Dell W-AP92 Uživatelský manuál Strana 4

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 45
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 3
4
3.2.5 AP-175 TEL Placement ............................................................................................................23
3.2.5.1 To detect access to restricted ports: ...................................................................................23
3.2.5.2 To detect opening of the chassis cover: .............................................................................23
3.2.6 Inspection/Testing of Physical Security Mechanisms ...............................................................25
3.3 MODES OF OPERATION .....................................................................................................................26
3.3.1 Configuring Remote AP FIPS Mode .........................................................................................26
3.3.2 Configuring Control Plane Security (CPSec) protected AP FIPS mode ..................................27
3.3.3 Configuring Remote Mesh Portal FIPS Mode ..........................................................................28
3.3.4 Configuring Remote Mesh Point FIPS Mode ............................................................................29
3.3.5 Verify that the module is in FIPS mode ....................................................................................30
3.4 OPERATIONAL ENVIRONMENT ..........................................................................................................30
3.5 LOGICAL INTERFACES ......................................................................................................................31
4 ROLES, AUTHENTICATION AND SERVICES ............................................................................. 32
4.1 ROLES...............................................................................................................................................32
4.1.1 Crypto Officer Authentication ...................................................................................................32
4.1.2 User Authentication ..................................................................................................................33
4.1.3 Wireless Client Authentication .................................................................................................33
4.1.4 Strength of Authentication Mechanisms ...................................................................................33
4.2 SERVICES ..........................................................................................................................................35
4.2.1 Crypto Officer Services .............................................................................................................35
4.2.2 User Services ............................................................................................................................36
4.2.3 Wireless Client Services ............................................................................................................37
4.2.4 Unauthenticated Services..........................................................................................................37
5 CRYPTOGRAPHIC ALGORITHMS ................................................................................................ 39
6 CRITICAL SECURITY PARAMETERS .......................................................................................... 40
7 SELF TESTS ......................................................................................................................................... 44
Zobrazit stránku 3
1 2 3 4 5 6 7 8 9 ... 44 45

Komentáře k této Příručce

Žádné komentáře