Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3
|
FIPS 140-2 Level 2 Release Supplement
|
3
Contents
Preface
...................................................................................................................................
5
Purpose of this Document
.....................................................................................
5
Aruba Dell Relationship
...................................................................................
5
Related Documents
...............................................................................................
6
Additional Product Information
.......................................................................
6
Chapter 1
The Aruba 3000 and 6000/M3 Controllers
.............................................
7
Overview
................................................................................................................
7
Physical Description
..............................................................................................
8
Dimensions
.....................................................................................................
8
Cryptographic Module Boundaries
.................................................................
8
Chassis
............................................................................................................
9
Chapter 2
FIPS 140-2 Level 2 Features
.................................................................
11
Intended Level of Security
...................................................................................
11
Physical Security
.................................................................................................
11
Operational Environment
.....................................................................................
12
Logical Interfaces
................................................................................................
12
Roles and Services
..............................................................................................
13
Crypto Officer Role
.......................................................................................
13
User Role
......................................................................................................
15
Authentication Mechanisms
..........................................................................
16
Unauthenticated Services
.............................................................................
16
Cryptographic Key Management
.........................................................................
17
Implemented Algorithms
...............................................................................
17
Revision C4
.............................................................................................
17
Revision B2
.............................................................................................
17
Non-FIPS Approved Algorithms
....................................................................
18
Critical Security Parameters
..........................................................................
18
Self-Tests
.............................................................................................................
21
Alternating Bypass State
.....................................................................................
22
Mitigation of Other Attacks
..................................................................................
23
XSec
..............................................................................................................
23
Wireless Intrusion Detection
.........................................................................
23
Unique Station and User Classification
..................................................
23
Detecting and Disabling Rogue APs
......................................................
24
Denial of Service and Impersonation Protection
...........................................
24
Man-in-the-Middle Protection
.......................................................................
24
Policy Definition and Enforcement
................................................................
24
Using Wireless to Protect your Wired Network
.............................................
24
Using Wireless to Protect your Existing Wireless Network
...........................
24
Chapter 3
Installing the Controller
.........................................................................
25
Pre-Installation Checklist
.....................................................................................
25
Precautions
..........................................................................................................
25
The Security Kit
...................................................................................................
26