Reference Guide
Aruba 3000, 6000/M3 Mobility Controller FIPS 140-2 Level 2 Security Policy|3
Contents
Contents.............................................................................................................................................................................3
Preface...............................................................................................................................................................................5
Purpose of this Document...............................................................................................................................................5
Related Documents.........................................................................................................................................................5
Additional Product Information ...................................................................................................................... 5
Overview............................................................................................................................................................................6
Cryptographic Module Boundaries ................................................................................................................ 7
Aruba 6000 .................................................................................................................................................... 7
Aruba 3000 Series ......................................................................................................................................... 9
Intended Level of Security............................................................................................................................................10
Physical Security............................................................................................................................................................11
Operational Environment..............................................................................................................................................11
Logical Interfaces...........................................................................................................................................................11
Roles and Services........................................................................................................................................................12
Crypto Officer Role ...................................................................................................................................... 12
Authentication Mechanisms ......................................................................................................................... 17
Unauthenticated Services ............................................................................................................................ 18
Non-Approved Services ...............................................................................................................................
18
Cryptographic Key Management.................................................................................................................................19
Implemented Algorithms .............................................................................................................................. 19
Non-FIPS Approved Algorithms Allowed in FIPS Mode .............................................................................. 20
Non-FIPS Approved Algorithms .................................................................................................................. 20
Critical Security Parameters ........................................................................................................................ 21
Self-Tests.........................................................................................................................................................................26
Alternating Bypass State...............................................................................................................................................27
InstallingtheController........................................................................................................................................................28
Pre-Installation Checklist...............................................................................................................................................28
Precautions.....................................................................................................................................................................28
Product Examination ................................................................................................................................... 28
Package Contents ....................................................................................................................................... 29
Minimum Configuration for the Aruba 6000-400 .......................................................................................... 29