Reference Guide

16
4.2 Services
The module provides various services depending on role. These are described below.
4.2.1 Crypto Officer Services
The CO role in each of FIPS modes defined in section 3.3 has the same services.
Table 7 - Crypto Officer Services
Service Description CSPs Accessed (see section 6
below for complete description of
CSPs)
FIPS mode enable/disable The CO selects/de-selects FIPS
mode as a configuration option.
None.
Key Management The CO can configure/modify the
IKEv1/IKEv2 shared secret (The
RSA private key is protected by
non-volatile memory and cannot
be modified) and the WPA2 PSK
(used in advanced Remote AP
configuration). Also, the CO/User
implicitly uses the KEK to
read/write configuration to non-
volatile memory.
1 (read)
14, 23, 24, 25 (read/write)
Remotely reboot module The CO can remotely trigger a
reboot
1 (read)
Self-test triggered by CO/User
reboot
The CO can trigger a
programmatic reset leading to
self-test and initialization
1, 32 (read)
Update module firmware The CO can trigger a module
firmware update
32 (read)
Configure non-security related
module parameters
CO can configure various
operational parameters that do not
relate to security
None.
Creation/use of secure
management session between
module and CO
The module supports use of
IPSec for securing the
management channel.
14, 21, 22, 23, 24 (read)
8, 9, 10, 11, 12, 13, 15, 16, 17,
18, 19, 20 (read/write)
System Status CO may view system status
information through the secured
management channel
See creation/use of secure
management session above.
Zeroization Zeroizes all flash memory All CSPs will be destroyed.
4.2.2 User Services
The User services defined in Remote AP FIPS mode and CPSec protected AP FIPS mode shares the same
services with the Crypto Officer role, please refer to Section 4.2.1, “Crypto Officer Services”.