Cisco ONS 15454 10-Gbps Optical Encryption Line Card Summary Payment and Growth Flexibility

At-A-Glance
Cisco ONS 15454 10-Gbps Optical
Encryption Line Card
Summary
The Cisco® ONS 15454 10-Gbps Optical Encryption Line Card (Figure 1) brings secure
transport capability to the Cisco ONS 15454 Multiservice Transport Platform (MSTP).
The card provides data confidentiality and data integrity over a fiber optic communication
channel through the combination of next-generation cryptography and trusted product
architecture. Consisting of ten Enhanced Small Form-Factor Pluggable (SFP+) ports
in five pairs, the line card provides integrated transponder functionality in addition to
encryption. Each SFP+ port can accept grey or DWDM pluggable optics, with trunk ports
supporting G.709 Digital Wrapper for carrier-class OAM, plus Forward Error Correction
(FEC) for longer reach. The single-slot card is compatible with the ONS 15454 MSTP
M6 and M2 chassis, allowing up to 30 encrypted 10-Gbps streams in a 6RU footprint.
Figure 1. Optical Encryption Line Card
Payment and Growth Flexibility
Two versions of the optical encryption card are available, allowing customers to deploy
only the services that need encryption. Users can choose from:
• An unlicensed card providing five encryption services.
• A licensed card providing a single encryption stream initially, with the option to
upgrade to the card’s capacity of five using Pay-As-You-Grow software licensing.
Robust Architecture
The optical encryption card was engineered in collaboration with Cisco’s Trustworthy
Systems group, ensuring a highly robust architecture (Figure 2) and adherence to
product security development best practices, including:
• Immutable identity: Cryptographically assertable hardware-based identity through
X.509 certificates deters counterfeiting and provides standardized network
identification.
• Boot-time integrity: Boot verification is rooted in hardware to help ensure that only
authentic Cisco software boots and that its integrity is intact.
• Load-time integrity: This is achieved through the digital image signing process, which
involves signing a software package and verifying the signature on the image during
equipment boot process.
• Secure control plane: The key exchange between the encryption cards uses the
G.709 GCC2 channel, which is secured using Transport Layer Security (TLS).
Flexibility
Multiple Protocols Supported
A comprehensive suite of client protocols is supported, including 10 Gigabit Ethernet
(LAN and WAN physical layer), 8-Gb Fibre Channel,10-Gb Fibre Channel, OC-192,
STM-64, OTU2, and OTU2e.
Multiple Modes of Operation
The optical encryption card offers six different modes of operation that can be applied
independently on each client-trunk pair: Encryption and Authentication, Encryption only,
Authentication only, Unencrypted (normal) transponder, Ultra Low Latency transponder,
and Optical-Electrical-Optical (OEO) regenerator.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
• Secure data plane: The confidentiality of the data is protected through TLS-based
encryption, its integrity through authentication, and its availability through multiple
optical protection mechanisms.
Next-Generation Cryptography
The optical encryption card uses next-generation cryptographic algorithms to provide
security to the data transmitted over optical fiber and DWDM systems.
• Advanced Encryption Standard (AES): The AES-256 algorithm is used for encrypting
the data. AES is globally recognized as a very strong cryptographic algorithm.
• XEX Tweakable Block Cipher with Ciphertext Stealing (XTS): AES-XTS protects
better against ciphertext manipulation and cut-and-paste attacks than other AES
modes working with the same set of constraints.
1
At-A-Glance
Cisco ONS 15454 10-Gbps Optical
Encryption Line Card
• Galois Message Authentication Code (GMAC): GMAC is defined by National Institute
of Standards (NIST) special publication 800-38D and provides efficient ways to
authenticate a large set of data and protection against bit-flipping attacks.
Figure 2. Cisco Optical Encryption Architecture
• Elliptic Curve Diffie Hellman (ECDH): The key exchange protocol uses ECDH, providing
perfect forward secrecy as the key is never sent over the communication channel.
• Raw Source of Entropy: A NIST SP800-90 compliant true random source of entropy
is used to produce sequences of numbers that are not predictable.
• Suite-B compliant: With support for ECDSA in a future release, the Cisco optical
encryption card uses the other suite-B algorithms specified by NSA (AES, GCM,
and CDH).
Comprehensive Management
Cisco Transport Controller is a GUI-based application used to configure and manage ONS
15454 MSTP systems, including the optical encryption card. It offers these features:
• User management: Role-based access control and complete separation of privileges
between users from the transport domain and those from the security domain
• Key management: Key generation and key change interval
• Cryptographic lifecycle management: The card-to-card authentication and card
authorization between two encryption cards that must succeed prior to key exchange
• Performance management: Alarms to detect an active or a passive intrusion, as well
as the failure of any security function
Exceptional Certification and Support
Cisco Classified Network Support
Cisco offers high-touch, personalized service from a cleared team of industry-leading
network engineers dedicated to supporting Cisco’s government customers. Cisco
Classified Network Support provides expedited issue resolution to help intelligence
community agencies maintain a network primed to keep pace with mission demands.
Certifications
The optical encryption card will undergo the following government certifications to meet
mission-critical requirements.
• FIPS (Federal Information Processing Standard) 140-2 Level 2 validation
• Common Criteria NDPP (Network Device Protection Profile) compliance.
• UC-APL (Unified Capabilities Approved Products List)
Product ID: 15454-M-WSE-K9
Description: Full Feature Wire Speed Encryption Unit
System Software Required: Release 9.8
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned
are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-728015-00 04/13
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
2