
Aruba 3000, 6000/M3 Mobility Controller FIPS 140-2 Level 2 Security Policy|3
Contents
Contents.............................................................................................................................................................................3
Preface...............................................................................................................................................................................5
Purpose of this Document...............................................................................................................................................5
Related Documents.........................................................................................................................................................5
Additional Product Information ......................................................................................................................5
Overview............................................................................................................................................................................6
Cryptographic Module Boundaries................................................................................................................7
Aruba 6000....................................................................................................................................................7
Aruba 3000 Series.........................................................................................................................................9
Intended Level of Security............................................................................................................................................10
Physical Security............................................................................................................................................................11
Operational Environment..............................................................................................................................................11
Logical Interfaces...........................................................................................................................................................11
Roles and Services........................................................................................................................................................12
Crypto Officer Role......................................................................................................................................12
Authentication Mechanisms.........................................................................................................................17
Unauthenticated Services............................................................................................................................18
Non-Approved Services...............................................................................................................................18
Cryptographic Key Management.................................................................................................................................19
Implemented Algorithms..............................................................................................................................19
Non-FIPS Approved Algorithms Allowed in FIPS Mode..............................................................................20
Non-FIPS Approved Algorithms ..................................................................................................................20
Critical Security Parameters........................................................................................................................21
Self-Tests.........................................................................................................................................................................26
Alternating Bypass State...............................................................................................................................................27
InstallingtheController........................................................................................................................................................28
Pre-Installation Checklist...............................................................................................................................................28
Precautions.....................................................................................................................................................................28
Product Examination ...................................................................................................................................28
Package Contents.......................................................................................................................................29
Minimum Configuration for the Aruba 6000-400..........................................................................................29