
Table 6 CSPs/Keys Used in the module
28
SSHv2 session
authentication key
HMAC-SHA-1 (160-
bit)
This key is derived via
a key derivation
function defined in
SP800-135 KDF
(SSHv2). Used for
SSHv2 traffics
integrity verification.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
TLS
29
TLS pre-master secret 48 bytes secret
This key is transferred
into the module,
protected by TLS RSA
public key.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
30
TLS session
encryption key
AES 128/192/256 bits
This key is derived via
a key derivation
function defined in
SP800-135 KDF
(TLS). Used for TLS
traffics protection
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
31
TLS session
authentication key
HMAC-SHA-
1/256/384
(160/256/384 bits)
This key is derived via
a key derivation
function defined in
SP800-135 KDF
(TLS). Used for TLS
traffics integrity
verification.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
SNMPv3
32
SNMPv3
authentication
password
8-64 characters
password
Entered by CO role.
User for SNMPv3
authentication
Stored in Flash
memory (plaintext)
encrypted with KEK.
Zeroized by using
command ‘write erase
all’ or by overwriting
with a new secret
33
SNMPv3 engine ID
8-64 characters
password
Entered by CO role. A
unique string used to
identify the SNMP
engine.
Stored in Flash
memory (plaintext)
encrypted with KEK.
Zeroized by using
command ‘write erase
all’ or by overwriting
with a new secret
Aruba 7XXX Series Controllers FIPS 140-2 Level 2 Security Policy
|27