Aruba Networks FIPS 140-2 Inspection/Testing of Physical Security Mechanisms, AP-125 Bottom view

Page 16

Figure 12: AP-125 Bottom view

3.2.4 Inspection/Testing of Physical Security Mechanisms

Physical Security Mechanism

Recommended Test Frequency

Guidance

 

 

 

 

Tamper-evident labels (TELs)

Once per month

Examine for any sign of removal,

 

 

replacement, tearing, etc.

See

 

 

images above for locations of

 

 

TELs

 

 

 

 

 

Opaque module enclosure

Once per month

Examine module enclosure

for

 

 

any evidence of new openings or

 

 

other access to the module

 

 

internals.

 

 

 

 

 

16

Image 16
Contents Fips 140-2 Non-Proprietary Security Policy Page Services Aruba Dell Relationship Acronyms and AbbreviationsAruba AP-120 Series Security Levels Physical SecurityPage Introduction Aruba Dell RelationshipAcronyms and Abbreviations GHzLAN Product Overview Aruba AP-120 SeriesPhysical Description Aruba Part Number Dell Corresponding Part NumberPWR Indicator LEDs Label Function Action StatusEnet Label Function Action Status Module Objectives Security LevelsPhysical Security Applying TELsAruba AP-124 TEL Placement AP-124 Front viewAP-124 Back view Aruba AP-125 TEL Placement AP-124 Bottom viewAP-125 Front view AP-125 Right view Inspection/Testing of Physical Security Mechanisms AP-125 Bottom viewConfiguring Remote AP Fips Mode Modes of OperationEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Verify that the module is in Fips mode Operational EnvironmentLogical Interfaces Fips 140-2 Logical Interfaces Module Physical InterfaceCrypto Officer Authentication Roles, Authentication and ServicesRoles User Authentication Wireless Client AuthenticationStrength of Authentication Mechanisms Authentication Mechanism StrengthWPA2-PSK Services Crypto Officer ServicesService Description CSPs Accessed see section WPA2 PSKService Description CSPs User ServicesService Wireless Client Services Unauthenticated Services ∙ FTP ∙ Tftp ∙ NTPCryptographic Algorithms Non-FIPS Approved AlgorithmsCritical Security Parameters HmacRNG PTK PSKAES-CCM GMK GTKSelf Tests For an AES Cavium hardware Post failure