Reference Guide
4
3.2.3.2
To detect opening of the chassis cover and access to restricted ports ............................... 19
3.2.4 AP-114/115 TEL Placement ................................................................................................. 20
3.2.4.1 To detect opening of the chassis cover: ............................................................................ 20
3.2.4.2 To detect access to restricted ports ................................................................................... 20
3.2.5 Inspection/Testing of Physical Security Mechanisms ........................................................... 21
3.3 OPERATIONAL ENVIRONMENT ....................................................................................................... 22
3.4 LOGICAL INTERFACES ................................................................................................................... 22
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................ 24
4.1 ROLES ........................................................................................................................................... 24
4.1.1 Crypto Officer Authentication .............................................................................................. 25
4.1.2 User Authentication .............................................................................................................. 25
4.1.3 Wireless Client Authentication ............................................................................................. 25
4.1.4 Strength of Authentication Mechanisms ............................................................................... 25
4.2 SERVICES ...................................................................................................................................... 26
4.2.1 Crypto Officer Services ......................................................................................................... 26
4.2.2 User Services ........................................................................................................................ 27
4.2.3 Wireless Client Services ....................................................................................................... 27
4.2.4 Unauthenticated Services ..................................................................................................... 28
5 CRYPTOGRAPHIC ALGORITHMS .............................................................................................. 29
6 CRITICAL SECURITY PARAMETERS ......................................................................................... 31
7 SELF TESTS........................................................................................................................................ 36
8 SECURE OPERATION ...................................................................................................................... 38