Dell PowerConnect W-Series FIPS Dell PowerConnect W-6000M3 and W-3000 Controll - Page 4

Ongoing Management, Setup and Configuration

Page 4 highlights

Chapter 4 Chapter 5 Product Examination 26 Package Contents 26 Minimum Configuration for the Aruba 6000 26 Tamper-Evident Labels 27 Reading TELs 27 Required TEL Locations 27 To Detect Opening the Chassis Cover 27 To Detect the Removal of Any Module or Cover Plate 27 To Detect Access to Restricted Ports 28 To Detect Access to Restricted Port 28 To Detect Opening the Chassis Cover 28 Applying TELs 28 Ongoing Management 29 Crypto Officer Management 29 User Guidance...29 Setup and Configuration 31 Setting Up Your Controller 31 Enabling FIPS Mode 31 Enabling FIPS with the Setup Wizard 31 Enabling FIPS with the WebUI 31 Disallowed FIPS Mode Configurations 32 4| Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3 | FIPS 140-2 Level 2 Release Supplement

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

4
|
Aruba 3000, 6000/M3 and Dell W-3000, W-6000M3
|
FIPS 140-2 Level 2 Release Supplement
Product Examination
.....................................................................................
26
Package Contents
.........................................................................................
26
Minimum Configuration for the Aruba 6000
..................................................
26
Tamper-Evident Labels
.......................................................................................
27
Reading TELs
................................................................................................
27
Required TEL Locations
................................................................................
27
To Detect Opening the Chassis Cover
...................................................
27
To Detect the Removal of Any Module or Cover Plate
...........................
27
To Detect Access to Restricted Ports
....................................................
28
To Detect Access to Restricted Port
......................................................
28
To Detect Opening the Chassis Cover
...................................................
28
Applying TELs
...............................................................................................
28
Chapter 4
Ongoing Management
...........................................................................
29
Crypto Officer Management
................................................................................
29
User Guidance
.....................................................................................................
29
Chapter 5
Setup and Configuration
.......................................................................
31
Setting Up Your Controller
..................................................................................
31
Enabling FIPS Mode
............................................................................................
31
Enabling FIPS with the Setup Wizard
...........................................................
31
Enabling FIPS with the WebUI
......................................................................
31
Disallowed FIPS Mode Configurations
................................................................
32