Dell AP-135, W-AP135, W-AP134 manual 2 AP-134 TEL Placement, AP-134 Front view

Page 12

3.2.2 AP-134 TEL Placement

This section displays all the TEL locations of the Aruba AP-134. The AP-134 requires a minimum of 5 TELs to be applied as follows:

3.2.2.1To detect opening of the chassis cover:

1.Spanning the bottom and top chassis covers and placed in the front left corner

2.Spanning the bottom and top chassis covers and placed in the back left corner

3.Spanning the chassis screw on the bottom left corner

4.Spanning the chassis screw on the bottom right corner

3.2.2.2To detect access to restricted ports

5.Spanning the serial port

Following is the TEL placement for the AP-134:

Figure 1: AP-134 Front view

Figure 2: AP-134 Back View

Figure 3: AP-134 Left View

12

Image 12
Contents Fips 140-2 Non-Proprietary Security Policy Page Aruba Dell Relationship Acronyms and Abbreviations Security Levels Physical SecurityModes of Operation Operational Environment Logical InterfacesServices Introduction Aruba Dell RelationshipAcronyms and Abbreviations CPSecSHA Product Overview AP-134Physical Description Aruba Part Number Dell Corresponding Part NumberAP-134 Indicator LEDs Label Function Action Status PWRENET0 ENET1AP-135 AP-135 Indicator LEDs Label Function Action Status Module Objectives Security LevelsPhysical Security Applying TELs2 AP-134 TEL Placement AP-134 Front view3 AP-135 TEL Placement AP-134 Top ViewAP-135 Front view Inspection/Testing of Physical Security Mechanisms AP-135 Top viewConfiguring Remote AP Fips Mode Modes of OperationEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Verify that the module is in Fips mode Operational EnvironmentLogical Interfaces Fips 140-2 Logical Interface Module Physical InterfaceRoles, Authentication and Services Crypto Officer AuthenticationRoles User Authentication Wireless Client AuthenticationStrength of Authentication Mechanisms Authentication Mechanism StrengthWPA2-PSK Services Crypto Officer ServicesWPA2 PSK KEKUser Services PMKPTK Eapol MICWireless Client Services Unauthenticated Services∙ FTP ∙ Tftp ∙ NTP Cryptographic Algorithms Non-FIPS Approved AlgorithmsCritical Security Parameters HmacRNG PSK AES-CCMGMK GTKSelf Tests For an AES Atheros hardware Post failure