4.1.3

Wireless Client Authentication

23

 

4.1.4 Strength of Authentication Mechanisms

23

 

4.2 SERVICES

25

 

4.2.1

Crypto Officer Services

25

 

4.2.2

User Services

26

 

4.2.3

Wireless Client Services

27

 

4.2.4

Unauthenticated Services

27

5

CRYPTOGRAPHIC ALGORITHMS

29

6

CRITICAL SECURITY PARAMETERS

30

7

SELF TESTS

34

4

Page 4
Image 4
Dell AP-134, AP-135, W-AP135, W-AP134 manual Services