CSM and Data Path Security Features and Algorithms in FIPS-140-2 Mode

Table: CSM Algorithms and Table: Data Path Algorithms show the CSM and data path security features and associated algorithms for a 7705 SAR node running in FIPS-140-2 mode.

Table: CSM Algorithms

FIPS-140-2

CSM Algorithms

SSHv2

IPSec (IKEv1, IKEv2)

NGE

SNMPv3

SCP, SFTP

IGP, BGP, MPLS

PKI

Authentication

RSA 2048

DSA 1024

Preference to RSA in SSH negotiation

PSK (DH G14, DH G15)

SSH

N/A

SSH

N/A

N/A

Asymmetric Key

DH G14

(P ≥ 2K prime numbers, q > 224)

DH G14, DH G15 (P ≥ 2K prime numbers, q > 224)

SSH

N/A

SSH

N/A

RSA/ DSA 2048

Symmetric Key

AES-CBC (128,192, 256)

3DES-CBC

AES-CBC

(128,192, 256)

3DES-CBC

N/A

AES-128

SSH

N/A

N/A

Hash Algorithm

SHA-1 (128)

–HMAC-MD5

–HMAC-RIPEMD-160

–HMAC-SHA1-96

–HMAC-MD5-96

SHA-1 (128)

SHA-2 (256, 384, 512)

N/A

SHA-1 (SHA-128)

SSH

SHA-1 (128)

SHA-2 (256)

AES-18- CMAC-96

SHA1

SHA-224

SHA-256

SHA-384

SHA-512

Digital Signature

RSA 2048

DSA 1024

N/A

N/A

N/A

N/A

N/A

RSA/ DSA 2048

Note:

MD5 algorithms are not blocked from configuration in FIPS-140-2 mode. Although MD5 is not a FIPS-140-2-approved algorithm, it is allowed to be used when running in FIPS-140-2 mode.

Table: Data Path Algorithms

FIPS-140-2 Data Path Algorithms

SSHv2

IPSec

NGE/L3 Encryption

SNMPv3

SCP, SFTP

IGP, BGP, MPLS

Authentication

N/A

N/A

N/A

N/A

N/A

N/A

Asymmetric Key

N/A

N/A

N/A

N/A

N/A

N/A

Symmetric Key

N/A

AES-CBC

(128,192, 256)

3DES-CBC

AES-CBC

(128, 256)

N/A

N/A

N/A

Hash Algorithm

N/A

SHA-1 (128)

SHA-2 (256, 384, 512)

N/A

N/A

N/A

N/A