Dell PowerConnect W-Series FIPS Dell PowerConnect W-6000M3 and W-3000 Controll - Page 3

Contents

Page 3 highlights

Contents Preface ...5 Purpose of this Document 5 Aruba Dell Relationship 5 Related Documents 6 Additional Product Information 6 Chapter 1 The Aruba 3000 and 6000/M3 Controllers 7 Overview ...7 Physical Description 8 Dimensions ...8 Cryptographic Module Boundaries 8 Chassis...9 Chapter 2 FIPS 140-2 Level 2 Features 11 Intended Level of Security 11 Physical Security 11 Operational Environment 12 Logical Interfaces 12 Roles and Services 13 Crypto Officer Role 13 User Role ...15 Authentication Mechanisms 16 Unauthenticated Services 16 Cryptographic Key Management 17 Implemented Algorithms 17 Revision C4 17 Revision B2 17 Non-FIPS Approved Algorithms 18 Critical Security Parameters 18 Self-Tests...21 Alternating Bypass State 22 Mitigation of Other Attacks 23 XSec ...23 Wireless Intrusion Detection 23 Unique Station and User Classification 23 Detecting and Disabling Rogue APs 24 Denial of Service and Impersonation Protection 24 Man-in-the-Middle Protection 24 Policy Definition and Enforcement 24 Using Wireless to Protect your Wired Network 24 Using Wireless to Protect your Existing Wireless Network 24 Chapter 3 Installing the Controller 25 Pre-Installation Checklist 25 Precautions...25 The Security Kit 26 Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3 | FIPS 140-2 Level 2 Release Supplement |3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3
|
FIPS 140-2 Level 2 Release Supplement
|
3
Contents
Preface
...................................................................................................................................
5
Purpose of this Document
.....................................................................................
5
Aruba Dell Relationship
...................................................................................
5
Related Documents
...............................................................................................
6
Additional Product Information
.......................................................................
6
Chapter 1
The Aruba 3000 and 6000/M3 Controllers
.............................................
7
Overview
................................................................................................................
7
Physical Description
..............................................................................................
8
Dimensions
.....................................................................................................
8
Cryptographic Module Boundaries
.................................................................
8
Chassis
............................................................................................................
9
Chapter 2
FIPS 140-2 Level 2 Features
.................................................................
11
Intended Level of Security
...................................................................................
11
Physical Security
.................................................................................................
11
Operational Environment
.....................................................................................
12
Logical Interfaces
................................................................................................
12
Roles and Services
..............................................................................................
13
Crypto Officer Role
.......................................................................................
13
User Role
......................................................................................................
15
Authentication Mechanisms
..........................................................................
16
Unauthenticated Services
.............................................................................
16
Cryptographic Key Management
.........................................................................
17
Implemented Algorithms
...............................................................................
17
Revision C4
.............................................................................................
17
Revision B2
.............................................................................................
17
Non-FIPS Approved Algorithms
....................................................................
18
Critical Security Parameters
..........................................................................
18
Self-Tests
.............................................................................................................
21
Alternating Bypass State
.....................................................................................
22
Mitigation of Other Attacks
..................................................................................
23
XSec
..............................................................................................................
23
Wireless Intrusion Detection
.........................................................................
23
Unique Station and User Classification
..................................................
23
Detecting and Disabling Rogue APs
......................................................
24
Denial of Service and Impersonation Protection
...........................................
24
Man-in-the-Middle Protection
.......................................................................
24
Policy Definition and Enforcement
................................................................
24
Using Wireless to Protect your Wired Network
.............................................
24
Using Wireless to Protect your Existing Wireless Network
...........................
24
Chapter 3
Installing the Controller
.........................................................................
25
Pre-Installation Checklist
.....................................................................................
25
Precautions
..........................................................................................................
25
The Security Kit
...................................................................................................
26