Dell W-AP92 Manual do Utilizador Página 4

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 45
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 3
4
3.2.5 AP-175 TEL Placement ............................................................................................................23
3.2.5.1 To detect access to restricted ports: ...................................................................................23
3.2.5.2 To detect opening of the chassis cover: .............................................................................23
3.2.6 Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3 MODES OF OPERATION .....................................................................................................................26
3.3.1 Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2 Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................27
3.3.3 Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4 Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5 Verify that the module is in FIPS mode ....................................................................................30
3.4 OPERATIONAL ENVIRONMENT ..........................................................................................................30
3.5 LOGICAL INTERFACES ......................................................................................................................31
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1 ROLES...............................................................................................................................................32
4.1.1 Crypto Officer Authentication ...................................................................................................32
4.1.2 User Authentication ..................................................................................................................33
4.1.3 Wireless Client Authentication .................................................................................................33
4.1.4 Strength of Authentication Mechanisms ...................................................................................33
4.2 SERVICES ..........................................................................................................................................35
4.2.1 Crypto Officer Services .............................................................................................................35
4.2.2 User Services ............................................................................................................................36
4.2.3 Wireless Client Services ............................................................................................................37
4.2.4 Unauthenticated Services..........................................................................................................37
5 CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6 CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7 SELF TESTS ......................................................................................................................................... 44
Vista de página 3
1 2 3 4 5 6 7 8 9 ... 44 45

Comentários a estes Manuais

Sem comentários