Motorola Network Router (MNR) S2500 Security Policy Document Version 1.3 Revision Date: 1/13/2009 Copyright © Motorola, Inc. 2009. May be reproduced only in its original entirety [without revision].
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 TABLE OF CONTENTS 1. MODULE OVERVIEW .........................................................................................................................................3 2. SECURITY LEVEL................................................................................................................................................4 3. MODES OF OPERATION.......................................................................................
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 1. Module Overview The MNR S2500 router, also referred to as the S2500, is a multi-chip standalone cryptographic module encased in a commercial grade metal case made of cold rolled steel. The module cryptographic boundary is the routers enclosure which includes all components, including the encryption module which is a separate part. Figure 1 illustrates the cryptographic boundary of the MNR S2500 router.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 2. Security Level The cryptographic module meets the overall requirements applicable to Level 1 security of FIPS 140-2.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 Firmware Implementations a. Triple-DES– CBC mode (112 and 168 bit) for IKE and SSHv2 encryption (Cert. #581) b. AES - CBC (128, 192, 256 bit), ECB (128), and CFB (128) modes for IKE and SSHv2 encryption (Cert. #611) c. HMAC-SHA-1 for IKE and SSHv2 authentication (Cert. # 322) d. SHA-1 for message hash (Cert. # 659) e. RSA v1.5 1024 bit – for public/private key pair generation and digital signatures (Cert. #283) f.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 Entering FIPS Mode To enter FIPS mode, the Crypto Officer must follow the procedure outlined in Table 3 below. For details on individual router commands, use the online help facility or review the Enterprise OS Software User Guide, version 15.4 and the Enterprise OS Software Reference Guide, version 15.4. Step Description 1. Configure the parameters for the IKE negotiations using the IKEProfile command.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 SHOW –CRYPTO CONFiguration This command shows a detailed summary of the cryptographic configuration and allows a user to verify that encryption is enabled on user-determined ports and that only FIPS-Approved algorithms are used for encryption and authentication.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 4. Ports and Interfaces Table 4 below provides a listing of the physical ports and logical interfaces for the MNR S2500 router. The MNR S2500 base unit provides a single 10/100 Mbps Ethernet interface and a console port. The MNR S2500 router incorporates two I/O slots for WAN and LAN connectivity and one slot for analog connectivity.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 strings consisting of 7 to 15 characters chosen from the 94 standard keyboard characters. Upon correct authentication, the role is selected based on the username of the operator. At the end of a session, the operator must log-out. When a router power cycles, sessions are terminated. A user must reauthenticate to access the router. Multiple concurrent operators.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 6. Access Control Policy Authenticated Services • Firmware Update: load firmware images digitally signed by RSA (1024 bit) algorithm. • Key Entry: Enter Pre-Shared Keys (PSK) • User Management: Add/Delete and manage passwords operators • Reboot: force the module to power cycle via a command • Zeroization: actively destroy all plaintext CSPs and keys • Crypto Configuration: Configure IPsec and FRF.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 Admin Firmware Update X X Key Entry X X User Management X X IKE X X IPsec Tunnel Establishment X X FRF.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 Definition of Critical Security Parameters (CSPs) The following CSPs are contained within the module: Key KEK Description/Usage This is the master key that encrypts persistent CSPs stored within the module. KEK-protected keys include PSK and passwords.
MNR S2500 Security Policy Version 1.
W SKEYID RW SKEYID_d RW Z SKEYID_a RW Z SKEYID_e RW Z Ephemeral DH Phase-1 private key RW Z Ephemeral Phase2 DH private key RW Z IPSEC Session Keys RW FRF.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 7. Operational Environment The FIPS 140-2 Area 6 Operational Environment requirements are not applicable because the MNR S2500 router does not contain a modifiable operational environment. 8. Security Rules The example cryptographic module’s design corresponds to the example cryptographic module’s security rules.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 B. Conditional Self-Tests: a. Continuous Random Number Generator (RNG) test on FIPS-approved deterministic RNG and Hardware NDRNG. b. Firmware load test – RSA signature verification of externally loaded code. c. Alternating bypass tests – when enabling FRF.17 and IPsec encryption. d. Pair-wise consistency test for public and private key establishment (RSA and DSA) e. Manual key entry test 4.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 10. Physical Security Policy Physical Security Mechanisms The MNR S2500 router is composed of industry standard production-grade components. 11. Mitigation of Other Attacks Policy The module has not been designed to mitigate against other attacks outside the scope of FIPS 140-2. 12.
MNR S2500 Security Policy Version 1.3, Revision Date: 1/13/2009 PFS – Perfect Forward Secrecy RNG – Random Number Generator SHA – Secure Hash Algorithm SSH – Secure Shell SNMP – Simple Network Management Protocol Tanapa - The part number that is built and stocked for customer orders.