
Contents
Contents............................................................................................................................................................................. 3
Preface............................................................................................................................................................................... 5
Purpose of this Document............................................................................................................................................... 5
Related Documents ......................................................................................................................................................... 5
Additional Product Information ......................................................................................................................5
Overview............................................................................................................................................................................ 6
Cryptographic Module Boundaries................................................................................................................7
Intended Level of Security ............................................................................................................................................ 10
Physical Security............................................................................................................................................................ 11
Operational Environment .............................................................................................................................................. 11
Logical Interfaces........................................................................................................................................................... 12
Roles and Services........................................................................................................................................................ 13
Crypto Officer Role......................................................................................................................................13
Authentication Mechanisms.........................................................................................................................18
Unauthenticated Services............................................................................................................................19
Non-Approved Services...............................................................................................................................19
Cryptographic Key Management ................................................................................................................................. 19
Implemented Algorithms..............................................................................................................................19
Critical Security Parameters........................................................................................................................22
Alternating Bypass State............................................................................................................................................... 30
Installing the Controller ........................................................................................................................................................ 31
Pre-Installation Checklist............................................................................................................................................... 31
Precautions ..................................................................................................................................................................... 31
Product Examination ...................................................................................................................................31
Package Contents.......................................................................................................................................32
Tamper-Evident Labels................................................................................................................................................. 33
Reading TELs..............................................................................................................................................33
Required TEL Locations..............................................................................................................................34
Applying TELs .............................................................................................................................................42
Ongoing Management .......................................................................................................................................................... 42
Crypto Officer Management.......................................................................................................................................... 42
Aruba 7XXX Series Controllers FIPS 140-2 Level 2 Security Policy|3