Reference Guide
3
1
INTRODUCTION ................................................................................................................................. 4
1.1 ACRONYMS AND ABBREVIATIONS ................................................................................................... 4
2 PRODUCT OVERVIEW ...................................................................................................................... 5
2.1 RAP-155 AND RAP-155P ............................................................................................................... 5
2.1.1 Physical Description ............................................................................................................... 5
2.1.1.1 Dimensions/Weight ............................................................................................................ 5
2.1.1.2 Interfaces ............................................................................................................................ 6
2.1.1.3 Indicator LEDs ................................................................................................................... 6
3 MODULE OBJECTIVES ..................................................................................................................... 8
3.1 SECURITY LEVELS ........................................................................................................................... 8
3.2 PHYSICAL SECURITY ....................................................................................................................... 8
3.2.1 Applying TELs ........................................................................................................................ 8
3.2.2 RAP-155 TEL Placement ........................................................................................................ 9
3.2.2.1 To detect opening of the chassis cover: .............................................................................. 9
3.2.2.2 To detect opening of the chassis cover and access to restricted ports ................................. 9
3.2.3 Inspection/Testing of Physical Security Mechanisms ........................................................... 10
3.3 OPERATIONAL ENVIRONMENT ....................................................................................................... 10
3.4 LOGICAL INTERFACES ................................................................................................................... 11
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................ 12
4.1 ROLES ........................................................................................................................................... 12
4.1.1 Crypto Officer Authentication .............................................................................................. 13
4.1.2 User Authentication .............................................................................................................. 13
4.1.3 Wireless Client Authentication ............................................................................................. 13
4.1.4 Strength of Authentication Mechanisms ............................................................................... 13
4.2 SERVICES ...................................................................................................................................... 14
4.2.1 Crypto Officer Services ......................................................................................................... 14
4.2.2 User Services ........................................................................................................................ 15
4.2.3 Wireless Client Services ....................................................................................................... 15
4.2.4 Unauthenticated Services ..................................................................................................... 16
5 CRYPTOGRAPHIC ALGORITHMS .............................................................................................. 17
6 CRITICAL SECURITY PARAMETERS ......................................................................................... 19
7 SELF TESTS........................................................................................................................................ 24
8 SECURE OPERATION ...................................................................................................................... 26