Dell PowerConnect W-Series FIPS Dell PowerConnect W-6000M3 and W-3000 Controll - Page 22

Alternating Bypass State

Page 22 highlights

Aruba Hardware Known Answer Tests for Revision C4:  AES KAT  AES-CCM KAT  AES-GCM KAT  Triple DES KAT  HMAC (HMAC-SHA1, HMAC-SHA256, HMAC-SHA384 and HMAC-SHA512) KAT Aruba Hardware Known Answer Tests Revision B2:  AES KAT  AES-CCM KAT  Triple DES KAT  HMAC (HMAC-SHA1, HMAC-SHA256) KAT Following Conditional Self-tests are performed in the switch:  Continuous Random Number Generator Test-This test is run upon generation of random data by the switch's random number generators to detect failure to a constant value. The module stores the first random number for subsequent comparison, and the module compares the value of the new random number with the random number generated in the previous round and enters an error state if the comparison is successful. The test is performed for approved as well as non-approved RNGs.  Bypass test  RSA Pairwise Consistency test  ECDSA Pairwise Consistency test  Firmware Load Test Self-test results are logged in a log file. Upon successful completion of the power-up self tests, the module logs a KATS: passed message into a log file. Confirm the file update by checking the associated time of the file. In the event of a hardware KATs failure, the log file records one of the following messages depending on the algorith being tested:  AES256 HMAC-SHA1 hash failed  AES256 Encrypt failed  AES256 Decrypt Failed  3DES HMAC-SHA1 hash failed  3DES Encrypt failed  3DES Decrypt Failed  DES HMAC-SHA1 hash failed  DES Encrypt failed  DES Decrypt Failed  HW KAT test failed for AESCCM CTR. Rebooting  AESCCM Encrypt Failed This text is followed by this message: The POST Test failed!!!! Rebooting... Alternating Bypass State The controller implements an alternating bypass state when:  a port is configured in trusted mode to provide unauthenticated services 22 | FIPS 140-2 Level 2 Features Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3 | FIPS 140-2 Level 2 Release Supplement

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

22
|
FIPS 140-2 Level 2 Features
Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3
| FIPS 140-2 Level 2 Release Supplement
Aruba Hardware Known Answer Tests for Revision C4:
AES KAT
AES-CCM KAT
AES-GCM KAT
Triple DES KAT
HMAC (HMAC-SHA1, HMAC-SHA256, HMAC-SHA384 and HMAC-SHA512) KAT
Aruba Hardware Known Answer Tests Revision B2:
AES KAT
AES-CCM KAT
Triple DES KAT
HMAC (HMAC-SHA1, HMAC-SHA256) KAT
Following Conditional Self-tests are performed in the switch:
Continuous Random Number Generator Test—This test is run upon generation of random data by the
switch’s random number generators to detect failure to a constant value. The module stores the first
random number for subsequent comparison, and the module compares the value of the new random
number with the random number generated in the previous round and enters an error state if the
comparison is successful. The test is performed for approved as well as non-approved RNGs.
Bypass test
RSA Pairwise Consistency test
ECDSA Pairwise Consistency test
Firmware Load Test
Self-test results are logged in a log file. Upon successful completion of the power-up self tests, the module
logs a KATS: passed message into a log file. Confirm the file update by checking the associated time of the
file.
In the event of a hardware KATs failure, the log file records one of the following messages depending on the
algorith being tested:
AES256 HMAC-SHA1 hash failed
AES256 Encrypt failed
AES256 Decrypt Failed
3DES HMAC-SHA1 hash failed
3DES Encrypt failed
3DES Decrypt Failed
DES HMAC-SHA1 hash failed
DES Encrypt failed
DES Decrypt Failed
HW KAT test failed for AESCCM CTR. Rebooting
AESCCM Encrypt Failed
This text is followed by this message:
The POST Test failed!!!!
Rebooting…
Alternating Bypass State
The controller implements an alternating bypass state when:
a port is configured in trusted mode to provide unauthenticated services