1

INTRODUCTION ..................................................................................................................................

5

 

1.1

ARUBA DELL RELATIONSHIP .............................................................................................................

5

 

1.2

ACRONYMS AND ABBREVIATIONS .....................................................................................................

5

2

PRODUCT OVERVIEW.......................................................................................................................

7

 

2.1

ARUBA AP-120 SERIES .....................................................................................................................

7

 

2.1.1

Physical Description..................................................................................................................

7

 

 

2.1.1.1

Dimensions/Weight ............................................................................................................

8

 

 

2.1.1.2

Interfaces.............................................................................................................................

8

 

 

2.1.1.3

Indicator LEDs....................................................................................................................

8

3

MODULE OBJECTIVES ....................................................................................................................

10

 

3.1

SECURITY LEVELS ............................................................................................................................

10

 

3.2

PHYSICAL SECURITY ........................................................................................................................

10

 

3.2.1

Applying TELs ..........................................................................................................................

10

 

3.2.2 Aruba AP-124 TEL Placement..................................................................................................

11

 

 

3.2.2.1 To detect opening of the chassis cover: .............................................................................

11

 

 

3.2.2.2 To detect access to restricted ports ....................................................................................

11

 

3.2.3 Aruba AP-125 TEL Placement..................................................................................................

13

 

 

3.2.3.1 To detect opening of the chassis cover: .............................................................................

13

 

 

3.2.3.2 To detect access to restricted ports ....................................................................................

13

 

3.2.4 Inspection/Testing of Physical Security Mechanisms ...............................................................

16

 

3.3

MODES OF OPERATION .....................................................................................................................

17

 

3.3.1 Configuring Remote AP FIPS Mode .........................................................................................

17

 

3.3.2 Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................

18

 

3.3.3 Configuring Remote Mesh Portal FIPS Mode ..........................................................................

19

 

3.3.4 Configuring Remote Mesh Point FIPS Mode............................................................................

20

 

3.3.5 Verify that the module is in FIPS mode ....................................................................................

21

 

3.4

OPERATIONAL ENVIRONMENT..........................................................................................................

21

 

3.5

LOGICAL INTERFACES ......................................................................................................................

22

4 ROLES, AUTHENTICATION, AND SERVICES ............................................................................

23

 

4.1

ROLES

...............................................................................................................................................

23

 

4.1.1

Crypto Officer Authentication...................................................................................................

23

 

4.1.2

User Authentication ..................................................................................................................

24

 

4.1.3

Wireless Client Authentication .................................................................................................

24

 

4.1.4 Strength of Authentication Mechanisms ...................................................................................

24

 

4.2

SERVICES..........................................................................................................................................

26

 

4.2.1

Crypto Officer Services.............................................................................................................

26