Dell AP-135 user manual

User manual for the device Dell AP-135

Device: Dell AP-135
Category: Network Card
Manufacturer: Dell
Size: 0.86 MB
Added : 8/7/2013
Number of pages: 35
Print the manual

Download

How to use this site?

Our goal is to provide you with a quick access to the content of the user manual for Dell AP-135. Using the online preview, you can quickly view the contents and go to the page where you will find the solution to your problem with Dell AP-135.

For your convenience

If looking through the Dell AP-135 user manual directly on this website is not convenient for you, there are two possible solutions:

  • Full Screen Viewing - to easily view the user manual (without downloading it to your computer), you can use full-screen viewing mode. To start viewing the user manual Dell AP-135 on full screen, use the button Fullscreen.
  • Downloading to your computer - You can also download the user manual Dell AP-135 to your computer and keep it in your files. However, if you do not want to take up too much of your disk space, you can always download it in the future from ManualsBase.
Dell AP-135 User manual - Online PDF
Advertisement
« Page 1 of 35 »
Advertisement
Print version

Many people prefer to read the documents not on the screen, but in the printed version. The option to print the manual has also been provided, and you can use it by clicking the link above - Print the manual. You do not have to print the entire manual Dell AP-135 but the selected pages only. paper.

Summaries

Below you will find previews of the content of the user manuals presented on the following pages to Dell AP-135. If you want to quickly view the content of pages found on the following pages of the manual, you can use them.

Abstracts of contents
Summary of the content on the page No. 1












FIPS 140-2 Non-Proprietary Security Policy
for Aruba AP-134, AP-135 and Dell W-AP134, W-AP135
Wireless Access Points


Version 1.2
February 2012



Aruba Networks™
1322 Crossman Ave.
Sunnyvale, CA 94089-1113






1

Summary of the content on the page No. 2

2

Summary of the content on the page No. 3

1 INTRODUCTION .................................................................................................................................. 5 1.1 ARUBA DELL RELATIONSHIP ............................................................................................................. 5 1.2 ACRONYMS AND ABBREVIATIONS ..................................................................................................... 5 2 PRODUCT OVERVIEW .......................................................

Summary of the content on the page No. 4

4.1.3 Wireless Client Authentication .................................................................................................23 4.1.4 Strength of Authentication Mechanisms ...................................................................................23 4.2 SERVICES ..........................................................................................................................................25 4.2.1 Crypto Officer Services ..............................................

Summary of the content on the page No. 5

1 Introduction This document constitutes the non-proprietary Cryptographic Module Security Policy for the AP-134, AP- 135 Wireless Access Points with FIPS 140-2 Level 2 validation from Aruba Networks. This security policy describes how the AP meets the security requirements of FIPS 140-2 Level 2, and how to place and maintain the AP in a secure FIPS 140-2 mode. This policy was prepared as part of the FIPS 140-2 Level 2 validation of the product. FIPS 140-2 (Federal Information Processing St

Summary of the content on the page No. 6

SHA Secure Hash Algorithm SNMP Simple Network Management Protocol SPOE Serial & Power Over Ethernet TEL Tamper-Evident Label TFTP Trivial File Transfer Protocol WLAN Wireless Local Area Network 6

Summary of the content on the page No. 7

2 Product Overview This section introduces the various Aruba Wireless Access Points, providing a brief overview and summary of the physical features of each model covered by this FIPS 140-2 security policy. 2.1 AP-134 This section introduces the Aruba AP-134 Wireless Access Point (AP) with FIPS 140-2 Level 2 validation. It describes the purpose of the AP, its physical attributes, and its interfaces. The Aruba AP-134 is high-performance 802.11n (3x3:3) MIMO, dual-radio (concurrent 802.1

Summary of the content on the page No. 8

The module provides the following power interfaces:  48V DC 802.3af or 802.3at or PoE + interoperable Power-over-Ethernet (PoE) with intelli-source PSE sourcing intelligence  12V DC for external AC supplied power (adapter sold separately) 2.1.1.3 Indicator LEDs There are 5 bicolor (power, ENET and WLAN) LEDs which operate as follows: Table 1- AP-134 Indicator LEDs Label Function Action Status PWR AP power / ready status Off No power to AP Red Initial power-up condition Fl

Summary of the content on the page No. 9

2.2 AP-135 This section introduces the Aruba AP-135 Wireless Access Point (AP) with FIPS 140-2 Level 2 validation. It describes the purpose of the AP, its physical attributes, and its interfaces. The Aruba AP-135 is high-performance 802.11n (3x3:3) MIMO, dual-radio (concurrent 802.11a/n + b/g/n) indoor wireless access points capable of delivering combined wireless data rates of up to 900Mbps. These multi-function access points provide wireless LAN access, air monitoring, and wireless in

Summary of the content on the page No. 10

 5V DC for external AC supplied power (adapter sold separately) 2.2.1.3 Indicator LEDs There are 5 bicolor (power, ENET and WLAN) LEDs which operate as follows: Table 2- AP-135 Indicator LEDs Label Function Action Status PWR AP power / ready status Off No power to AP Red Initial power-up condition Flashing – Green Device booting, not ready On – Green Device ready ENET0 Ethernet Network Link Off Ethernet link unavailable ENET1 Status / Activity On – Amber 10/100Mbs Ether

Summary of the content on the page No. 11

3 Module Objectives This section describes the assurance levels for each of the areas described in the FIPS 140-2 Standard. In addition, it provides information on placing the module in a FIPS 140-2 approved configuration. 3.1 Security Levels Section Section Title Level 1 Cryptographic Module Specification 2 2 Cryptographic Module Ports and Interfaces 2 3 Roles, Services, and Authentication 2 4 Finite State Model 2 5 Physical Security 2 6 Operational Environment N/A 7 Cryptographic

Summary of the content on the page No. 12

3.2.2 AP-134 TEL Placement This section displays all the TEL locations of the Aruba AP-134. The AP-134 requires a minimum of 5 TELs to be applied as follows: 3.2.2.1 To detect opening of the chassis cover: 1. Spanning the bottom and top chassis covers and placed in the front left corner 2. Spanning the bottom and top chassis covers and placed in the back left corner 3. Spanning the chassis screw on the bottom left corner 4. Spanning the chassis screw on the bottom right corner 3.2.2.2 T

Summary of the content on the page No. 13

Figure 4: AP-134 Top View Figure 5: AP-134 Right View Figure 6: AP-134 Bottom View 3.2.3 AP-135 TEL Placement This section displays all the TEL locations of the Aruba AP-135. The AP-134 requires a minimum of 5 TELs to be applied as follows: 3.2.3.1 To detect opening of the chassis cover: 1. Spanning the bottom and top chassis covers and placed in the front left corner 13

Summary of the content on the page No. 14

2. Spanning the bottom and top chassis covers and placed in the back left corner 3. Spanning the chassis screw on the bottom left corner 4. Spanning the chassis screw on the bottom right corner 3.2.3.2 To detect access to restricted ports 5. Spanning the serial port Following is the TEL placement for the AP-135: Figure 7: AP-135 Front view Figure 8: AP-135 Back view Figure 9: AP-135 Left view Figure 10: AP-135 Right view 14

Summary of the content on the page No. 15

Figure 11: AP-135 Top view Figure 12: AP-135 Bottom View 3.2.4 Inspection/Testing of Physical Security Mechanisms Physical Security Mechanism Recommended Test Frequency Guidance Tamper-evident labels (TELs) Once per month Examine for any sign of removal, replacement, tearing, etc. See images above for locations of TELs Opaque module enclosure Once per month Examine module enclosure for any evidence of new openings or other access to the module internals. 15

Summary of the content on the page No. 16

3.3 Modes of Operation The module has the following FIPS approved modes of operations: • Remote AP (RAP) FIPS mode – When the module is configured as a Remote AP, it is intended to be deployed in a remote location (relative to the Mobility Controller). The module provides cryptographic processing in the form of IPSec for all traffic to and from the Mobility Controller. • Control Plane Security (CPSec) protected AP FIPS mode – When the module is configured as a Control Plane Security prot

Summary of the content on the page No. 17

6. If the staging controller does not provide PoE, either ensure the presence of a PoE injector for the LAN connection between the module and the controller, or ensure the presence of a DC power supply appropriate to the particular model of the module. 7. Connect the module via an Ethernet cable to the staging controller; note that this should be a direct connection, with no intervening network or devices; if PoE is being supplied by an injector, this represents the only exception. That is,

Summary of the content on the page No. 18

7. Connect the module via an Ethernet cable to the staging controller; note that this should be a direct connection, with no intervening network or devices; if PoE is being supplied by an injector, this represents the only exception. That is, nothing other than a PoE injector should be present between the module and the staging controller. 8. Once the module is connected to the controller by the Ethernet cable, navigate to the Configuration > Wireless > AP Installation page, where you shoul

Summary of the content on the page No. 19

Section “Provisioning an Individual AP” of Chapter “The Basic User-Centric Networks” of the Aruba OS User Guide. Click “Apply and Reboot” to complete the provisioning process. a. During the provisioning process as Remote Mesh Portal, if Pre-shared key is selected to be the Remote IP Authentication Method, the IKE pre-shared key (which is at least 8 characters in length) is input to the module during provisioning. Generation of this key is outside the scope of this policy. In the initial p

Summary of the content on the page No. 20

represents the only exception. That is, nothing other than a PoE injector should be present between the module and the staging controller. 8. Once the module is connected to the controller by the Ethernet cable, navigate to the Configuration > Wireless > AP Installation page, where you should see an entry for the AP. Select that AP, click the “Provision” button, which will open the provisioning window. Now provision the AP as Remote Mesh Portal by filling in the form appropriately. Detailed


Alternative user manuals
# User manual Category Download
1 Dell 2508 User manual Network Card 3
2 Dell 5002 User manual Network Card 1
3 Dell 3100 User manual Network Card 12
4 Dell 53-1002116-01 User manual Network Card 0
5 Dell 1450 User manual Network Card 3
6 Dell 5400+ User manual Network Card 0
7 Dell 5600+ User manual Network Card 0
8 Dell 370 User manual Network Card 0
9 Dell 7500 User manual Network Card 0
10 Dell 2200F User manual Network Card 0
11 Dell ADVANCED PORT REPLICATOR User manual Network Card 1
12 Dell 9200 User manual Network Card 1
13 Dell AP-134 User manual Network Card 4
14 Dell AP-105 User manual Network Card 101
15 Dell AP-175 User manual Network Card 1
16 Sony BTA-NW1A User manual Network Card 2
17 Sony BKMW-E3000 User manual Network Card 2
18 Sony AC-SQ950D User manual Network Card 0
19 Sony BBV RX100 User manual Network Card 3
20 Sony CLIE A-AVZ-100-11 User manual Network Card 1