Dell PowerConnect W-AP105 매뉴얼 - 페이지 4
{카테고리_이름} Dell PowerConnect W-AP105에 대한 매뉴얼을 온라인으로 검색하거나 PDF를 다운로드하세요. Dell PowerConnect W-AP105 45 페이지. Powerconnect w-ap104 and w-ap105 access points
Dell PowerConnect W-AP105에 대해서도 마찬가지입니다: 매뉴얼 (10 페이지), 설치 매뉴얼 (2 페이지), 사양 (2 페이지), 사양 (2 페이지), 사양 (4 페이지), 설치 매뉴얼 (2 페이지)
3.2.5
AP-175 TEL Placement ............................................................................................................23
3.2.5.1
To detect access to restricted ports: ...................................................................................23
3.2.5.2
To detect opening of the chassis cover: .............................................................................23
3.2.6
Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3
3.3.1
Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2
Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................27
3.3.3
Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4
Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5
Verify that the module is in FIPS mode ....................................................................................30
3.4
3.5
4
ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1
...............................................................................................................................................32
4.1.1
Crypto Officer Authentication ...................................................................................................32
4.1.2
User Authentication ..................................................................................................................33
4.1.3
Wireless Client Authentication .................................................................................................33
4.1.4
Strength of Authentication Mechanisms ...................................................................................33
4.2
..........................................................................................................................................35
4.2.1
Crypto Officer Services .............................................................................................................35
4.2.2
User Services ............................................................................................................................36
4.2.3
Wireless Client Services ............................................................................................................37
4.2.4
Unauthenticated Services..........................................................................................................37
5
CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6
CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7
SELF TESTS ......................................................................................................................................... 44
.....................................................................................................................26
..........................................................................................................30
......................................................................................................................31
4