Dell PowerConnect W-AP105 Manual - Página 4
Procurar online ou descarregar pdf Manual para Interruptor Dell PowerConnect W-AP105. Dell PowerConnect W-AP105 45 páginas. Powerconnect w-ap104 and w-ap105 access points
Também para Dell PowerConnect W-AP105: Manual (10 páginas), Manual de instalação (2 páginas), Especificações (2 páginas), Especificações (2 páginas), Especificações (4 páginas), Manual de instalação (2 páginas)
3.2.5
AP-175 TEL Placement ............................................................................................................23
3.2.5.1
To detect access to restricted ports: ...................................................................................23
3.2.5.2
To detect opening of the chassis cover: .............................................................................23
3.2.6
Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3
3.3.1
Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2
Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................27
3.3.3
Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4
Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5
Verify that the module is in FIPS mode ....................................................................................30
3.4
3.5
4
ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1
...............................................................................................................................................32
4.1.1
Crypto Officer Authentication ...................................................................................................32
4.1.2
User Authentication ..................................................................................................................33
4.1.3
Wireless Client Authentication .................................................................................................33
4.1.4
Strength of Authentication Mechanisms ...................................................................................33
4.2
..........................................................................................................................................35
4.2.1
Crypto Officer Services .............................................................................................................35
4.2.2
User Services ............................................................................................................................36
4.2.3
Wireless Client Services ............................................................................................................37
4.2.4
Unauthenticated Services..........................................................................................................37
5
CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6
CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7
SELF TESTS ......................................................................................................................................... 44
.....................................................................................................................26
..........................................................................................................30
......................................................................................................................31
4