Aruba Networks FIPS 140-2 manual Aruba AP-124 TEL Placement, AP-124 Front view

Page 11

3.2.2 Aruba AP-124 TEL Placement

This section displays all the TEL locations on the Aruba AP-124. The AP124 requires a minimum of 3 TELs to be applied as follows:

3.2.2.1To detect opening of the chassis cover:

1.Spanning the left chassis cover and the top and bottom chassis covers

2.Spanning the right chassis cover and the top and bottom chassis covers

3.2.2.2To detect access to restricted ports

3.Spanning the serial port

The tamper-evident labels shall be installed for the module to operate in a FIPS approved mode of operation.

Following is the TEL placement for the Aruba AP-124:

Figure 1: AP-124 Front view

11

Image 11
Contents Fips 140-2 Non-Proprietary Security Policy Page Security Levels Physical Security ServicesAruba Dell Relationship Acronyms and Abbreviations Aruba AP-120 SeriesPage GHz IntroductionAruba Dell Relationship Acronyms and AbbreviationsLAN Aruba Part Number Dell Corresponding Part Number Product OverviewAruba AP-120 Series Physical DescriptionEnet Indicator LEDs Label Function Action StatusPWR Label Function Action Status Applying TELs Module ObjectivesSecurity Levels Physical SecurityAP-124 Front view Aruba AP-124 TEL PlacementAP-124 Back view AP-124 Bottom view Aruba AP-125 TEL PlacementAP-125 Front view AP-125 Right view AP-125 Bottom view Inspection/Testing of Physical Security MechanismsModes of Operation Configuring Remote AP Fips ModeEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Operational Environment Verify that the module is in Fips modeFips 140-2 Logical Interfaces Module Physical Interface Logical InterfacesRoles Roles, Authentication and ServicesCrypto Officer Authentication Authentication Mechanism Strength User AuthenticationWireless Client Authentication Strength of Authentication MechanismsWPA2-PSK WPA2 PSK ServicesCrypto Officer Services Service Description CSPs Accessed see sectionService User ServicesService Description CSPs Wireless Client Services ∙ FTP ∙ Tftp ∙ NTP Unauthenticated ServicesNon-FIPS Approved Algorithms Cryptographic AlgorithmsHmac Critical Security ParametersRNG AES-CCM PSKPTK GTK GMKSelf Tests For an AES Cavium hardware Post failure