Page 2of 72
Table of Contents
1Introduction............................................................................................................................. 7
1.1 Audience......................................................................................................................... 7
1.2 Purpose............................................................................................................................ 7
1.3 Document References..................................................................................................... 7
1.4 Supported Hardware and Software................................................................................. 9
1.5 Operational Environment................................................................................................ 9
1.5.1 Supported non-TOE Hardware/Software/Firmware................................................... 9
1.6 Excluded Functionality................................................................................................. 10
2Secure Acceptance of the TOE............................................................................................. 11
3Secure Installation and Configuration .................................................................................. 16
3.1 Physical Installation...................................................................................................... 16
3.2 Initial Setup via Direct Console Connection ................................................................ 16
3.2.1 Options to be chosen during the initial setup of the ASR......................................... 16
3.2.2 Saving Configuration................................................................................................ 16
3.2.3 Enabling FIPS Mode................................................................................................. 17
3.2.4 Administrator Configuration and Credentials........................................................... 17
3.2.5 Session Termination.................................................................................................. 17
3.2.6 User Lockout............................................................................................................. 18
3.3 Network Protocols and Cryptographic Settings............................................................ 19
3.3.1 Remote Administration Protocols............................................................................. 19
3.3.2 Authentication Server Protocols............................................................................... 20
3.3.3 Logging Configuration.............................................................................................. 20
3.3.4 Logging Protection.................................................................................................... 22
3.3.5 Base Firewall Rule set Configuration....................................................................... 24
3.3.6 Routing Protocols...................................................................................................... 26
3.3.7 MACSEC and MKA Configuration.......................................................................... 26
4Secure Management.............................................................................................................. 27
4.1 User Roles..................................................................................................................... 27
4.2 Passwords...................................................................................................................... 27
4.3 Clock Management....................................................................................................... 30