
3
1INTRODUCTION.................................................................................................................................4
1.1ARUBA DELL RELATIONSHIP........................................................................................................... 4
1.2ACRONYMS AND ABBREVIATIONS................................................................................................... 4
2PRODUCT OVERVIEW......................................................................................................................6
2.1RAP-5WN ...................................................................................................................................... 6
2.1.1Physical Description............................................................................................................... 6
2.1.1.1Dimensions/Weight............................................................................................................ 7
2.1.1.2Interfaces ............................................................................................................................ 7
2.1.1.3Indicator LEDs ................................................................................................................... 7
3MODULE OBJECTIVES.....................................................................................................................9
3.1SECURITY LEVELS........................................................................................................................... 9
3.2PHYSICAL SECURITY ....................................................................................................................... 9
3.2.1Applying TELs ........................................................................................................................ 9
3.2.2Required TEL Locations....................................................................................................... 10
3.2.3Inspection/Testing of Physical Security Mechanisms........................................................... 12
3.3MODES OF OPERATIONS ................................................................................................................ 12
3.3.1Configuring Remote AP FIPS Mode..................................................................................... 13
3.3.2Configuring Remote Mesh Portal FIPS Mode...................................................................... 14
3.4OPERATIONAL ENVIRONMENT....................................................................................................... 16
3.5LOGICAL INTERFACES ................................................................................................................... 16
4ROLES, AUTHENTICATION AND SERVICES............................................................................17
4.1ROLES ........................................................................................................................................... 17
4.1.1Crypto Officer Authentication .............................................................................................. 17
4.1.2User Authentication.............................................................................................................. 17
4.1.3Wireless Client Authentication ............................................................................................. 18
4.1.4Strength of Authentication Mechanisms ............................................................................... 18
4.2SERVICES ...................................................................................................................................... 20
4.2.1Crypto Officer Services......................................................................................................... 20
The CO role in each of Remote AP FIPS mode and Remote Mesh Portal FIPS mode has the same
services................................................................................................................................................. 20
4.2.2User Services........................................................................................................................ 21
4.2.3Wireless Client Services ....................................................................................................... 22
4.2.4Unauthenticated Services ..................................................................................................... 23
5CRYPTOGRAPHIC ALGORITHMS ..............................................................................................24
6CRITICAL SECURITY PARAMETERS.........................................................................................26
7SELF TESTS........................................................................................................................................30