Dell PowerConnect W-Series FIPS Dell PowerConnect W-600 Controller Series Secu - Page 3

Contents, Preface, The Aruba 620 and 650 Mobility Controllers, FIPS 140-2 Level 2 Features

Page 3 highlights

Contents Preface ...5 Purpose of this Document 5 Aruba Dell Relationship 5 Related Documents 6 Product Manuals 6 Additional Product Information 6 Chapter 1 The Aruba 620 and 650 Mobility Controllers 7 Overview ...7 Physical Description 8 Dimensions...8 Cryptographic Module Boundaries 8 Aruba 620 Chassis 8 Aruba 650 Chassis 11 Chapter 2 FIPS 140-2 Level 2 Features 15 Intended Level of Security 15 Physical Security 15 Operational Environment 15 Logical Interfaces 16 Roles and Services 17 Crypto Officer Role 17 User Role...19 Authentication Mechanisms 20 Unauthenticated Services 20 Cryptographic Key Management 21 Implemented Algorithms 21 Non-FIPS Approved Algorithms 21 Critical Security Parameters 22 Self-Tests...25 Alternating Bypass State 26 Mitigation of Other Attacks 26 XSec ...26 Wireless Intrusion Detection 27 Unique Station and User Classification 27 Detecting and Disabling Rogue APs 27 Denial of Service and Impersonation Protection 27 Man-in-the-Middle Protection 27 Policy Definition and Enforcement 28 Using Wireless to Protect your Wired Network 28 Using Wireless to Protect your Existing Wireless Network 28 Chapter 3 Installing the Controller 29 Pre-Installation Checklist 29 Precautions...29 The Security Kit 30 Aruba 620, 650 and Dell W-620, W-650 | FIPS 140-2 Level 2 Release Supplement | 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42

Aruba 620, 650 and Dell W-620, W-650
|
FIPS 140-2 Level 2 Release Supplement
|
3
Contents
Preface
...................................................................................................................................
5
Purpose of this Document
.....................................................................................
5
Aruba Dell Relationship
...................................................................................
5
Related Documents
...............................................................................................
6
Product Manuals
.............................................................................................
6
Additional Product Information
.......................................................................
6
Chapter 1
The Aruba 620 and 650 Mobility Controllers
.........................................
7
Overview
................................................................................................................
7
Physical Description
..............................................................................................
8
Dimensions
......................................................................................................
8
Cryptographic Module Boundaries
.......................................................................
8
Aruba 620 Chassis
..........................................................................................
8
Aruba 650 Chassis
........................................................................................
11
Chapter 2
FIPS 140-2 Level 2 Features
.................................................................
15
Intended Level of Security
...................................................................................
15
Physical Security
.................................................................................................
15
Operational Environment
.....................................................................................
15
Logical Interfaces
................................................................................................
16
Roles and Services
..............................................................................................
17
Crypto Officer Role
.......................................................................................
17
User Role
.......................................................................................................
19
Authentication Mechanisms
..........................................................................
20
Unauthenticated Services
.............................................................................
20
Cryptographic Key Management
.........................................................................
21
Implemented Algorithms
...............................................................................
21
Non-FIPS Approved Algorithms
....................................................................
21
Critical Security Parameters
..........................................................................
22
Self-Tests
.............................................................................................................
25
Alternating Bypass State
.....................................................................................
26
Mitigation of Other Attacks
..................................................................................
26
XSec
..............................................................................................................
26
Wireless Intrusion Detection
.........................................................................
27
Unique Station and User Classification
..................................................
27
Detecting and Disabling Rogue APs
......................................................
27
Denial of Service and Impersonation Protection
...........................................
27
Man-in-the-Middle Protection
.......................................................................
27
Policy Definition and Enforcement
................................................................
28
Using Wireless to Protect your Wired Network
.............................................
28
Using Wireless to Protect your Existing Wireless Network
...........................
28
Chapter 3
Installing the Controller
.........................................................................
29
Pre-Installation Checklist
.....................................................................................
29
Precautions
..........................................................................................................
29
The Security Kit
...................................................................................................
30