| 3.2.5 | 23 | ||
|
| 3.2.5.1 To detect access to restricted ports: | 23 | |
|
| 3.2.5.2 To detect opening of the chassis cover: | 23 | |
| 3.2.6 Inspection/Testing of Physical Security Mechanisms | 25 | ||
| 3.3 | MODES OF OPERATION | 26 | |
| 3.3.1 Configuring Remote AP FIPS Mode | 26 | ||
| 3.3.2 Configuring Control Plane Security (CPSec) protected AP FIPS mode | 27 | ||
| 3.3.3 Configuring Remote Mesh Portal FIPS Mode | 28 | ||
| 3.3.4 Configuring Remote Mesh Point FIPS Mode | 29 | ||
| 3.3.5 Verify that the module is in FIPS mode | 30 | ||
| 3.4 | OPERATIONAL ENVIRONMENT | 30 | |
| 3.5 | LOGICAL INTERFACES | 31 | |
4 ROLES, AUTHENTICATION AND SERVICES | 32 | |||
| 4.1 | ROLES | 32 | |
| 4.1.1 | Crypto Officer Authentication | 32 | |
| 4.1.2 | User Authentication | 33 | |
| 4.1.3 | Wireless Client Authentication | 33 | |
| 4.1.4 Strength of Authentication Mechanisms | 33 | ||
| 4.2 | SERVICES | 35 | |
| 4.2.1 | Crypto Officer Services | 35 | |
| 4.2.2 | User Services | 36 | |
| 4.2.3 | Wireless Client Services | 37 | |
| 4.2.4 | Unauthenticated Services | 37 | |
5 | CRYPTOGRAPHIC ALGORITHMS | 39 | ||
6 | CRITICAL SECURITY PARAMETERS | 40 | ||
7 | SELF TESTS | 44 |
4