Reference Guide

Aruba 7200 Series Controllers FIPS 140-2 Level 2 Security Policy|3
Contents
Contents.............................................................................................................................................................................3
Preface...............................................................................................................................................................................5
Purpose of this Document...............................................................................................................................................5
Related Documents.........................................................................................................................................................5
Additional Product Information ...................................................................................................................... 5
Overview............................................................................................................................................................................6
Cryptographic Module Boundaries ................................................................................................................ 7
Intended Level of Security..............................................................................................................................................8
Physical Security..............................................................................................................................................................9
Operational Environment................................................................................................................................................9
Logical Interfaces.............................................................................................................................................................9
Roles and Services........................................................................................................................................................10
Crypto Officer Role ...................................................................................................................................... 10
Authentication Mechanisms ......................................................................................................................... 15
Unauthenticated Services ............................................................................................................................ 16
Non-Approved Services ............................................................................................................................... 16
Cryptographic Key Management.................................................................................................................................
16
Implemented Algorithms .............................................................................................................................. 16
Non-FIPS Approved Algorithms Allowed in FIPS Mode .............................................................................. 18
Non-FIPS Approved Algorithms .................................................................................................................. 18
Critical Security Parameters ........................................................................................................................ 19
Self-Tests.........................................................................................................................................................................24
Alternating Bypass State...............................................................................................................................................26
InstallingtheController........................................................................................................................................................27
Pre-Installation Checklist...............................................................................................................................................27
Precautions.....................................................................................................................................................................27
Product Examination ................................................................................................................................... 27
Package Contents ....................................................................................................................................... 28
Tamper-Evident Labels.................................................................................................................................................29
Reading TELs .............................................................................................................................................. 29
Required TEL Locations .............................................................................................................................. 30