Dell W-AP134, AP-134, AP-135, W-AP135 manual Rng

Page 31

 

 

 

STORAGE

 

CSP

CSP TYPE

GENERATION

And

USE

 

 

 

ZEROIZATI

 

 

 

 

ON

 

 

 

 

 

 

IKEv1/IKEv2 Diffie-

1024-bit

Generated internally

Stored in

Used in

Hellman Private key

Diffie-

during IKEv1/IKEv2

plaintext in

establishing

 

Hellman

negotiation

volatile

the session key

 

private key

 

memory;

for IPSec

 

 

 

zeroized when

 

 

 

 

session is

 

 

 

 

closed or

 

 

 

 

system is

 

 

 

 

powered off

 

 

 

 

 

 

IKEv1/IKEv2 Diffie-

128 bit Octet

Generated internally

Stored in

IKEv1/IKEv2

Hellman shared secret

 

during IKEv1/IKEv2

plaintext in

payload

 

 

negotiation

volatile

integrity

 

 

 

memory;

verification

 

 

 

zeroized when

 

 

 

 

session is

 

 

 

 

closed or

 

 

 

 

system is

 

 

 

 

powered off

 

 

 

 

 

 

ArubaOS OpenSSL RNG

Seed (16

Derived using NON-

Stored in

Seed ANSI

Seed for FIPS compliant

Bytes)

FIPS approved HW RNG

plaintext in

X9.31 RNG

ANSI X9.31, Appendix

 

(/dev/urandom)

volatile

 

A2.4 using AES-128 Key

 

 

memory only;

 

algorithm

 

 

zeroized on

 

 

 

 

reboot

 

 

 

 

 

 

ArubaOS OpenSSL RNG

Seed key (16

Derived using NON-

Stored in

Seed ANSI

Seed key for FIPS

bytes, AES-

FIPS approved HW RNG

plaintext in

X9.31 RNG

compliant ANSI X9.31,

128 Key

(/dev/urandom)

volatile

 

Appendix A2.4 using

algorithm)

 

memory only;

 

AES-128 Key algorithm

 

 

zeroized on

 

 

 

 

reboot

 

 

 

 

 

 

ArubaOS Cryptographic

Seed (64

Derived using NON-

Stored in

Seed 186-2

Module RNG Seed for

bytes)

FIPS approved HW RNG

plaintext in

General

FIPS compliant 186-2

 

(/dev/urandom)

volatile

Purpose (X

General Purpose (X

 

 

memory only;

change

change Notice); SHA-1

 

 

zeroized on

Notice); SHA-

RNG

 

 

reboot

1 RNG

 

 

 

 

 

ArubaOS Cryptographic

Seed Key

Derived using NON-

Stored in

Seed 186-2

Module RNG Seed key for

(64 bytes)

FIPS approved HW RNG

plaintext in

General

FIPS compliant 186-2

 

(/dev/urandom)

volatile

Purpose (X

General Purpose (X

 

 

memory only;

change

change Notice); SHA-1

 

 

zeroized on

Notice); SHA-

RNG

 

 

reboot

1 RNG

 

 

 

 

 

31

Image 31
Contents Fips 140-2 Non-Proprietary Security Policy Page Operational Environment Logical Interfaces Aruba Dell Relationship Acronyms and AbbreviationsSecurity Levels Physical Security Modes of OperationServices CPSec IntroductionAruba Dell Relationship Acronyms and AbbreviationsSHA Aruba Part Number Dell Corresponding Part Number Product OverviewAP-134 Physical DescriptionENET1 AP-134 Indicator LEDs Label Function Action StatusPWR ENET0AP-135 AP-135 Indicator LEDs Label Function Action Status Applying TELs Module ObjectivesSecurity Levels Physical SecurityAP-134 Front view 2 AP-134 TEL PlacementAP-134 Top View 3 AP-135 TEL PlacementAP-135 Front view AP-135 Top view Inspection/Testing of Physical Security MechanismsModes of Operation Configuring Remote AP Fips ModeEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Operational Environment Verify that the module is in Fips modeFips 140-2 Logical Interface Module Physical Interface Logical InterfacesCrypto Officer Authentication Roles, Authentication and ServicesRoles Authentication Mechanism Strength User AuthenticationWireless Client Authentication Strength of Authentication MechanismsWPA2-PSK KEK ServicesCrypto Officer Services WPA2 PSKEapol MIC User ServicesPMK PTKUnauthenticated Services Wireless Client Services∙ FTP ∙ Tftp ∙ NTP Non-FIPS Approved Algorithms Cryptographic AlgorithmsHmac Critical Security ParametersRNG AES-CCM PSKGTK GMKSelf Tests For an AES Atheros hardware Post failure