
Aruba AP-5XX Wireless Access Points with ArubaOS FIPS Firmware FIPS 140-2 Level 2 Security Policy |3
Contents
1. Purpose of this Document ....................................................................................................................................7
1.1. Related Documents.......................................................................................................................................7
1.2. Additional Product Information....................................................................................................................7
1.3. Acronyms and Abbreviations........................................................................................................................8
2. Overview...............................................................................................................................................................9
2.1 AP-500 Series ................................................................................................................................................9
2.1.1 Physical Description............................................................................................................................11
2.1.2 Dimensions/Weight ............................................................................................................................11
2.1.3 Environmental.....................................................................................................................................11
2.1.4 Interfaces ............................................................................................................................................11
2.2 AP-510 Series ..............................................................................................................................................13
2.2.1 Physical Description............................................................................................................................15
2.2.2 Dimensions/Weight ............................................................................................................................15
2.2.3 Environmental.....................................................................................................................................15
2.2.4 Interfaces ............................................................................................................................................15
2.3 AP-530 Series ..............................................................................................................................................17
2.3.1 Physical Description............................................................................................................................18
2.3.2 Dimensions/Weight ............................................................................................................................19
2.3.3 Environmental.....................................................................................................................................19
2.3.4 Interfaces ............................................................................................................................................19
2.4 AP-550 Series ..............................................................................................................................................21
2.4.1 Physical Description............................................................................................................................22
2.4.2 Dimensions/Weight ............................................................................................................................22
2.4.3 Environmental.....................................................................................................................................22
2.4.4 Interfaces ............................................................................................................................................22
3. Module Objectives..............................................................................................................................................24
3.1. Security Levels ............................................................................................................................................24
4. Physical Security .................................................................................................................................................25
5. Operational Environment ...................................................................................................................................25
6. Logical Interfaces ................................................................................................................................................25
7. Roles, Authentication and Services ....................................................................................................................26
7.1 Crypto Officer Role .....................................................................................................................................26
7.2 User Role.....................................................................................................................................................28
7.3 Authentication Mechanisms.......................................................................................................................28
7.4 Unauthenticated Services...........................................................................................................................29
7.5 Services Available in Non-FIPS Mode .........................................................................................................29
8. Cryptographic Key Management ........................................................................................................................30
8.1. FIPS Approved Algorithms ..........................................................................................................................30
8.2. Non-FIPS Approved but Allowed Cryptographic Algorithms......................................................................33
8.3. Non-FIPS Approved Cryptographic Algorithms...........................................................................................33
9. Critical Security Parameters................................................................................................................................34
10. Self-Tests.........................................................................................................................................................37
11. Installing the Wireless Access Point................................................................................................................39
11.1. Pre-Installation Checklist ........................................................................................................................39