4
3.2.5
AP-175 TEL Placement ............................................................................................................23
3.2.5.1
To detect access to restricted ports: ...................................................................................23
3.2.5.2
To detect opening of the chassis cover: .............................................................................23
3.2.6
Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3
M
ODES OF
O
PERATION
.....................................................................................................................26
3.3.1
Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2
Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................27
3.3.3
Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4
Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5
Verify that the module is in FIPS mode ....................................................................................30
3.4
O
PERATIONAL
E
NVIRONMENT
..........................................................................................................30
3.5
L
OGICAL
I
NTERFACES
......................................................................................................................31
4
ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1
R
OLES
...............................................................................................................................................32
4.1.1
Crypto Officer Authentication ...................................................................................................32
4.1.2
User Authentication ..................................................................................................................33
4.1.3
Wireless Client Authentication .................................................................................................33
4.1.4
Strength of Authentication Mechanisms ...................................................................................33
4.2
S
ERVICES
..........................................................................................................................................35
4.2.1
Crypto Officer Services .............................................................................................................35
4.2.2
User Services ............................................................................................................................36
4.2.3
Wireless Client Services ............................................................................................................37
4.2.4
Unauthenticated Services..........................................................................................................37
5
CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6
CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7
SELF TESTS ......................................................................................................................................... 44