4
3.2.5 AP-175 TEL Placement ............................................................................................................23
3.2.5.1 To detect access to restricted ports: ...................................................................................23
3.2.5.2 To detect opening of the chassis cover: .............................................................................23
3.2.6 Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3 MODES OF OPERATION .....................................................................................................................26
3.3.1 Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2 Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................27
3.3.3 Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4 Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5 Verify that the module is in FIPS mode ....................................................................................30
3.4 OPERATIONAL ENVIRONMENT ..........................................................................................................30
3.5 LOGICAL INTERFACES ......................................................................................................................31
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1 ROLES...............................................................................................................................................32
4.1.1 Crypto Officer Authentication ...................................................................................................32
4.1.2 User Authentication ..................................................................................................................33
4.1.3 Wireless Client Authentication .................................................................................................33
4.1.4 Strength of Authentication Mechanisms ...................................................................................33
4.2 SERVICES ..........................................................................................................................................35
4.2.1 Crypto Officer Services .............................................................................................................35
4.2.2 User Services ............................................................................................................................36
4.2.3 Wireless Client Services ............................................................................................................37
4.2.4 Unauthenticated Services..........................................................................................................37
5 CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6 CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7 SELF TESTS ......................................................................................................................................... 44