Aruba Networks FIPS 140-2 manual Rng

Page 32

 

 

 

STORAGE

 

CSP

CSP TYPE

GENERATION

And

USE

 

 

 

ZEROIZATI

 

 

 

 

ON

 

 

 

 

 

 

IKEv1/IKEv2 Diffie-

1024-bit

Generated internally

Stored in

Used in

Hellman Private key

Diffie-

during IKEv1/IKEv2

plaintext in

establishing

 

Hellman

negotiation

volatile

the session key

 

private key

 

memory;

for IPSec

 

 

 

zeroized when

 

 

 

 

session is

 

 

 

 

closed or

 

 

 

 

system is

 

 

 

 

powered off

 

 

 

 

 

 

IKEv1/IKEv2 Diffie-

128 bit Octet

Generated internally

Stored in

IKEv1/IKEv2

Hellman shared secret

 

during IKEv1/IKEv2

plaintext in

payload

 

 

negotiation

volatile

integrity

 

 

 

memory;

verification

 

 

 

zeroized when

 

 

 

 

session is

 

 

 

 

closed or

 

 

 

 

system is

 

 

 

 

powered off

 

 

 

 

 

 

ArubaOS OpenSSL RNG

Seed (16

Derived using NON-

Stored in

Seed ANSI

Seed for FIPS compliant

Bytes)

FIPS approved HW RNG

plaintext in

X9.31 RNG

ANSI X9.31, Appendix

 

(/dev/urandom)

volatile

 

A2.4 using AES-128 Key

 

 

memory only;

 

algorithm

 

 

zeroized on

 

 

 

 

reboot

 

 

 

 

 

 

ArubaOS OpenSSL RNG

Seed key (16

Derived using NON-

Stored in

Seed ANSI

Seed key for FIPS

bytes, AES-

FIPS approved HW RNG

plaintext in

X9.31 RNG

compliant ANSI X9.31,

128 Key

(/dev/urandom)

volatile

 

Appendix A2.4 using

algorithm)

 

memory only;

 

AES-128 Key algorithm

 

 

zeroized on

 

 

 

 

reboot

 

 

 

 

 

 

ArubaOS Cryptographic

Seed (64

Derived using NON-

Stored in

Seed 186-2

Module RNG Seed for

bytes)

FIPS approved HW RNG

plaintext in

General

FIPS compliant 186-2

 

(/dev/urandom)

volatile

Purpose (X

General Purpose (X

 

 

memory only;

change

change Notice); SHA-1

 

 

zeroized on

Notice); SHA-

RNG

 

 

reboot

1 RNG

 

 

 

 

 

ArubaOS Cryptographic

Seed Key

Derived using NON-

Stored in

Seed 186-2

Module RNG Seed key for

(64 bytes)

FIPS approved HW RNG

plaintext in

General

FIPS compliant 186-2

 

(/dev/urandom)

volatile

Purpose (X

General Purpose (X

 

 

memory only;

change

change Notice); SHA-1

 

 

zeroized on

Notice); SHA-

RNG

 

 

reboot

1 RNG

 

 

 

 

 

32

Image 32
Contents Fips 140-2 Non-Proprietary Security Policy Page Services Aruba Dell Relationship Acronyms and AbbreviationsAruba AP-120 Series Security Levels Physical SecurityPage Introduction Aruba Dell RelationshipAcronyms and Abbreviations GHzLAN Product Overview Aruba AP-120 SeriesPhysical Description Aruba Part Number Dell Corresponding Part NumberEnet Indicator LEDs Label Function Action StatusPWR Label Function Action Status Module Objectives Security LevelsPhysical Security Applying TELsAruba AP-124 TEL Placement AP-124 Front viewAP-124 Back view Aruba AP-125 TEL Placement AP-124 Bottom viewAP-125 Front view AP-125 Right view Inspection/Testing of Physical Security Mechanisms AP-125 Bottom viewConfiguring Remote AP Fips Mode Modes of OperationEnable Fips mode on the AP. This accomplished by going to Configuring Remote Mesh Portal Fips Mode Configuring Remote Mesh Point Fips Mode Verify that the module is in Fips mode Operational EnvironmentLogical Interfaces Fips 140-2 Logical Interfaces Module Physical InterfaceRoles Roles, Authentication and ServicesCrypto Officer Authentication User Authentication Wireless Client AuthenticationStrength of Authentication Mechanisms Authentication Mechanism StrengthWPA2-PSK Services Crypto Officer ServicesService Description CSPs Accessed see section WPA2 PSKService User ServicesService Description CSPs Wireless Client Services Unauthenticated Services ∙ FTP ∙ Tftp ∙ NTPCryptographic Algorithms Non-FIPS Approved AlgorithmsCritical Security Parameters HmacRNG AES-CCM PSKPTK GMK GTKSelf Tests For an AES Cavium hardware Post failure