Reference Guide

3
1
INTRODUCTION ................................................................................................................................. 5
1.1 ACRONYMS AND ABBREVIATIONS ................................................................................................... 5
2 PRODUCT OVERVIEW ...................................................................................................................... 6
2.1 AP-224 ............................................................................................................................................ 6
2.1.1 Physical Description ............................................................................................................... 6
2.1.1.1 Dimensions/Weight ............................................................................................................ 6
2.1.1.2 Interfaces ............................................................................................................................ 6
2.1.1.3 Indicator LEDs ................................................................................................................... 7
2.2 AP-225 ............................................................................................................................................ 8
2.2.1 Physical Description ............................................................................................................... 8
2.2.1.1 Dimensions/Weight ............................................................................................................ 8
2.2.1.2 Interfaces ............................................................................................................................ 8
2.2.1.3 Indicator LEDs ................................................................................................................... 9
3 MODULE OBJECTIVES ................................................................................................................... 10
3.1 SECURITY LEVELS ......................................................................................................................... 10
3.2 PHYSICAL SECURITY ..................................................................................................................... 10
3.2.1 Applying TELs ...................................................................................................................... 10
3.2.2 AP-224/225 TEL Placement ................................................................................................. 11
3.2.2.1 To detect opening of the chassis cover: ............................................................................ 11
3.2.2.2 To detect access to restricted ports ................................................................................... 11
3.2.3 Inspection/Testing of Physical Security Mechanisms ........................................................... 12
3.3 OPERATIONAL ENVIRONMENT ....................................................................................................... 12
3.4 LOGICAL INTERFACES ................................................................................................................... 13
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................ 14
4.1 ROLES ........................................................................................................................................... 14
4.1.1 Crypto Officer Authentication .............................................................................................. 14
4.1.2 User Authentication .............................................................................................................. 14
4.1.3 Wireless Client Authentication ............................................................................................. 15
4.1.4 Strength of Authentication Mechanisms ............................................................................... 15
4.2 SERVICES ...................................................................................................................................... 16
4.2.1 Crypto Officer Services ......................................................................................................... 16
4.2.2 User Services ........................................................................................................................ 16
4.2.3 Wireless Client Services ....................................................................................................... 17
4.2.4 Unauthenticated Services ..................................................................................................... 17
5 CRYPTOGRAPHIC ALGORITHMS .............................................................................................. 18
6 CRITICAL SECURITY PARAMETERS ......................................................................................... 20
7 SELF TESTS........................................................................................................................................ 25