Reference Guide
Aruba 600 Series Controllers FIPS 140-2 Level 2 Security Policy|3
Contents
Contents.............................................................................................................................................................................3
Preface...............................................................................................................................................................................5
Purpose of this Document...............................................................................................................................................5
Related Documents.........................................................................................................................................................5
Additional Product Information ...................................................................................................................... 5
Overview............................................................................................................................................................................6
Cryptographic Module Boundaries ................................................................................................................ 7
Aruba 620 Chassis ........................................................................................................................................ 7
Aruba 650 Chassis ........................................................................................................................................ 9
Intended Level of Security............................................................................................................................................12
Physical Security............................................................................................................................................................13
Operational Environment..............................................................................................................................................13
Logical Interfaces...........................................................................................................................................................13
Roles and Services........................................................................................................................................................14
Crypto Officer Role ...................................................................................................................................... 14
Authentication Mechanisms ......................................................................................................................... 19
Unauthenticated Services ............................................................................................................................ 20
Non-Approved Services ...............................................................................................................................
20
Cryptographic Key Management.................................................................................................................................21
Implemented Algorithms .............................................................................................................................. 21
Non-FIPS Approved Algorithms Allowed in FIPS Mode .............................................................................. 22
Non-FIPS Approved Algorithms .................................................................................................................. 22
Critical Security Parameters ........................................................................................................................ 22
Self-Tests.........................................................................................................................................................................28
Alternating Bypass State...............................................................................................................................................29
InstallingtheController........................................................................................................................................................31
Pre-Installation Checklist...............................................................................................................................................31
Precautions.....................................................................................................................................................................31
Product Examination ................................................................................................................................... 32
Package Contents ....................................................................................................................................... 32
Tamper-Evident Labels.................................................................................................................................................33