Dell PowerConnect W-AP105 Handbuch - Seite 16

Blättern Sie online oder laden Sie pdf Handbuch für Schalter Dell PowerConnect W-AP105 herunter. Dell PowerConnect W-AP105 45 Seiten. Powerconnect w-ap104 and w-ap105 access points
Auch für Dell PowerConnect W-AP105: Handbuch (10 seiten), Installationshandbuch (2 seiten), Spezifikationen (2 seiten), Spezifikationen (2 seiten), Spezifikationen (4 seiten), Installationshandbuch (2 seiten)

Dell PowerConnect W-AP105 Handbuch

3 Module Objectives

This section describes the assurance levels for each of the areas described in the FIPS 140-2 Standard. In
addition, it provides information on placing the module in a FIPS 140-2 approved configuration.

3.1 Security Levels

Section
Section Title
1
Cryptographic Module Specification
2
Cryptographic Module Ports and Interfaces
3
Roles, Services, and Authentication
4
Finite State Model
5

Physical Security

6
Operational Environment
7
Cryptographic Key Management
8
EMI/EMC
9
Self-tests
10
Design Assurance
11
Mitigation of Other Attacks
3.2 Physical Security
The Aruba Wireless AP is a scalable, multi-processor standalone network device and is enclosed in a robust
plastic housing. The AP enclosure is resistant to probing (please note that this feature has not been tested as
part of the FIPS 140-2 validation) and is opaque within the visible spectrum. The enclosure of the AP has
been designed to satisfy FIPS 140-2 Level 2 physical security requirements.

3.2.1 Applying TELs

The Crypto Officer is responsible for securing and having control at all times of any unused tamper evident
labels. The Crypto Officer should employ TELs as follows:
Before applying a TEL, make sure the target surfaces are clean and dry.
Do not cut, trim, punch, or otherwise alter the TEL.
Apply the wholly intact TEL firmly and completely to the target surfaces.
Ensure that TEL placement is not defeated by simultaneous removal of multiple modules.
Allow 24 hours for the TEL adhesive seal to completely cure.
Record the position and serial number of each applied TEL in a security log.
For physical security, the AP requires Tamper-Evident Labels (TELs) to allow detection of the opening of
the device, and to block the serial console port (on the bottom of the device). The tamper-evident labels
shall be installed for the module to operate in a FIPS approved mode of operation. To protect the device
from tampering, TELs should be applied by the Crypto Officer as pictured below:
16
Level
2
2
2
2
2
N/A
2
2
2
2
N/A