
Table 6 CSPs/Keys Used in the module
34
SNMPv3 session key
AES-CFB key (128
bits)
This key is derived via
a key derivation
function defined in
SP800-135 KDF
(SNMPv3). Used for
SNMPv3 traffics
protection.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
802.11i
35
802.11i Pre-Shared
Key (PSK)
Shared secret
(8-63 characters)
Entered by CO role.
Used for 802.11i
client/server
authentication
Stored in Flash
memory encrypted
with KEK.
Zeroized by using
command ‘write erase
all’ or by overwriting
with a new secret
36
802.11i Pair-Wise
Master key (PMK)
Shared secret
(256 bits)
The PMK is transferred
to the module,
protected by IPSec
secure tunnel. Used to
derive the Pairwise
Transient Key (PTK)
for 802.11i
communications.
Stored in SDRAM
(plaintext).
Zeroized by rebooting
the module
37
802.11i Pairwise
Transient Key (PTK)
Shared secret
(512 bits)
This key is used to
derive 802.11i session
key by using the KDF
defined in SP800-108.
Stored in SDRAM
memory (plaintext)
Zeroized by rebooting
the module
38
802.11i session key
AES-CCM
(128 bits)
Derived during 802.11i
4-way handshake by
using the KDF defined
in SP800-108.
Stored in SDRAM
memory (plaintext).
Zeroized by rebooting
the module
Note: Key size of DH Group 1 (768 bits) and Group 2 (1024 bits) are not allowed in FIPS mode.
Self-Tests
The module performs Power On Self-Tests regardless the modes (non-FIPS mode and FIPS mode). In
addition, the module also performs Conditional tests after being configured into the FIPS mode. In the
event any self-test fails, the module will enter an error state, log the error, and reboot automatically.
28
|
Aruba 7XXX Series Controllers FIPS 140-2 Level 2 Security Policy