Dell W-AP134, AP-134, W-AP135 Inspection/Testing of Physical Security Mechanisms, AP-135 Top view

Page 15

Figure 11: AP-135 Top view

Figure 12: AP-135 Bottom View

3.2.4 Inspection/Testing of Physical Security Mechanisms

Physical Security Mechanism

Recommended Test Frequency

Guidance

 

 

 

 

Tamper-evident labels (TELs)

Once per month

Examine for any sign of removal,

 

 

replacement, tearing, etc.

See

 

 

images above for locations of

 

 

TELs

 

 

 

 

 

Opaque module enclosure

Once per month

Examine module enclosure

for

 

 

any evidence of new openings or

 

 

other access to the module

 

 

internals.

 

 

 

 

 

15

Image 15
Contents Fips 140-2 Non-Proprietary Security Policy Page Operational Environment Logical Interfaces Aruba Dell Relationship Acronyms and AbbreviationsSecurity Levels Physical Security Modes of OperationServices CPSec IntroductionAruba Dell Relationship Acronyms and AbbreviationsSHA Aruba Part Number Dell Corresponding Part Number Product OverviewAP-134 Physical DescriptionENET1 AP-134 Indicator LEDs Label Function Action StatusPWR ENET0AP-135 AP-135 Indicator LEDs Label Function Action Status Applying TELs Module ObjectivesSecurity Levels Physical SecurityAP-134 Front view 2 AP-134 TEL PlacementAP-134 Top View 3 AP-135 TEL PlacementAP-135 Front view AP-135 Top view Inspection/Testing of Physical Security MechanismsModes of Operation Configuring Remote AP Fips ModeEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Operational Environment Verify that the module is in Fips modeFips 140-2 Logical Interface Module Physical Interface Logical InterfacesRoles, Authentication and Services Crypto Officer AuthenticationRoles Authentication Mechanism Strength User AuthenticationWireless Client Authentication Strength of Authentication MechanismsWPA2-PSK KEK ServicesCrypto Officer Services WPA2 PSKEapol MIC User ServicesPMK PTKUnauthenticated Services Wireless Client Services∙ FTP ∙ Tftp ∙ NTP Non-FIPS Approved Algorithms Cryptographic AlgorithmsHmac Critical Security ParametersRNG AES-CCM PSKGTK GMKSelf Tests For an AES Atheros hardware Post failure