
Table 6 CSPs/Keys Used in the module
23
IKE session
authentication key
HMAC-SHA-
1/256/384
(160/256/384 bits)
The IKE session (IKE
Phase I) authentication
key. This key is
derived via key
derivation function
defined in SP800-135
KDF (IKEv1/IKEv2).
Used for IKEv1/IKEv2
payload integrity
verification.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
24
IKE session
encryption key
Triple-DES
(192 bits) /AES
(128/192/256 bits)
The IKE session (IKE
Phase I) encrypt key.
This key is derived via
key derivation function
defined in SP800-135
KDF
(IKEv1/IKEv2).Used
for IKE payload
protection.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
25
IPSec session
encryption keys
Triple-DES (192 bits) /
AES and AES-GCM
(128/192/256 bits)
The IPsec (IKE phase
II) encryption key. This
key is derived via a key
derivation function
defined in SP800-135
KDF (IKEv1/IKEv2).
Used for IPSec traffics
protection
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
26
IPSec session
authentication keys
HMAC-SHA-1 (160
bits)
The IPsec (IKE Phase
II) authentication key.
This key is derived via
using the KDF defined
in SP800-135 KDF
(IKEv1/IKEv2). Used
for IPSec traffics
integrity verification.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
SSHv2
27
SSHv2 session keys
AES (128/192/256
bits)
This key is derived via
a key derivation
function defined in
SP800-135 KDF
(SSHv2). Used for
SSHv2 traffics
protection.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
26
|
Aruba 7XXX Series Controllers FIPS 140-2 Level 2 Security Policy