Specifications
Security Target Version 1.0 9/29/2014
15
internal database or authentication server). The TOE requires identification and authentication (either locally or
remotely through external authentication server, internally, or both) of administrators managing the TOE. Wireless
clients are identified and authenticated by different authentication mechanisms such as 802.1X, etc. More detailed
information is provided in section 6.1.4. After an administrator-specified number of failed attempts, the user account
is locked out. In addition, the password mechanism can be configured to have a minimum length of six characters.
2.2.2.5 Security management
The TOE provides the capability to manage auditing, cryptographic operations, password minimum length
enforcement, user accounts, advisory banner, and timeout (inactivity threshold) value. The management functions
are restricted to an administrator role. The role must have the appropriate access privileges or access will be denied.
The wireless user role has no access to the management interfaces. The FIPS-certified TOE ensures that only secure
values are accepted for security attributes.
2.2.2.6 Protection of the TSF
The TOE provides integrity and security protection for all communication between its components. This prevents
unauthorized modification or disclosure of TSF data during transmission. The TOE also protects itself against replay
attacks using cryptographic protocols.
The TOE provides self-tests to ensure the correct operation of the cryptographic functions and TSF hardware. There
is an option for the administrator to verify the integrity of stored TSF executable code.
The TOE includes mechanisms so that the administrator can determine the TOE version and update the TOE
securely using digital signatures and published hashes.
2.2.2.7 Resource utilization
The TOE can enforce maximum usage quotas on the number of concurrent sessions available to a defined group of
users (role).
2.2.2.8 TOE access
The TOE allows administrators to configure a period of inactivity for administrator and wireless user sessions. Once
that time period has been reached while the session has no activity, the session is terminated. Administrators as well
as wireless users can also terminate their own sessions at any time. A warning banner is displayed at the
management interfaces (Web GUI and CLI) to advise users on appropriate use and penalty for misuse of system.
The TOE can restrict the ability to connect to administrative interfaces based on time/date, location, and device
MAC address and blacklist status.
2.2.2.9 Trusted path/channels
The TOE provides an encrypted channel between itself and third-party trusted IT entities in the operating
environment. The TOE also provides a protected communication path between itself and wireless users.
2.3 TOE Documentation
Aruba Networks offers a series of documents that describe the installation and configuration of Mobility Controllers
and Access Points as well as guidance for subsequent use and administration of the applicable security features. The
documentation is available online at
http://support.arubanetworks.com. The following documents are referenced
throughout this ST:
[USER] ArubaOS 6.3.x User Guide, Ref 0511497-00
[CLI] ArubaOS 6.3.x Command Line Interface, Ref 0511500-00
[SYSLOG] ArubaOS 6.3.x Syslog Messages Guide, Ref 0511324-01
[MIB] ArubaOS 6.3.x MIB Reference Guide, Ref 0511323-01
[RN] ArubaOS 6.3.1.5 Release Notes, Ref 0511467-05v1
[FIPS] ArubaOS 6.3 FIPS Security Policy (available at CMVP website)
[QUICK] ArubaOS 6.3 Quick Start Guide, Ref 0511320-02