Reference Guide

4
3.2.3.2
To detect opening of the chassis cover: ............................................................................ 18
3.2.4 AP-104 TEL Placement ........................................................................................................ 20
3.2.4.1 To detect opening of the chassis cover: ............................................................................ 20
3.2.4.2 To detect access to restricted ports: .................................................................................. 20
3.2.5 AP-105 TEL Placement ........................................................................................................ 22
3.2.5.1 To detect opening of the chassis cover: ............................................................................ 22
3.2.5.2 To detect access to restricted ports: .................................................................................. 22
3.2.6 AP-175 TEL Placement ........................................................................................................ 24
3.2.6.1 To detect access to restricted ports: .................................................................................. 24
3.2.6.2 To detect opening of the chassis cover: ............................................................................ 24
3.2.7 Inspection/Testing of Physical Security Mechanisms ........................................................... 26
3.3 OPERATIONAL ENVIRONMENT ....................................................................................................... 26
3.4 LOGICAL INTERFACES ................................................................................................................... 26
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................ 28
4.1 ROLES ........................................................................................................................................... 28
4.1.1 Crypto Officer Authentication .............................................................................................. 29
4.1.2 User Authentication .............................................................................................................. 29
4.1.3 Wireless Client Authentication ............................................................................................. 29
4.1.4 Strength of Authentication Mechanisms ............................................................................... 29
4.2 SERVICES ...................................................................................................................................... 30
4.2.1 Crypto Officer Services ......................................................................................................... 30
4.2.2 User Services ........................................................................................................................ 31
4.2.3 Wireless Client Services ....................................................................................................... 31
4.2.4 Unauthenticated Services ..................................................................................................... 32
5 CRYPTOGRAPHIC ALGORITHMS .............................................................................................. 33
6 CRITICAL SECURITY PARAMETERS ......................................................................................... 35
7 SELF TESTS........................................................................................................................................ 40
8 SECURE OPERATION ...................................................................................................................... 42