User guide

Security planning Chapter 2: Planning considerations
2-24
phn-2513_004v000 (Oct 2012)
Planning for FIPS 140-2 operation
To prepare for FIPS 140-2 secure mode operation, generate the following cryptographic
material using a FIPS-approved cryptographic generator:
Key of Keys
TLS Private Key and Public Certificates. FIPS 140-2 now recommends 2048 bit keys.
Entropy Input
Wireless Link Encryption Key for AES
Enable the web browsers for HTTPS/TLS operation using FIPS-approved cipher
specifications.
Configure the following attributes of user accounts for the web-based management
interface to match the network security policy:
Auto Logout Period.
Maximum Number of Login Attempts.
Login Attempt Lockout.
Minimum Password Change Period.
Password Expiry Period.
Webpage Session Control
Configure the following attributes:
Password complexity rules reset to ‘best practice’ values.
User account passwords compliant with the network security policy.
RADIUS authentication = Disabled.
Configure all of the above correctly to ensure that PTP 800 is operating in compliance
with the FIPS 140-2 validation.
FIPS validated software is available from System Release PTP800-04-00. Load standard
(non-FIPS) software from PTP800-04-00 or later before loading a FIPS software image.