Manuals
/
Dell
/
Computer Equipment
/
Network Card
Dell
AP-92, W- AP92, W-AP105, AP-175, AP-93, W-AP93, W-AP175, AP-105
manual
Models:
W-AP105
AP-105
AP-175
W-AP175
AP-93
W- AP92
W-AP93
AP-92
1
2
45
45
Download
45 pages
52.12 Kb
1
2
3
4
5
6
7
8
<
>
AP-175 Indicator LEDs Label
AP-105 Wireless Access Point
2 AP-92 TEL Placement
Authorization
Services
Page 2
Image 2
2
Page 1
Page 3
Page 2
Image 2
Page 1
Page 3
Contents
Version Feb Aruba Networks Crossman Ave Sunnyvale, CA
Page
AP-175 Series
Aruba Dell Relationship Acronyms and Abbreviations
AP-105 Series
Security Levels Physical Security
ROLES, Authentication and Services
Acronyms and Abbreviations
Introduction
Aruba Dell Relationship
GHz
IPSec
Physical Description
Product Overview
AP-92
Aruba Part Number Dell Corresponding Part Number
Enet
AP-92 Indicator LEDs Label Function Action Status
PWR
AP-93
Label Function Action Status
AP-93 Indicator LEDs Label Function Action Status
AP-105 Wireless Access Point
AP-105 Series
AP-105 Indicator LEDs Label Function Action Status
AP-175 Wireless Access Point
AP-175 Series
Physical Description
AP-175 Indicator LEDs Label
Function Action Status Position
Physical Security
Module Objectives
Security Levels
Applying TELs
2 AP-92 TEL Placement
AP-92 Tel placement front view
Aruba AP-92 Tel placement right view
3 AP-93 TEL Placement
Aruba AP-92 Tel placement bottom view
Aruba AP-93 Tel placement left view
4 AP-105 TEL Placement
Aruba AP-93 Tel placement top view
Aruba AP-105 Tel placement left view
5 AP-175 TEL Placement
Aruba AP-105 Tel placement bottom view
Aruba AP-175 Tel placement back view
Inspection/Testing of Physical Security Mechanisms
Aruba AP-175 Tel placement top view
Configuring Remote AP Fips Mode
Modes of Operation
Enable Fips mode on the AP. This accomplished by going to
Configuring Remote Mesh Portal Fips Mode
Configuring Remote Mesh Point Fips Mode
Verify that the module is in Fips mode
Operational Environment
Logical Interfaces
Fips 140-2 Logical Interfaces Module Physical Interface
Roles
Roles, Authentication and Services
Crypto Officer Authentication
Strength of Authentication Mechanisms
User Authentication
Wireless Client Authentication
Authentication Mechanism Strength
WPA2-PSK
WPA2 PSK
Services
Crypto Officer Services
KEK
PTK
User Services
PMK
Eapol MIC
Wireless Client Services
Unauthenticated Services
∙ FTP ∙ Tftp ∙ NTP
Cryptographic Algorithms
Non-FIPS Approved Algorithms
Critical Security Parameters
Hmac
RNG
PSK
AES-CCM
GMK
GTK
Self Tests
For an AES Atheros hardware Post failure
Top
Page
Image
Contents