Dell W-AP134, AP-134, AP-135, W-AP135 manual For an AES Atheros hardware Post failure

Page 35

Self-test results are written to the serial console.

In the event of a KATs failure, the AP logs different messages, depending on the error.

For an ArubaOS OpenSSL AP module and ArubaOS cryptographic module KAT failure:

AP rebooted [DATE][TIME] : Restarting System, SW FIPS KAT failed

For an AES Atheros hardware POST failure:

Starting HW SHA1 KAT ...Completed HW SHA1 AT

Starting HW HMAC-SHA1 KAT ...Completed HW HMAC-SHA1 KAT Starting HW DES KAT ...Completed HW DES KAT

Starting HW AES KAT ...Restarting system.

35

Image 35
Contents Fips 140-2 Non-Proprietary Security Policy Page Operational Environment Logical Interfaces Aruba Dell Relationship Acronyms and AbbreviationsSecurity Levels Physical Security Modes of OperationServices CPSec IntroductionAruba Dell Relationship Acronyms and AbbreviationsSHA Aruba Part Number Dell Corresponding Part Number Product OverviewAP-134 Physical DescriptionENET1 AP-134 Indicator LEDs Label Function Action StatusPWR ENET0AP-135 AP-135 Indicator LEDs Label Function Action Status Applying TELs Module ObjectivesSecurity Levels Physical SecurityAP-134 Front view 2 AP-134 TEL PlacementAP-134 Top View 3 AP-135 TEL PlacementAP-135 Front view AP-135 Top view Inspection/Testing of Physical Security MechanismsModes of Operation Configuring Remote AP Fips ModeEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Operational Environment Verify that the module is in Fips modeFips 140-2 Logical Interface Module Physical Interface Logical InterfacesRoles Roles, Authentication and ServicesCrypto Officer Authentication Authentication Mechanism Strength User AuthenticationWireless Client Authentication Strength of Authentication MechanismsWPA2-PSK KEK ServicesCrypto Officer Services WPA2 PSKEapol MIC User ServicesPMK PTKUnauthenticated Services Wireless Client Services∙ FTP ∙ Tftp ∙ NTP Non-FIPS Approved Algorithms Cryptographic AlgorithmsHmac Critical Security ParametersRNG AES-CCM PSKGTK GMKSelf Tests For an AES Atheros hardware Post failure