Dell PowerConnect W-Series FIPS Manual page 4

Fips 140-2 non-proprietary security policy
Hide thumbs Also See for PowerConnect W-Series FIPS:
Table of Contents

Advertisement

3.2.5
AP-175 TEL Placement ............................................................................................................23
3.2.5.1
To detect access to restricted ports: ...................................................................................23
3.2.5.2
To detect opening of the chassis cover: .............................................................................23
3.2.6
Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3
3.3.1
Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2
3.3.3
Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4
Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5
Verify that the module is in FIPS mode ....................................................................................30
3.4
3.5
4
ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1
...............................................................................................................................................32
4.1.1
Crypto Officer Authentication ...................................................................................................32
4.1.2
User Authentication ..................................................................................................................33
4.1.3
Wireless Client Authentication .................................................................................................33
4.1.4
Strength of Authentication Mechanisms ...................................................................................33
4.2
..........................................................................................................................................35
4.2.1
Crypto Officer Services .............................................................................................................35
4.2.2
User Services ............................................................................................................................36
4.2.3
Wireless Client Services ............................................................................................................37
4.2.4
Unauthenticated Services..........................................................................................................37
5
CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6
CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7
SELF TESTS ......................................................................................................................................... 44
.....................................................................................................................26
..........................................................................................................30
......................................................................................................................31
4

Advertisement

Table of Contents
loading

Table of Contents