User Guide
Page 4
...the WIC, but the boundary does not include the WIC itself. The cryptographic boundary includes the connection apparatus between the WIC and the motherboard/daughterboard that would be installed over the right-hand side air vents in order to operate in this document is provided by an ...size of the vent holes, reducing visibility within this cryptographic boundary. The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers The Cisco 1721/1760 Cryptographic Module Figure 1 The Cisco 1721 and Cisco 1760 Routers PWR OK AW CTI/CC0H0 AW CTI/CC1H0 ACT/CH1 ACT/CH1 ETH...
...the WIC, but the boundary does not include the WIC itself. The cryptographic boundary includes the connection apparatus between the WIC and the motherboard/daughterboard that would be installed over the right-hand side air vents in order to operate in this document is provided by an ...size of the vent holes, reducing visibility within this cryptographic boundary. The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers The Cisco 1721/1760 Cryptographic Module Figure 1 The Cisco 1721 and Cisco 1760 Routers PWR OK AW CTI/CC0H0 AW CTI/CC1H0 ACT/CH1 ACT/CH1 ETH...
User Guide
Page 10
...Routers The Cisco 2621XM/2651XM Cryptographic Module Figure 6 The Cisco 2621XM/2651XM Router POWER RPS ACTIVITY Cisco 2600SERIES 99493 The cryptographic boundary is provided by an installed WIC or Network Module. The cryptographic boundary includes the connection apparatus between the WIC or Network Module and the motherboard...2 Forwarding (L2F) and Layer 2 Tunneling Protocols (L2TP) make the Cisco 2600 an ideal platform for the 2651XM. Cisco 2621XM and 2651XM Module Interfaces The interfaces for the router are not designed to 30 thousand packets per second (Kpps) throughput capacity ...
...Routers The Cisco 2621XM/2651XM Cryptographic Module Figure 6 The Cisco 2621XM/2651XM Router POWER RPS ACTIVITY Cisco 2600SERIES 99493 The cryptographic boundary is provided by an installed WIC or Network Module. The cryptographic boundary includes the connection apparatus between the WIC or Network Module and the motherboard...2 Forwarding (L2F) and Layer 2 Tunneling Protocols (L2TP) make the Cisco 2600 an ideal platform for the 2651XM. Cisco 2621XM and 2651XM Module Interfaces The interfaces for the router are not designed to 30 thousand packets per second (Kpps) throughput capacity ...
User Guide
Page 14
... parameters pass through the LAN ports). Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, and 3745 Modular Access Routers and 7206-VXR NPE-400 Router FIPS 140-2 Non-Proprietary 14 OL-6083-01 The cryptographic boundary includes the connection apparatus between the WIC or Network Module and the motherboard/daughterboard that the fixed LAN ports...
... parameters pass through the LAN ports). Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, and 3745 Modular Access Routers and 7206-VXR NPE-400 Router FIPS 140-2 Non-Proprietary 14 OL-6083-01 The cryptographic boundary includes the connection apparatus between the WIC or Network Module and the motherboard/daughterboard that the fixed LAN ports...
User Guide
Page 18
... 15. All of Remote Access WANs via IPSec, Layer 2 Forwarding (L2F) and Layer 2 Tunneling Protocols (L2TP) make the Cisco 3700 an ideal platform for the router are not designed to 100 thousand packets per second (Kpps) throughput capacity for the 3725, and 225 Kpps for the dynamic requirements...and the motherboard/daughterboard that would be occupied by components within the case that hosts the WIC or Network Module, but the boundary does not include the WIC or Network Module itself. The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers The Cisco 3725/3745...
... 15. All of Remote Access WANs via IPSec, Layer 2 Forwarding (L2F) and Layer 2 Tunneling Protocols (L2TP) make the Cisco 3700 an ideal platform for the router are not designed to 100 thousand packets per second (Kpps) throughput capacity for the 3725, and 225 Kpps for the dynamic requirements...and the motherboard/daughterboard that would be occupied by components within the case that hosts the WIC or Network Module, but the boundary does not include the WIC or Network Module itself. The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers The Cisco 3725/3745...
User Guide
Page 24
... motherboard/daughterboard that would be placed in this document is defined as encompassing the "top," "backplane," "left," "right," and "bottom" surfaces of the case; The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers Table 15 Cisco 3725 and Cisco ...3745 FIPS 140-2 Logical Interfaces (Continued) Router Physical Interface 10/100BASE-TX LAN Port WIC Interface Network Module Interface...
... motherboard/daughterboard that would be placed in this document is defined as encompassing the "top," "backplane," "left," "right," and "bottom" surfaces of the case; The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers Table 15 Cisco 3725 and Cisco ...3745 FIPS 140-2 Logical Interfaces (Continued) Router Physical Interface 10/100BASE-TX LAN Port WIC Interface Network Module Interface...
User Guide
Page 29
... 20. Any attempt to remove the enclosure will leave tamper evidence. Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, and 3745 Modular Access Routers and 7206-VXR NPE-400 Router FIPS 140-2 Non-Proprietary OL-6083-01 29 The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206...other module slot, which is entirely encased by a thick steel chassis. Place the first label on the router as follows: To apply serialized tamper-evidence labels to the motherboard, memory, and expansion slots. The tamper evidence label should be placed so that the half of the label...
... 20. Any attempt to remove the enclosure will leave tamper evidence. Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, and 3745 Modular Access Routers and 7206-VXR NPE-400 Router FIPS 140-2 Non-Proprietary OL-6083-01 29 The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206...other module slot, which is entirely encased by a thick steel chassis. Place the first label on the router as follows: To apply serialized tamper-evidence labels to the motherboard, memory, and expansion slots. The tamper evidence label should be placed so that the half of the label...