3.2.5
AP-175 TEL Placement ............................................................................................................23
3.2.5.1
3.2.5.2
3.2.6
3.3
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.4
3.5
4
4.1
...............................................................................................................................................32
4.1.1
4.1.2
User Authentication ..................................................................................................................33
4.1.3
4.1.4
4.2
..........................................................................................................................................35
4.2.1
Crypto Officer Services .............................................................................................................35
4.2.2
User Services ............................................................................................................................36
4.2.3
Wireless Client Services ............................................................................................................37
4.2.4
Unauthenticated Services..........................................................................................................37
5
CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6
7
SELF TESTS ......................................................................................................................................... 44
.....................................................................................................................26
..........................................................................................................30
......................................................................................................................31
4