Aruba 620, 650 and Dell W-620, W-650 | FIPS 140-2 Level 2 Release Supplement | 3ContentsPreface ...................................................................................................................................5Purpose of this Document.....................................................................................5Aruba Dell Relationship...................................................................................5Related Documents ...............................................................................................6Product Manuals .............................................................................................6Additional Product Information .......................................................................6Chapter 1 The Aruba 620 and 650 Mobility Controllers .........................................7Overview ................................................................................................................7Physical Description ..............................................................................................8Dimensions......................................................................................................8Cryptographic Module Boundaries .......................................................................8Aruba 620 Chassis ..........................................................................................8Aruba 650 Chassis ........................................................................................11Chapter 2 FIPS 140-2 Level 2 Features .................................................................15Intended Level of Security ...................................................................................15Physical Security .................................................................................................15Operational Environment .....................................................................................15Logical Interfaces ................................................................................................16Roles and Services ..............................................................................................17Crypto Officer Role .......................................................................................17User Role.......................................................................................................19Authentication Mechanisms..........................................................................20Unauthenticated Services .............................................................................20Cryptographic Key Management.........................................................................21Implemented Algorithms ...............................................................................21Non-FIPS Approved Algorithms....................................................................21Critical Security Parameters..........................................................................22Self-Tests.............................................................................................................25Alternating Bypass State .....................................................................................26Mitigation of Other Attacks..................................................................................26XSec ..............................................................................................................26Wireless Intrusion Detection .........................................................................27Unique Station and User Classification ..................................................27Detecting and Disabling Rogue APs ......................................................27Denial of Service and Impersonation Protection...........................................27Man-in-the-Middle Protection.......................................................................27Policy Definition and Enforcement ................................................................28Using Wireless to Protect your Wired Network.............................................28Using Wireless to Protect your Existing Wireless Network...........................28Chapter 3 Installing the Controller.........................................................................29Pre-Installation Checklist.....................................................................................29Precautions..........................................................................................................29The Security Kit ...................................................................................................30