Service | Description | CSPs Accessed (see section 6 | ||
|
| below for complete description of | ||
|
| CSPs) |
| |
|
|
| ||
|
| ∙ 802.11i | ||
|
| ∙ | 802.11i GMK | |
|
| ∙ | 802.11i GTK | |
|
|
|
| |
Use of WPA | When the module is in mesh |
|
| |
establishment of IEEE 802.11i | configuration, the | ∙ | WPA2 PSK | |
keys | mesh links are secured with | |||
|
| |||
| 802.11i. This is authenticated |
|
| |
| with a shared secret |
|
| |
|
|
|
|
4.2.3 Wireless Client Services
The following module services are provided for the Wireless Client role in each of FIPS approved modes defined in section 3.3.
Service | Description | CSPs Accessed (see section 6 | ||
|
| below for complete description of | ||
|
| CSPs) |
| |
|
|
|
| |
Generation and use of 802.11i | In all modes, the links between | ∙ | 802.11i PMK | |
cryptographic keys | the module and wireless client are | ∙ | 802.11i PTK | |
| secured with 802.11i. | |||
|
|
| ||
|
| ∙ | 802.11i EAPOL MIC | |
|
|
| Key | |
|
| ∙ | 802.11i EAPOL | |
|
|
| Encryption Key | |
|
| ∙ 802.11i | ||
|
| ∙ | 802.11i GMK | |
|
| ∙ | 802.11i GTK | |
|
|
|
| |
Use of WPA | When the module is in advanced |
|
| |
establishment of IEEE 802.11i | Remote AP configuration, the | ∙ | WPA2 PSK | |
keys | links between the module and the | |||
|
| |||
| wireless client are secured with |
|
| |
| 802.11i. This is authenticated |
|
| |
| with a shared secret only. |
|
| |
|
|
|
| |
Wireless bridging services | The module bridges traffic |
|
| |
| between the wireless client and | None | ||
| the wired network. | |||
|
|
| ||
|
|
|
|
4.2.4 Unauthenticated Services
The module provides the following unauthenticated services, which are available regardless of role. No CSPs are accessed by these services.
27