Network Router User's Manual

1 INTRODUCTION .................................................................................................................................. 5
1.1 ARUBA DELL RELATIONSHIP ............................................................................................................. 5
1.2 ACRONYMS AND ABBREVIATIONS ..................................................................................................... 5
2 PRODUCT OVERVIEW ....................................................................................................................... 7
2.1 ARUBA AP-120 SERIES ..................................................................................................................... 7
2.1.1 Physical Description .................................................................................................................. 7
2.1.1.1 Dimensions/Weight ............................................................................................................ 8
2.1.1.2 Interfaces ............................................................................................................................. 8
2.1.1.3 Indicator LEDs .................................................................................................................... 8
3 MODULE OBJECTIVES .................................................................................................................... 10
3.1 SECURITY LEVELS ............................................................................................................................10
3.2 PHYSICAL SECURITY ........................................................................................................................10
3.2.1 Applying TELs ..........................................................................................................................10
3.2.2 Aruba AP-124 TEL Placement ..................................................................................................11
3.2.2.1 To detect opening of the chassis cover: .............................................................................11
3.2.2.2 To detect access to restricted ports ....................................................................................11
3.2.3 Aruba AP-125 TEL Placement ..................................................................................................13
3.2.3.1 To detect opening of the chassis cover: .............................................................................13
3.2.3.2 To detect access to restricted ports ....................................................................................13
3.2.4 Inspection/Testing of Physical Security Mechanisms ...............................................................16
3.3 MODES OF OPERATION .....................................................................................................................17
3.3.1 Configuring Remote AP FIPS Mode .........................................................................................17
3.3.2 Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................18
3.3.3 Configuring Remote Mesh Portal FIPS Mode ..........................................................................19
3.3.4 Configuring Remote Mesh Point FIPS Mode ............................................................................20
3.3.5 Verify that the module is in FIPS mode ....................................................................................21
3.4 OPERATIONAL ENVIRONMENT ..........................................................................................................21
3.5 LOGICAL INTERFACES ......................................................................................................................22
4 ROLES, AUTHENTICATION, AND SERVICES ............................................................................ 23
4.1 ROLES...............................................................................................................................................23
4.1.1 Crypto Officer Authentication ...................................................................................................23
4.1.2 User Authentication ..................................................................................................................24
4.1.3 Wireless Client Authentication .................................................................................................24
4.1.4 Strength of Authentication Mechanisms ...................................................................................24
4.2 SERVICES ..........................................................................................................................................26
4.2.1 Crypto Officer Services .............................................................................................................26