Dell AP-93, W- AP92, W-AP105, AP-92, AP-175, W-AP93, W-AP175, AP-105 manual Self Tests

Page 44

7 Self Tests

The module performs the following Self Tests after being configured into either Remote AP mode or Remote Mesh Portal mode. The module performs both power-up and conditional self-tests. In the event any self-test fails, the module enters an error state, logs the error, and reboots automatically.

The module performs the following power-up self-tests:

Aruba Hardware known Answer tests: o AES KAT

o HMAC-SHA1 KAT o Triple-DES KAT

ArubaOS OpenSSL AP Module

oAES KAT

oHMAC (HMAC-SHA1, HMAC-SHA256 and HMAC SHA384) KAT

oRNG KAT

oRSA KAT

oSHS (SHA1, SHA256 and SHA384) KAT

oTriple-DES KAT

ArubaOS Cryptographic Module

oAES KAT

oHMAC (HMAC-SHA1, HMAC-SHA256, HMAC SHA384, and HMAC512) KAT

oFIPS 186-2 RNG KAT

oRSA (sign/verify)

oSHS (SHA1, SHA256, SHA384, and SHA512) KAT

oTriple-DES KAT

ArubaOS Uboot Bootloader Module

oFirmware Integrity Test: RSA 2048-bit Signature Validation

Aruba Atheros hardware CCM

oAES-CCM KAT

The following Conditional Self-tests are performed in the module:

Continuous Random Number Generator Test–This test is run upon generation of random data by the module’s random number generators to detect failure to a constant value. The module stores the first random number for subsequent comparison, and the module compares the value of the new random number with the random number generated in the previous round and enters an error state if the comparison is successful. The test is performed for the approved as well as non- approved RNGs.

RSA pairwise Consistency Test

Firmware load test

These self-tests are run for the Atheros hardware cryptographic implementation as well as for the Aruba OpenSSL and ArubaOS cryptographic module implementations.

44

Image 44
Contents Version Feb Aruba Networks Crossman Ave Sunnyvale, CA Page Aruba Dell Relationship Acronyms and Abbreviations AP-105 SeriesAP-175 Series Security Levels Physical SecurityROLES, Authentication and Services Acronyms and Abbreviations IntroductionAruba Dell Relationship GHz IPSecProduct Overview AP-92Physical Description Aruba Part Number Dell Corresponding Part NumberEnet AP-92 Indicator LEDs Label Function Action StatusPWR AP-93 Label Function Action StatusAP-93 Indicator LEDs Label Function Action Status AP-105 Wireless Access Point AP-105 SeriesAP-105 Indicator LEDs Label Function Action Status AP-175 Wireless Access Point AP-175 SeriesPhysical Description AP-175 Indicator LEDs Label Function Action Status PositionModule Objectives Security LevelsPhysical Security Applying TELs2 AP-92 TEL Placement AP-92 Tel placement front viewAruba AP-92 Tel placement right view 3 AP-93 TEL Placement Aruba AP-92 Tel placement bottom viewAruba AP-93 Tel placement left view 4 AP-105 TEL Placement Aruba AP-93 Tel placement top viewAruba AP-105 Tel placement left view 5 AP-175 TEL Placement Aruba AP-105 Tel placement bottom viewAruba AP-175 Tel placement back view Inspection/Testing of Physical Security Mechanisms Aruba AP-175 Tel placement top viewConfiguring Remote AP Fips Mode Modes of OperationEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Verify that the module is in Fips mode Operational EnvironmentLogical Interfaces Fips 140-2 Logical Interfaces Module Physical InterfaceRoles Roles, Authentication and ServicesCrypto Officer Authentication User Authentication Wireless Client AuthenticationStrength of Authentication Mechanisms Authentication Mechanism StrengthWPA2-PSK Services Crypto Officer ServicesWPA2 PSK KEKUser Services PMKPTK Eapol MICWireless Client Services Unauthenticated Services∙ FTP ∙ Tftp ∙ NTP Cryptographic Algorithms Non-FIPS Approved AlgorithmsCritical Security Parameters HmacRNG PSK AES-CCMGMK GTKSelf Tests For an AES Atheros hardware Post failure