Dell W-AP134, AP-134, AP-135, W-AP135 manual Wireless Client Services, Unauthenticated Services

Page 27

Service

Description

CSPs Accessed (see section 6

 

 

below for complete description of

 

 

CSPs)

 

 

 

 

 

 

∙ 802.11i AES-CCM key

 

 

802.11i GMK

 

 

802.11i GTK

 

 

 

 

Use of WPA pre-shared key for

When the module is in mesh

 

 

establishment of IEEE 802.11i

configuration, the inter-module

WPA2 PSK

keys

mesh links are secured with

 

 

 

802.11i. This is authenticated

 

 

 

with a shared secret

 

 

 

 

 

 

4.2.3 Wireless Client Services

The following module services are provided for the Wireless Client role in each of FIPS approved modes defined in section 3.3.

Service

Description

CSPs Accessed (see section 6

 

 

below for complete description of

 

 

CSPs)

 

 

 

 

 

Generation and use of 802.11i

In all modes, the links between

802.11i PMK

cryptographic keys

the module and wireless client are

802.11i PTK

 

secured with 802.11i.

 

 

 

 

 

802.11i EAPOL MIC

 

 

 

Key

 

 

802.11i EAPOL

 

 

 

Encryption Key

 

 

∙ 802.11i AES-CCM key

 

 

802.11i GMK

 

 

802.11i GTK

 

 

 

 

Use of WPA pre-shared key for

When the module is in advanced

 

 

establishment of IEEE 802.11i

Remote AP configuration, the

WPA2 PSK

keys

links between the module and the

 

 

 

wireless client are secured with

 

 

 

802.11i. This is authenticated

 

 

 

with a shared secret only.

 

 

 

 

 

 

Wireless bridging services

The module bridges traffic

 

 

 

between the wireless client and

None

 

the wired network.

 

 

 

 

 

 

 

4.2.4 Unauthenticated Services

The module provides the following unauthenticated services, which are available regardless of role. No CSPs are accessed by these services.

27

Image 27
Contents Fips 140-2 Non-Proprietary Security Policy Page Operational Environment Logical Interfaces Aruba Dell Relationship Acronyms and AbbreviationsSecurity Levels Physical Security Modes of OperationServices CPSec IntroductionAruba Dell Relationship Acronyms and AbbreviationsSHA Aruba Part Number Dell Corresponding Part Number Product OverviewAP-134 Physical DescriptionENET1 AP-134 Indicator LEDs Label Function Action StatusPWR ENET0AP-135 AP-135 Indicator LEDs Label Function Action Status Applying TELs Module ObjectivesSecurity Levels Physical SecurityAP-134 Front view 2 AP-134 TEL PlacementAP-134 Top View 3 AP-135 TEL PlacementAP-135 Front view AP-135 Top view Inspection/Testing of Physical Security MechanismsModes of Operation Configuring Remote AP Fips ModeEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Operational Environment Verify that the module is in Fips modeFips 140-2 Logical Interface Module Physical Interface Logical InterfacesRoles, Authentication and Services Crypto Officer AuthenticationRoles Authentication Mechanism Strength User AuthenticationWireless Client Authentication Strength of Authentication MechanismsWPA2-PSK KEK ServicesCrypto Officer Services WPA2 PSKEapol MIC User ServicesPMK PTKUnauthenticated Services Wireless Client Services∙ FTP ∙ Tftp ∙ NTP Non-FIPS Approved Algorithms Cryptographic AlgorithmsHmac Critical Security ParametersRNG AES-CCM PSKGTK GMKSelf Tests For an AES Atheros hardware Post failure