The Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, 3745, and 7206 VXR NPE-400 Routers
The Cisco 3725/3745 Cryptographic Module
Figure 14
NM -H DV
BA NK 4
The cryptographic boundary is defined as encompassing the "top," "front," "left," "right," and "bottom"
surfaces of the case; all portions of the "backplane" of the case which are not designed to accommodate
a WIC or Network Module; and the inverse of the three-dimensional space within the case that would be
occupied by an installed WIC or Network Module. The cryptographic boundary includes the connection
apparatus between the WIC or Network Module and the motherboard/daughterboard that hosts the WIC
or Network Module, but the boundary does not include the WIC or Network Module itself. In other
words, the cryptographic boundary encompasses all hardware components within the case of the device
except any installed modular WICs or Network Modules. All of the functionality discussed in this
document is provided by components within this cryptographic boundary.
Cisco IOS features such as tunneling, data encryption, and termination of Remote Access WANs via
IPSec, Layer 2 Forwarding (L2F) and Layer 2 Tunneling Protocols (L2TP) make the Cisco 3700 an ideal
platform for building virtual private networks or outsourced dial solutions. Cisco 3700`s RISC-based
processor provides the power needed for the dynamic requirements of the remote branch office,
achieving wire speed Ethernet to Ethernet routing with up to 100 thousand packets per second (Kpps)
throughput capacity for the 3725, and 225 Kpps for the 3745.
Cisco 3725 and 3745 Module Interfaces
The interfaces for the router are located on the rear panel as shown in
Cisco 1721, 1760, 2621XM, 2651XM, 2691, 3725, and 3745 Modular Access Routers and 7206-VXR NPE-400 Router FIPS 140-2 Non-Proprietary
18
The Cisco 3725 and Cisco 3745 Routers
BA NK 3
BA NK 2
BA NK 1
BA NK 0
V0
SEE MAN
UAL BEF
ORE INS
TAL LAT ION
EN
DS U
56K
SEE MAN
UAL BEF
ORE INS
DS U
TAL LAT ION
56K
SEE MAN
UAL BEF
ORE INS
TAL LAT ION
Figure
15.
OL-6083-01