Reference Guide

3
1
INTRODUCTION ................................................................................................................................. 5
1.1 ACRONYMS AND ABBREVIATIONS ................................................................................................... 5
2 PRODUCT OVERVIEW ...................................................................................................................... 6
2.1 AP-134 ............................................................................................................................................ 6
2.1.1 Physical Description ............................................................................................................... 6
2.1.1.1 Dimensions/Weight ............................................................................................................ 6
2.1.1.2 Interfaces ............................................................................................................................ 6
2.1.1.3 Indicator LEDs ................................................................................................................... 7
2.2 AP-135 ............................................................................................................................................ 7
2.2.1 Physical Description ............................................................................................................... 8
2.2.1.1 Dimensions/Weight ............................................................................................................ 8
2.2.1.2 Interfaces ............................................................................................................................ 8
2.2.1.3 Indicator LEDs ................................................................................................................... 8
3 MODULE OBJECTIVES ................................................................................................................... 10
3.1 SECURITY LEVELS ......................................................................................................................... 10
3.2 PHYSICAL SECURITY ..................................................................................................................... 10
3.2.1 Applying TELs ...................................................................................................................... 10
3.2.2 AP-134 TEL Placement ........................................................................................................ 11
3.2.2.1 To detect opening of the chassis cover: ............................................................................ 11
3.2.2.2 To detect access to restricted ports ................................................................................... 11
3.2.3 AP-135 TEL Placement ........................................................................................................ 13
3.2.3.1 To detect opening of the chassis cover: ............................................................................ 13
3.2.3.2 To detect access to restricted ports ................................................................................... 13
3.2.4 Inspection/Testing of Physical Security Mechanisms ........................................................... 15
3.3 OPERATIONAL ENVIRONMENT ....................................................................................................... 15
3.4 LOGICAL INTERFACES ................................................................................................................... 15
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................ 17
4.1 ROLES ........................................................................................................................................... 17
4.1.1 Crypto Officer Authentication .............................................................................................. 18
4.1.2 User Authentication .............................................................................................................. 18
4.1.3 Wireless Client Authentication ............................................................................................. 18
4.1.4 Strength of Authentication Mechanisms ............................................................................... 18
4.2 SERVICES ...................................................................................................................................... 19
4.2.1 Crypto Officer Services ......................................................................................................... 19
4.2.2 User Services ........................................................................................................................ 20
4.2.3 Wireless Client Services ....................................................................................................... 20
4.2.4 Unauthenticated Services ..................................................................................................... 21