Key sizes with security strength of less than 112-bits shall not be used in FIPS mode. 10 Related Documentation This document deals only with operations and capabilities of the security appliances in the technical terms of a FIPS 140-2 cryptographic device security policy. More information is available on the security appliances from the sources listed in this section and from the following source: • The NIST Cryptographic Module Validation Program website (http://csrc.nist.gov/groups/STM/cmvp/index.html) contains contact information for answers to technical or sales-related questions for the security appliances. • Software Configuration Guide (https://www.cisco.com/c/en/us/td/docs/routers/access/4400/software/configuratio n/guide/isr4400swcfg.html) • For LED related information please read the following document (https://www.cisco.com/c/en/us/td/docs/routers/access/4400/hardware/installation/ guide4400-4300/C4400_isr/Overview.html?bookSearch=true) Page 33 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. 11 Definitions List ACL Access Control List AES Advanced Encryption Standard AH Authentication Header ISR Aggregation Services Router CMVP Cryptographic Module Validation Program CSE Communications Security Establishment (Canada) CSP Critical Security Parameter DRAM Dynamic RAM DRBG Deterministic random bit generator EDC Error Detection Code ESP Encapsulating Security Payload FIPS Federal Information Processing Standard Gbps Gigabits per second GigE Gigabit Ethernet HMAC Hash Message Authentication Code HTTP Hyper Text Transfer Protocol IKE Internet Key Exchange IP Internet Protocol ISAKMP Internet Security Association and Key Management Protocol ISSU In service software upgrade KAT Known Answer Test KDF Key Derivation Function LAN Local Area Network LED Light Emitting Diode MAC Message Authentication Code MPLS Multiprotocol Label Switching NIST National Institute of Standards and Technology NVRAM Non-Volatile Random Access Memory PIN Personal Identification Number QoS Quality of Service RADIUS Remote Authentication Dial-In User Service Page 34 of 34 © Copyright 2023 Cisco Systems, Inc. This document may be freely reproduced and distributed whole and intact including this Copyright Notice. RAM Random Access Memory RNG Random Number Generator RP Route Processor RSA Rivest Shamir and Adleman method for asymmetric encryption SHA Secure Hash Algorithm SNMP Simple Network Management Protocol SSH Secure Shell TACACS Terminal Access Controller Access Control System TCP Transmission Control Protocol TLS Transport Layer Security USB Universal Serial Bus VPN Virtual Private Network