Zeroization erases all potentially sensitive information in the router memory. This includes the erasure of the main memory, cache memories, and other memories containing packet data, NVRAM, and Flash memory. The Zeroization button on the faceplate is used to invoke zeroization. The parameters for zeroization can be configured, but zeroization cannot be invoked through the command-line interface (CLI).
Zeroization is disabled by default.
Feature History for zeroisation
This feature was introduced.
This feature was integrated into Cisco IOS Release 12.4(2)T.
Finding Support Information for Platforms and Cisco IOS Software Images
Use Cisco Feature Navigator to find information about platform support and Cisco IOS software image support. Access Cisco Feature Navigator at http://www.cisco.com/go/fn. You must have an account on Cisco.com. If you do not have an account or have forgotten your username or password, click Cancel at the login dialog box and follow the instructions that appear.
•Restrictions for Zeroization
•Information About Zeroization
Restrictions for Zeroization
•Zeroization is supported on the Cisco 3200 series routers only.
•When zeroization is enabled, the auxiliary (AUX) port should not be used for any function other than an actuator, such as a push button. There is no way to reliably ascertain whether a device connected to the AUX port might trigger zeroization. We recommend that if zeroization is enabled, no devices, with the exception of the zeroization actuator, be attached to the AUX port. There are some AUX port configuration restrictions that apply when zeroization is enabled.
•Zeroization can only be invoked and executed locally. It cannot be invoked and executed remotely through a Telnet session.
•Zeroization shuts down all network interfaces and causes zeroization of the Cisco IOS configuration and object code files, including all IP addresses on the router that are contained in volatile memory.
Information About Zeroization
To invoke zeroization, you should understand the following concept:
•Scrubbing the Router Memory
Scrubbing the Router Memory
Scrubbing is defined as performing several passes through the memory areas, overwriting the memory using a separate data pattern for each pass. The data patterns used for scrubbing consist of separate passes; each pass fills the memory with the following data patterns:
•All ones (that is, 0xffff ffff)
•Alternating ones and zeroes (that is, 0xa5a5 a5a5)
•Alternating zeroes and ones (that is, 0x5a5a 5a5a)
•All zeroes (that is, 0x0000 0000)
The data patterns ensure that
•Each bit in the memory is cleared to zero and set to one at least once.
•The final state of the memory is such that all prior information is erased.
The following items in the router memory are scrubbed:
•Dual-port RAM in the CPM
All the main memory is scrubbed except the memory area containing a small program loop that does the actual scrubbing.
The following items in the router memory cannot be scrubbed:
•Console and AUX port UART FIFO queues. A series of characters is forced through the FIFO queues to ensure that all sensitive information in the FIFO queues is flushed.
•NVRAM, which is erased entirely.
•Flash memory file system, which is erased entirely.
•Caches, which are flushed and invalidated, eliminating all of the information. The process of scrubbing the main memory causes all cache lines to receive the scrubbing data patterns.
Note Some items cannot be completely scrubbed. For example, some devices provide a reset or invalidate of their memory, rather than providing a full data path through which the scrubbing patterns can be written upon memory.
The following commands are introduced or modified in the feature or features documented in this module. For information about these commands, see the Cisco IOS Configuration Fundamentals Command Reference at http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html. For information about all Cisco IOS commands, go to the Command Lookup Tool at http://tools.cisco.com/Support/CLILookup or to the Cisco IOS Master Commands List.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2007 Cisco Systems, Inc. All rights reserved.