
Cisco ISR-800 Security Target
Identification
FCS: Cryptographic support
Cryptographic Key Generation (for asymmetric keys)
Cryptographic Key Generation (for asymmetric keys)
Cryptographic Key Zeroization
Cryptographic Operation (for data encryption/decryption)
Cryptographic Operation (for cryptographic signature)
Cryptographic Operation (for cryptographic hashing)
Cryptographic Operation (for keyed-hash message
authentication)
Extended: Internet Protocol Security (IPsec)
Communications
Extended: Cryptographic Operation (Random Bit
Generation)
FDP: User data protection
Full Residual Information Protection
authentication
Authentication Failure Handling
Extended: Pre-Shared Key Composition
User Identification and Authentication
Extended: Password-based Authentication Mechanism
Protected Authentication Feedback
Extended: X.509 Certificates
Management of Security Functions Behavior
Management of 7TSF Data (for general TSF data)
Specification of Management Functions
Restrictions on Security Roles
FPT: Protection of the TSF
Comentarios a estos manuales