Dell W-AP135, AP-134, AP-135, W-AP134 manual Self Tests

Page 34

7 Self Tests

The module performs the following Self Tests after being configured into either Remote AP mode or Remote Mesh Portal mode. The module performs both power-up and conditional self-tests. In the event any self-test fails, the module enters an error state, logs the error, and reboots automatically.

The module performs the following power-up self-tests:

Aruba Hardware known Answer tests: o AES KAT

o HMAC-SHA1 KAT o Triple-DES KAT

ArubaOS OpenSSL AP Module

oAES KAT

oHMAC (HMAC-SHA1, HMAC-SHA256 and HMAC SHA384) KAT

oRNG KAT

oRSA KAT

oSHA (SHA1, SHA256 and SHA384) KAT

oTriple-DES KAT

ArubaOS Cryptographic Module

oAES KAT

oHMAC (HMAC-SHA1, HMAC-SHA256, HMAC SHA384, and HMAC512) KAT

oFIPS 186-2 RNG KAT

oRSA (sign/verify)

oSHA (SHA1, SHA256, SHA384, and SHA512) KAT

oTriple-DES KAT

ArubaOS Uboot Bootloader Module

oFirmware Integrity Test: RSA 2048-bit Signature Validation

Aruba Atheros hardware CCM

oAES-CCM KAT

The following Conditional Self-tests are performed in the module:

Continuous Random Number Generator Test–This test is run upon generation of random data by the module’s random number generators to detect failure to a constant value. The module stores the first random number for subsequent comparison, and the module compares the value of the new random number with the random number generated in the previous round and enters an error state if the comparison is successful. The test is performed for the approved as well as non- approved RNGs.

RSA pairwise Consistency Test

Firmware load test

These self-tests are run for the Atheros hardware cryptographic implementation as well as for the Aruba OpenSSL and ArubaOS cryptographic module implementations.

34

Image 34
Contents Fips 140-2 Non-Proprietary Security Policy Page Modes of Operation Aruba Dell Relationship Acronyms and AbbreviationsSecurity Levels Physical Security Operational Environment Logical InterfacesServices Acronyms and Abbreviations IntroductionAruba Dell Relationship CPSecSHA Physical Description Product OverviewAP-134 Aruba Part Number Dell Corresponding Part NumberENET0 AP-134 Indicator LEDs Label Function Action StatusPWR ENET1AP-135 AP-135 Indicator LEDs Label Function Action Status Physical Security Module ObjectivesSecurity Levels Applying TELs2 AP-134 TEL Placement AP-134 Front view3 AP-135 TEL Placement AP-134 Top ViewAP-135 Front view Inspection/Testing of Physical Security Mechanisms AP-135 Top viewConfiguring Remote AP Fips Mode Modes of OperationEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Verify that the module is in Fips mode Operational EnvironmentLogical Interfaces Fips 140-2 Logical Interface Module Physical InterfaceCrypto Officer Authentication Roles, Authentication and ServicesRoles Strength of Authentication Mechanisms User AuthenticationWireless Client Authentication Authentication Mechanism StrengthWPA2-PSK WPA2 PSK ServicesCrypto Officer Services KEKPTK User ServicesPMK Eapol MICWireless Client Services Unauthenticated Services∙ FTP ∙ Tftp ∙ NTP Cryptographic Algorithms Non-FIPS Approved AlgorithmsCritical Security Parameters HmacRNG PSK AES-CCMGMK GTKSelf Tests For an AES Atheros hardware Post failure