Meru Networks. Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2. Revision Date: June 24, 2009

Similar documents
The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

SEL-3021 Serial Encrypting Transceiver Security Policy Document Version 1.9

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

Security Policy Document Version 3.3. Tropos Networks

KEY-UP Cryptographic Module Security Policy Document Version 0.5. Ian Donnelly Systems (IDS)

Dolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC

Cisco Systems 5760 Wireless LAN Controller

econet smart grid gateways: econet SL and econet MSA FIPS Security Policy

Sony Security Module. Security Policy

FIPS SECURITY POLICY FOR

This Security Policy describes how this module complies with the eleven sections of the Standard:

Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.

Dell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy

RFS7000 SERIES Wireless Controller. FIPS Cryptographic Module Security Policy

Dolphin Board. FIPS Level 3 Validation. Security Policy. Version a - Dolphin_SecPolicy_000193_v1_3.doc Page 1 of 19 Version 1.

CAT862 Dolby JPEG 2000/MPEG-2 Media Block IDC Security Policy. Version 3 June 30, 2010

Non-Proprietary Security Policy Version 1.1

Cisco VPN 3002 Hardware Client Security Policy

STS Secure for Windows XP, Embedded XP Security Policy Document Version 1.4

Dolby IMS-SM FIPS Level 2 Validation. Nonproprietary Security Policy Version: 4

FireEye CM Series: CM-4400, CM-7400, CM-9400

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

Motorola PTP 800 Series CMU Cryptographic Module Security Policy

FIPS Security Policy

Dell Software, Inc. Dell SonicWALL NSA Series SM 9600, SM 9400, SM 9200, NSA FIPS Non-Proprietary Security Policy

FIPS Non-Proprietary Security Policy

FireEye HX Series: HX 4400, HX 4400D, HX 4402, HX 9402

Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, and AP1522 Wireless LAN Access Points

EgoSecure GmbH. EgoSecure Full Disk Encryption (FDE) Cryptographic Module. FIPS Security Policy

CoSign Hardware version 7.0 Firmware version 5.2

FireEye NX Series: NX-900, NX1400, NX-2400, NX-4400, NX4420, NX-7400, NX-7420, NX7500, NX-10000, NX-9450, NX10450

IOS Common Cryptographic Module (IC2M)

Prepared by the Fortress Technologies, Inc., Government Technology Group 4023 Tampa Rd. Suite Oldsmar, FL 34677

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

Integral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy

Hitachi Virtual Storage Platform (VSP) Encryption Board. FIPS Non-Proprietary Cryptographic Module Security Policy

Barco ICMP FIPS Non-Proprietary Security Policy

Imprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016

Symantec Corporation

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

WatchKey USB Token Cryptographic Module Model Number: K6 Smart Card Chip: Z32L256D32U PCB: K003010A Firmware Version: 360C6702

SecureD v Security Policy

Security Policy: Astro Subscriber Encryption Module Astro Spectra, Astro Saber, Astro Consolette, and Astro XTS3000. Version

BCM58100B0 Series: BCM58101B0, BCM58102B0, BCM58103B0 Cryptographic Module VC0 Non-Proprietary Security Policy Document Version 0.

FIPS Security Policy

Security Policy for FIPS KVL 3000 Plus

FIPS Non-Proprietary Security Policy. Acme Packet FIPS Level 2 Validation. Hardware Version: Firmware Version: E-CZ8.0.

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Security Policy

Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0

Model 650 SafeNet Encryptor

3e Technologies International, Inc. FIPS Non-Proprietary Security Policy Level 2 Validation

Cambium Networks PTP 800 Compact Modem Unit (CMU) FIPS Security Policy

Security Policy: Astro Subscriber Motorola Advanced Crypto Engine (MACE)

FIPS SECURITY POLICY

AirMagnet SmartEdge Sensor A5200, A5205, A5220, and A5225 Security Policy

Acme Packet VME. FIPS Level 1 Validation. Software Version: E-CZ Date: July 20, 2018

Acme Packet 3820 and Acme Packet 4500

SafeNet LUNA EFT FIPS LEVEL 3 SECURITY POLICY

Motorola PTP 600 Series Point to Point Wireless Ethernet Bridges

McAfee, Inc. Network Security Platform Sensor M-1250, M-1450, M-2750, M-2850, M-2950, M-3050, M-4050, and M-6050

Cisco VPN 3000 Concentrator Series Security Policy

FIPS SECURITY POLICY

Cisco Integrated Services Router Security Policy

Lexmark PrintCryption TM (Firmware Version 1.3.1)

),36 6(&85,7< 32/,&< 1HW6FUHHQ ;7 9HUVLRQ U 3 1 5HY %

FIPS Security Level 2 Policy LX-4000T Series Console Servers

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

FIPS Non-Proprietary Security Policy

FEITIAN Technologies Company, LTD epass Token Hardware Version: FIPS Non-Proprietary Security Policy

Fortress Mesh Points

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

FIPS SECURITY POLICY

1(76&5((1 &U\SWRJUDSKLF 0RGXOH 6HFXULW\ 3ROLF\ 9HUVLRQ 3 1 5HY $

Hydra PC FIPS Sector-based Encryption Module Security Policy

Cambium Networks Ltd PTP 700 Point to Point Wireless Ethernet Bridge Non-Proprietary FIPS Cryptographic Module Security Policy

Juniper Networks Pulse Cryptographic Module. FIPS Level 1 Security Policy Version: 1.0 Last Updated: July 19, 2013

FIPS SECURITY POLICY

Enhanced Bandwidth Efficient Modem (EBEM) Cryptographic Module Non-Proprietary Security Policy

SecureDoc Disk Encryption Cryptographic Engine

Cambium PTP 600 Series Point to Point Wireless Ethernet Bridges FIPS Security Policy

Oracle Solaris Kernel Cryptographic Framework Software Version 1.0 and 1.1

FIPS SECURITY POLICY

Secure Cryptographic Module (SCM)

Cisco 4451 X Integrated Services Router (ISR) (with PVDM4 32, PVDM4 64, PVDM4 128 and PVDM4 256)

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module Security Policy

Avaya, Inc. Secure Router 2330 Hardware Version: SR2330; Firmware Version: FIPS Non-Proprietary Security Policy

Bluefly Processor. Security Policy. Bluefly Processor MSW4000. Darren Krahn. Security Policy. Secure Storage Products. 4.0 (Part # R)

Brocade Fabric OS FIPS Cryptographic Module 8.2 User Guide

Seagate Secure TCG Enterprise SSC Self-Encrypting Drives FIPS 140 Module. Security Policy. Security Level 2. Rev. 0.

FIPS SECURITY POLICY

WatchKey ProX USB Token Cryptographic Module Hardware Version: K023314A Firmware Version:

Alcatel-Lucent. Alcatel-Lucent VPN Firewall Brick 50

Security Policy for. DAL C3 2 Applet Suite on Axalto Cyberflex Access 64Kv1 Smart Card Chip. FIPS Level 2. Version 1.03 January 31, 2005

MultiApp ID V2.1 Platform FIPS Cryptographic Module Security Policy

ID-One Cosmo V7-a Smart Card Cryptographic Module

Aruba 7XXX Series Controllers

Blue Ridge Networks BorderGuard 4000/3140. FIPS Security Policy

FIPS Cryptographic Module Security Policy Level 2 Validation

Transcription:

Security Gateway SG1000 Cryptographic Module Security Policy Document Version 1.2 Meru Networks Revision Date: June 24, 2009 Copyright Meru Networks 2008. May be reproduced only in its original entirety [without revision].

TABLE OF CONTENTS MODULE OVERVIEW...3 SECURITY LEVEL...3 MODES OF OPERATION...4 PHYSICAL DESCRIPTION...4 IDENTIFICATION AND AUTHENTICATION POLICY...6 ACCESS CONTROL POLICY...8 CSO ADMINISTRATOR ROLE...8 NON-CSO ADMINISTRATOR ROLE...10 CLIENT USER ROLE...11 UNAUTHENTICATED SERVICES...11 DEFINITION OF CRITICAL SECURITY PARAMETERS (CSPS)...11 OPERATIONAL ENVIRONMENT...13 SECURITY RULES...13 MITIGATION OF OTHER ATTACKS POLICY...14 Page 2

Module Overview Meru Networks Security Gateway Cryptographic Module is a high performance purpose built security solution for Wireless LAN deployments. The Security Gateway Cryptographic Module provides a FIPS 140-2 Level 3 security solution conforming to the IEEE 802.11i security standards. The Security Gateway Cryptographic Module is installed in a slot in the Meru Networks Security Gateway SG1000 appliance. The Meru Networks Security Gateway Cryptographic Module is a key component of the Meru Wireless LAN System and along with Meru Access Points and Meru Wireless LAN Controllers delivers unsurpassed performance for secure Wi-Fi traffic. Representing a shift to the fourth generation WLAN architecture using coordinated, intelligent Access Points at the edge, the Meru System Director OS delivers the only Wi-Fi certified infrastructure that handles toll-quality wireless VoIP and high-capacity data on a single infrastructure with no compromises. The Meru Networks Security Gateway Cryptographic module is a hardware/firmware, multi-chip embedded cryptographic module. The Security Gateway Cryptographic module implements the authentication and encryption/decryption functionality conforming to the IEEE 802.11i standards to provide data security for the Wireless LAN. The Security Gateway Cryptographic module can be administered over a serial console and remotely over a secure network connection to the Cryptographic module. The Security Gateway Cryptographic module is encapsulated in a epoxy enclosure. The epoxy enclosure is the physical boundary of the Security Gateway Cryptographic module. The Security Gateway Cryptographic module is built with the Security Gateway Cryptographic Card Rev_A and runs the Security Gateway v1.0-27 firmware. Security Level The cryptographic module meets the overall requirements applicable to Level 3 security of FIPS 140-2. Table 1 Module Security Level Specification Security Requirements Section Level Cryptographic Module Specification 3 Module Ports and Interfaces 3 Roles, Services and Authentication 3 Finite State Model 3 Physical Security 3 Operational Environment N/A Cryptographic Key Management 3 EMI/EMC 3 Page 3

Modes of Operation Approved mode of operation Self-Tests 3 Design Assurance 3 Mitigation of Other Attacks The cryptographic module supports the following FIPS Approved algorithms: RSA with 1024/2048/4096 bit keys for digital signature verification. RSA with 1024 bit keys for digital signature generation Triple-DES (three key) for encrypt/decrypt SHA-1 for hashing HMAC-SHA1 for generating MACs AES 128 (CCMP) for encrypt/decrypt AES 128 (CBC mode) for encrypt/decrypt AES 256 (CBC mode) for encrypt/decrypt AES 128 (ECB mode) for AES Key Wrap The Security Gateway Cryptographic module also supports the commercially available EAP- TLS and SSHv2 (using Diffie-Hellman) protocol for key establishment to provide a secure channel. The module s Diffie-Hellman implementation also conforms to the requirements set forth in FIPS SP800-56A. The Security Gateway Cryptographic module relies on the implemented deterministic random number generator (DRNG) that is compliant with ANSI X9.31 Appendix A.2.4 for key generation. The module also relies on a hardware NDRNG for seeding material for the DRNG. The Security Gateway Cryptographic module supports the following non FIPS Approved algorithms: MD5 in EAP-TLS as required by the TLS specification The Security Gateway Cryptographic module operates in FIPS mode. The user can confirm the cryptographic module s mode via execution of the show security-gateway service through the line interface (CLI). Physical Description Dimensions The Meru Networks Security Gateway Cryptographic module has the following physical dimensions: Epoxy enclosure containing the cryptographic module N/A Page 4

Size: Width: 6.69 Length: 4.51 Height: 1.90 Maximum Weight: 7.14 lb Cryptographic Module Boundaries For FIPS 140-2 Level 3 validation, the Meru Networks Security Gateway Cryptographic module has been validated as a multi-chip embedded cryptographic module. The epoxy enclosure physically encompasses the complete set of hardware and software components and represents the cryptographic boundary of the gateway. The cryptographic boundary is defined as the epoxy enclosure containing the hardware and software components. Interfaces The module supports the following physical interfaces: Physical Port Pins Used Logical Interface Gigabit Ethernet (4) RJ45 Transmit/Receive bidirectional pairs: Pins (1,2), (3,6), (4,5), (7,8) Control Input, Status Output Data Input, Data Output Serial DB9 Control Input, Status Output All control input and status output over the Gigabit Ethernet ports is encrypted with Triple-DES or AES-128/256 within the SSHv2 session. An SSHv2 encrypted session over the Gigabit Ethernet is used to input all the CSPs into the cryptographic module. The Gigabit Ethernet ports only transmit/receive encrypted data from the wireless client users. The Serial interface control input and status output is in the clear but is not used to input or output any CSPs. The PCI interface on the cryptographic module is disabled. Power Interface The module is DC powered with a 4-pin ATX Molex Connector with pin assignment of pin 1, 12V DC, pin 2 and pin 3, Ground, pin 4, 5V. Physical Security The module s cryptographic boundary is defined to be the outer perimeter of the epoxy enclosure containing the hardware and software components. The module is opaque and Page 5

completely conceals the internal components of the cryptographic module. The epoxy enclosure of the module prevents physical access to any of the internal components without having to destroy the module. Figure 1 Image of Security Gateway SG1000Cryptographic Module Identification and Authentication Policy Assumption of roles The cryptographic module shall support three distinct operator roles CSO Administrator, Non- CSO Administrator and Client User. The cryptographic module shall enforce the separation of roles through different established CLI sessions or Client User Sessions. CLI sessions are setup over an SSHv2 tunnel and are authenticated with a username/password. Client User sessions are established via EAP-TLS negotiation and are authenticated with a Client Certificate. Page 6

Table 2 Roles and Required Identification and Authentication Role Type of Authentication Authentication Data CSO Administrator Identity-based Authentication Username/Password Non-CSO Administrator Identity-based Authentication Username/Password Client User Identity-based Authentication EAP-TLS Client Certificate (1024/2048/4096-bit RSA) Table 3 Strengths of Authentication Mechanisms Authentication Mechanism Strength of Mechanism Username and Password EAP-TLS Client Certificate (1024/2048/4096- bit RSA) Passwords are at least 6 characters long, with 95 characters available. Therefore, the probability that a random attempt will succeed or a false acceptance will occur is 1/735,091,890,625 which is less than 1/1,000,000. To exceed 1 in 100,000 probability of a successful random attempt during a 1-minute period, 7350919 (122515 per second) attempts would have to be executed. The Security Gateway Cryptographic module limits the number of sessions that can be established to meet this requirement. 1024-bit RSA keys are roughly equivalent to 80-bit symmetric keys. The probability that a random attempt will succeed or a false acceptance will occur is ½^80 which is less than 1/1,000,000. To exceed 1 in 100,000 probability of a successful random attempt in a 1-minute period, more than 2^63 attempts would have to be executed which is beyond the capacity of the Security Gateway Cryptographic module. Page 7

Access Control Policy The Security Gateway Cryptographic module supports identity-based authentication. There are three main roles in the cryptographic module that operators may assume: a CSO Administrator role, Non-CSO Administrator role and a Client User role. The CSO Administrator maps to the Crypto Officer role and can configure all the parameters including the CSPs on the cryptographic module. The Non-CSO Administrator has access only to s that don t operate on the CSPs on the cryptographic module. The Client Users map to the User role accessing the user data encryption/decryption service of the cryptographic module. CSO Administrator Role The CSO administrator establishes a CLI session to configure and monitor the Security Gateway Cryptographic module. The CSO administrator is authenticated via username/password combination through a valid SSHv2 tunnel to setup the CLI session. The CSO administrator has access to all the configuration parameters including the CSPs. The CSO administrator can establish the CLI session over the serial console authenticating via username/password. However the CSO administrator doesn t have access to s that operate on the CSPs over the serial console CLI session. The following table is a list of services available to the CSO administrator over an SSHv2 tunnel. In addition to these the CSO administrator can access all the services listed for the Non-CSO administrator role in the next section. The CSO administrator has access only to the Non-CSO administrator role services over the serial console CLI session. Service Description Input Output CSP Access Setup Initializes the network configuration, date information, Master key and SSHv2 Host key pair, IP address, date Master key, SSHv2 Host Private Key, SSHv2 Host Public Key Import Server Certificate and Private Key administrator to update the Server s Private Key and Server s Certificate. The key pair is input over the SSHv2 tunnel or through SCP., PEM or PKCS12 file containing the server certificate and private key. Server Private Key, Server Public Key Import Signing Certificate administrator to update the Signing certificate used to validate client certificates., PEM file containing the Signing certificate. Server Signing Certificate Provisioning Administrator Accounts administrator to manage CSO, Non-CSO administrator accounts, username, password Administrator password Page 8

Radius User s administrator to configure Client User Allow/Deny list, Client User Common Name Delete administrator to delete certificates, administrators and remove client users from allow/deny list Server Private Key, Server Public Key, Server Signing Certificate, Administrator password Show certificates administrator to view the configured certificates Certificate details Server Public Key, Server Signing Certificate Zeroize Zeroizes the Master Key, deletes the Server Certificate/Private Key, Server Signing Certificate, SSHv2 Host Key pair and reboots to clear all volatile SDRAM., Reboot progress Master Key, Server Private Key, Server Public Key, Server Signing Certificate, SSHv2 Host Private Key, SSHv2 Host Public Key Reload Default Settings Clears all the configured information including the CSPs and restores the cryptographic module to the factory state, Reboot progress Master Key, Server Private Key, Server Public Key, Server Signing Certificate, SSHv2 Host Private Key, SSHv2 Host Public Key Initiate Self Tests administrator to invoke self-tests through the CLI each of the self tests Upgrade Firmware/Softwar e administrator to load authenticated images into the module, upgrade image file path SW/Firmware Validation Key Page 9

Non-CSO Administrator Role The Non-CSO administrator establishes a CLI session to configure and monitor the Security Gateway Cryptographic module. The Non-CSO administrator is authenticated via username/password combination through a valid SSHv2 tunnel to setup the CLI session. The Non-CSO administrator doesn t have access to any of the services that operate on the CSPs. The following table is a list of services available to the Non-CSO administrator. Service Description Input Output CSP Access Show s Show securitygateway Statistics s Diagnostics Save Network Configuration s System Configuration s Show Log administrator to view the configured parameters and operational status administrator to view the current status and other information administrator to view statistics administrator to generate a diagnostics file on the cryptographic module administrator to save the configuration or diagnostics to a remote file administrator to modify IP addresses, netmask, default gateway etc. administrator to configure date, key expiration values, snmp configuration administrator to view the logs, file path to save the information to, IP address, netmask, default gateway, date, key expiration value, snmp parameters Configured parameter values, associated station information, associated AP information Current State, Software version, IP information Interface statistics, Authentication statistics, Configuration file, Diagnostics file System logs Page 10

Client User Role This role represents the Client users from the wireless stations that connect to the cryptographic module for network connectivity. Client users are authenticated via the 802.11i Authentication mechanism. The Client user is authenticated by a successful EAP-TLS negotiation with a valid Client Certificate. A cryptographic key the Pairwise Master Key (PMK) is generated for an authenticated Client User. The cryptographic module establishes a cryptographic session for each association from an authenticated Client User via the 802.11i 4-way handshake. The 802.11i 4-way handshake uses the PMK to generate the cryptographic session keys TK and GTK. The cryptographic module processes Client user data only if a session with a valid TK/GTK has been setup, otherwise the client user data is discarded. TK is used to encrypt/decrypt unicast data to/from the wireless stations and GTK is used to encrypt multicast data to the wireless stations. Service Description Input Output CSP Access Authentication and Client Key generation The client user is authenticated and a PMK is generated EAP-TLS handshake EAP-TLS handshake Server Private Key, Server Signing Certificate, PMK Session Key Generation Encrypt Data Decrypt Data The cryptographic keys for the Client User session are generated Data destined to the client user wireless station is encrypted and forwarded Data received from the client user wireless station is decrypted and forwarded 802.11 4-way handshake 802.11i 4-way handshake PMK, PTK, TK, GTK Plaintext data Ciphertext data TK, GTK Ciphertext data Plaintext data TK, GTK The Security Gateway Cryptographic module resets the authentication state across reboots and administrators/client users are required to re-authenticate to access the cryptographic services. Unauthenticated Services The cryptographic module has a visible LED that indicates whether the module is powered on or not. Definition of Critical Security Parameters (CSPs) The following are CSPs and Keys contained in the module: Master Key: This is a 3-Key TDES 168-bit key that is used to encrypt the Server Private Key and SSHv2 DH Host Private Key. The Master Key is generated by the module using the DRNG function during the module s initialization phase. The Master Key is stored in EEPROM in plaintext. Page 11

Server Private Key: This is an RSA 1024/2048/4096-bit key pair that is entered into the module by the CSO Administrator through SCP or through the CLI (SSHv2). The Server Private Key is stored encrypted by the Master Key and is used in the EAP-TLS negotiation to generate the PMK, per IEEE802.11i. EAP-TLS master secret: This is a 48 byte shared master secret derived from the EAP- TLS negotiation using a pre master secret, client and server random numbers. The master secret is an interim key used to derive the PMK. EAP-TLS HMAC Key: The HMAC key is generated using a PRF function during the EAP-TLS negotiation and is used as an integrity check for the EAP-TLS handshake. PMK: This 32 byte key is generated as a result of an EAP-TLS negotiation and is used to generate the TK used to encrypt/decrypt 802.11 data traffic. PTK: This 48 byte key block is generated by the 802.11i four way handshake using the PMK. GTK: This is a randomly generated number used to encrypt 802.11 data multicast to the stations. TK: This key is extracted from the PTK which is generated as part of the 802.11i four way handshake. This key is used to encrypt/decrypt unicast 802.11 data traffic. KEK: This key is extracted from the PTK which is generated as part of the 802.11i four way handshake. This key is used to encrypt the GTK sent to the client users. CSO Administrator Password: Passwords should be a minimum of 6 characters in length and should contain a character from at least four (for length less than 8), three (for length less than 10), two (for length less than 12) of the following groups: upper case letters, lower case letters, numbers and special characters. Empty passwords are not permitted. Non-CSO Administrator Password: Passwords should be a minimum of 6 characters in length and should contain a character from at least four (for length less than 8), three (for length less than 10), two (for length less than 12) of the following groups: upper case letters, lower case letters, numbers and special characters. Empty passwords are not permitted. SSHv2 Symmetric Key: AES 128-bit, AES 256-bit or TDES 168-bit keys used to encrypt/decrypt traffic within SSHv2. SSHv2 DH Host Private Key: RSA 1024-bit key pair used to authenticate the SSH server to the clients. The SSHv2 RSA key pair is generated by the module during the initialization phase. The SSHv2 DH Host Private Key is stored encrypted by the Master key. Definition of Public Keys: The following are the public keys contained in the module: Software Firmware Validation Key: This is the public part of the cryptographic module s Page 12

RSA Public/Private key pair used to verify RSA signatures on new firmware. SSHv2 DH Host Public Key: RSA 1024-bit Public Key that is used to authenticate the SSH server to the clients. Server Public Key (EAP-TLS): RSA 1024/2048/4096-bit Public Key that is sent to the client to perform the EAP-TLS negotiation and generate the PMK. Server Signing Certificate: RSA 1024/2048/4096-bit Public Key that is used to validate Client User Client certificates. Operational Environment The FIPS 140-2 Area 6 Operational Environment requirements are not applicable because the device operates in a limited operational environment. Security Rules The cryptographic module s design corresponds to the cryptographic module s security rules. This section documents the security rules enforced by the cryptographic module to implement the security requirements of this FIPS 140-2 Level 2 module. 1. The cryptographic module shall provide three distinct operator roles. These are the Client User role, CSO Administrator role, and the non-cso Administrator role. 2. The cryptographic module provides operator authentication through verification of 1024/2048/4096-bit RSA certificates (through EAP-TLS) and username/password combinations. 3. When the module has not been placed in a valid role, the operator shall not have access to any security functions, including cryptographic services. 4. The cryptographic module shall encrypt message traffic using the TDES or AES algorithm. 5. The cryptographic module shall perform the following tests: A. Power up Self-Tests: i. Cryptographic Algorithm Tests: a. AES-CBC 128-bit/256-bit Known Answer Test b. AES-ECB 128-bit Known Answer Test c. AES-CCMP Known Answer Test d. HMAC-SHA1 Known Answer Test e. DRNG (ANSI X9.31) Known Answer Test f. RSA SigVer15 Known Answer Test g. RSA Pair-wise Consistency Test h. RSA SigGen15 Known Answer Test Page 13

i. TDES Known Answer Test j. SHA-1 Known Answer Test k. DH Conditional Test ii. Software Integrity Test (Checksum verification) iii. Critical Functions Tests a.. B. Conditional Self-Tests: i.continuous Random Number Generator (DRNG) Test performed on DRNG ANSI X9.31 Appendix A.2.4. ii.continuous Random Number Generator (NDRNG) Test performed on Hardware NDRNG Cavium. iii. Software/Firmware Load Test performed on new images with RSA signature verification. iv. DH conditional self test as per SP800-56A. 6. At any time the cryptographic module is in an idle state, the operator shall be capable of ing the module to perform the power-up self-test. 7. Prior to each use, the internal DRNG and NDRNG shall be tested using the conditional test specified in FIPS 140-2 4.9.2. 8. The key generation functions are logically separate from the network and console output functions. 9. Data output shall be inhibited during key generation, self-tests, zeroization, and error states. 10. Status information shall not contain CSPs or sensitive data that if misused could lead to a compromise of the module. 11. The status of the tests run is displayed while performing the self tests. 12. A SHA-1 hash of the CSO administrator and Non-CSO administrator username and passwords are stored in the configuration database. The unprotected passwords are never stored on the module. 13. Administrator access for the first time is allowed with a default username and password. The default password can be changed on the initial setup. 14. The module shall support concurrent operators. Mitigation of Other Attacks Policy The module has not been designed to mitigate any specific attacks that are outside the scope of FIPS 140-2 requirements. Page 14