Dell PowerConnect W-Series FIPS Dell PowerConnect W-AP92/93, W-AP105, W-AP175 - Page 40

Critical Security Parameters

Page 40 highlights

6 Critical Security Parameters The following Critical Security Parameters (CSPs) are used by the module: STORAGE CSP CSP TYPE GENERATION And USE ZEROIZATI ON Key Encryption Key Triple-DES Hard-coded (KEK) 168-bits key Stored in flash, zeroized by the 'ap wipe out flash' command. Encrypts IKEv1/IKEv2 preshared keys and configuration parameters IKEv1/IKEv2 Pre-shared secret 64 character preshared key CO configured Encrypted in flash using the KEK; zeroized by updating through administrative interface, or by the 'ap wipe out flash' command. Module and crypto officer authentication during IKEv1/IKEv2; entered into the module in plaintext during initialization and encrypted over the IPSec session subsequently. IPSec session encryption keys 168-bit Triple-DES, or 128/192/256 bit AES keys; Established during Diffie-Hellman key agreement Stored in plaintext in volatile memory; zeroized when session is closed or system powers off Secure IPSec traffic IPSec session authentication keys HMAC SHA-1 keys Established during Diffie-Hellman key agreement Stored in plaintext in volatile memory; zeroized when session is closed or system powers off Secure IPSec traffic 40

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45

40
6 Critical Security Parameters
The following Critical Security Parameters (CSPs) are used by the module:
CSP
CSP TYPE
GENERATION
STORAGE
And
ZEROIZATI
ON
USE
Key
Encryption
Key
(KEK)
Triple-DES
168-bits key
Hard-coded
Stored in flash,
zeroized
by the
‘ap wipe out
flash’
command.
Encrypts
IKEv1/IKEv2
preshared keys
and
configuration
parameters
IKEv1/IKEv2 Pre-shared
secret
64 character
preshared
key
CO configured
Encrypted in
flash using the
KEK; zeroized
by updating
through
administrative
interface, or by
the ‘ap wipe
out flash’
command.
Module and
crypto officer
authentication
during
IKEv1/IKEv2;
entered into
the module in
plaintext
during
initialization
and encrypted
over the IPSec
session
subsequently.
IPSec session encryption
keys
168-bit
Triple-DES,
or
128/192/256
bit AES
keys;
Established during
Diffie-Hellman key
agreement
Stored in
plaintext in
volatile
memory;
zeroized when
session is
closed or
system powers
off
Secure IPSec
traffic
IPSec session
authentication keys
HMAC
SHA-1 keys
Established during
Diffie-Hellman key
agreement
Stored in
plaintext in
volatile
memory;
zeroized when
session is
closed or
system powers
off
Secure IPSec
traffic