Installation guide
Motorola WS5100 Wireless Switch and RFS7000 RF Switch Security Target
Page 11 of 85
The following wireless security protocols are disabled in the FIPS 140-2 mode of operation and are
not included in this evaluation: WEP, WPA, TKIP.
The following TOE features are not included in the evaluation: intrusion detection, protection
against denial-of-service attacks, roaming of mobile clients across distributed networks, stateful
packet analysis, network address translation, 802.11 traffic prioritization and precedence, Wi-Fi
multimedia extensions.
2.4 IT Environment
As described in Section 2.1 the TOE uses services of an external RADIUS authentication server for
user authentication. The authentication server supports EAP-TLS, EAP-TTLS and PEAP
authentication protocols.
Reliable time stamps are provided by an external Network Time Protocol (NTP) server.
Audit records generated by the TOE are transmitted to the external syslog audit server. The audit
server provides protected storage for audit records, as well as a capability to view and search audit
records.
Network connections between the TOE and external authentication, audit and time servers are
protected by a trusted channel, as required by the WLANAS PP. The IPSec/IKE security protocol is
used to establish secure network connections for the trusted channel.