Xirrus XR Series Wi-Fi Products Non Proprietary Security Policy Xirrus, Inc
Total Page:16
File Type:pdf, Size:1020Kb
Xirrus XR Series Wi‐Fi Products Non Proprietary Security Policy Document Version 2.8 Xirrus, Inc. August 28, 2017 Non‐Proprietary Security Policy. May be reproduced only in its original entirety [without revision]. Page 1 of 15 Table of Contents References and Definitions ..................................................................................................... 3 1 Introduction .................................................................................................................... 4 1.1 Hardware and Physical Cryptographic Boundary .........................................................................4 1.2 Modes of Operation .....................................................................................................................5 2 Cryptographic Functionality ............................................................................................. 6 2.1 Critical Security Parameters .........................................................................................................7 2.2 Public Keys ....................................................................................................................................7 3 Roles, Authentication and Services .................................................................................. 8 3.1 Assumption of Roles .....................................................................................................................8 3.2 Authentication Methods ..............................................................................................................8 3.3 Services .........................................................................................................................................9 4 Self‐tests ........................................................................................................................ 11 5 Physical Security Policy .................................................................................................. 12 6 Operational Environment .............................................................................................. 12 7 Mitigation of Other Attacks Policy ................................................................................. 12 8 Security Rules and Guidance .......................................................................................... 12 9 Approved Mode Configuration Instructions ................................................................... 13 9.1 Configuring the Module to operate in the FIPS 140‐2 Approved mode using the WMI ........... 13 9.2 Configuring the Module to operate in the FIPS 140‐2 Approved mode using the CLI .............. 13 9.3 Determining if the Module is in the FIPS 140‐2 Approved mode of operation ........................ 13 10 Tamper Seal Installation ................................................................................................ 14 10.1 Applying tamper seals to the XE‐6000‐TBAR Enclosure ............................................................ 14 List of Tables Table 1 – References ..................................................................................................................................... 3 Table 2 – Acronyms and Definitions ............................................................................................................. 3 Table 3 ‐ Part Numbers ................................................................................................................................. 4 Table 4 – Security Level of Security Requirements ....................................................................................... 4 Table 5 – Ports and Interfaces ...................................................................................................................... 5 Table 6 – Approved and CAVP Validated Cryptographic Functions .............................................................. 6 Table 7 – Non‐Approved but Allowed Cryptographic Functions .................................................................. 6 Table 9 – Public Keys ..................................................................................................................................... 7 Table 10 – Roles Description ......................................................................................................................... 8 Table 11 ‐ Authentication Methods .............................................................................................................. 8 Table 12 – Unauthenticated Services ........................................................................................................... 9 Table 13 – Authenticated Services ................................................................................................................ 9 Table 14 – CSP Access Rights within Services ............................................................................................. 10 Table 15 – Power Up Self‐tests ................................................................................................................... 11 Table 16 – Conditional Self‐tests ................................................................................................................ 11 Non‐Proprietary Security Policy. May be reproduced only in its original entirety [without revision]. Page 2 of 15 List of Figures Figure 1 – Module Packaging ........................................................................................................................ 5 Figure 2 – Module Mounted in EX‐6000‐TBAR Enclosure .......................................................................... 14 Figure 3 – Four (4) Tamper‐Evident Seals on XE‐6000‐TBAR Enclosure ..................................................... 15 Figure 4 – Tamper‐Evident Seal Applied over Small Gap Between Metal Backing and Plastic Cover ........ 15 References and Definitions The following standards are referred to in this Security Policy. Table 1 – References Abbreviation Full Specification Name [FIPS140‐2] Security Requirements for Cryptographic Modules, May 25, 2001 [SP800‐131A] Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, January 2011 Table 2 – Acronyms and Definitions Acronym Definition CLI Command line interface IETF Internet Engineering Task Force IP Internet Protocol RFC Request for Comment; IETF RFCs are the public internet standards followed for TLS, SSH and numerous other protocols. WMI Web management interface Non‐Proprietary Security Policy. May be reproduced only in its original entirety [without revision]. Page 3 of 15 1 Introduction The Xirrus XR Series Wi‐Fi Products (hereafter denoted the Module) are multi‐chip standalone cryptographic modules used for secure wireless IP networking. Table 3 lists all configurations of the Module. All configurations use the same general design and firmware, but are packaged in the form factor as shown in Figure 1 below. All of the Xirrus Wi‐Fi models must be secured in the XE‐6000‐TBAR enclosure. All of them run the same version of firmware and enter FIPS approved mode identically. Functionally, the units have different numbers and types of radio modules. Table 3 ‐ Part Numbers Enclosure (Form Distinguishing Features Model/SKU Firmware Factor) XR‐630‐FIPS XE‐6000‐TBAR AOS‐8.2 ‐2 main PCB, 2 radio, 3x3 stream XR‐2436 XE‐6000‐TBAR AOS‐8.2 ‐4 main PCB, 4 radio, 3x3 stream XR‐4836 XE‐6000‐TBAR AOS‐8.2 ‐4 main PCB, 8 radio, 3x3 stream NOTE: Each configuration includes all necessary tamper‐evident seals. Replacement seals can be ordered using Part Number: SKU XE‐LABEL‐FIPS. The FIPS 140‐2 security levels for the Module are as follows: Table 4 – Security Level of Security Requirements Security Requirement Security Level Cryptographic Module Specification 2 Cryptographic Module Ports and Interfaces 2 Roles, Services, and Authentication 2 Finite State Model 2 Physical Security 2 Operational Environment N/A Cryptographic Key Management 2 EMI/EMC 2 Self‐Tests 2 Design Assurance 3 Mitigation of Other Attacks N/A 1.1 Hardware and Physical Cryptographic Boundary The physical form of the Module is depicted in Figure 1. The cryptographic boundary of the Module is defined as the entire physical enclosure. The Module does not rely on external input/output devices. Non‐Proprietary Security Policy. May be reproduced only in its original entirety [without revision]. Page 4 of 15 Figure 1 – Module Packaging XE‐6000‐TBAR (Bottom) XE‐6000‐TBAR (Top, Connector Port) Table 5 – Ports and Interfaces Port Model (Qty) Logical Interface Type Gigabit Ethernet POE XR‐630‐FIPS (1); XR‐2436 (1); XR‐4836 (2) Power, Control in, Data in, Data out, Status out RS‐232 Serial All models except for the XR‐630‐FIPS have one Control in, Data in, Data serial port. XR‐630‐FIPS have no serial ports. out, Status out Radio RF XR‐630‐FIPS (2); XR‐2436 (4); XR4836 (8) Control in, Data in, Data out, Status out 1.2 Modes of Operation The Module may be configured in a FIPS 140‐2 Approved mode of operation or a non‐Approved mode of operation. The procedures in Sections 9 and 10 list simple steps that must be followed exactly to configure the module for compliance to FIPS 140‐2, Level 2. The procedure includes physical actions, and parameters that must be set in Web Management Interface (WMI) windows in the Security section and in other sections. The non‐Approved mode is a superset of the Approved mode; the following functionality is disabled in the Approved mode: SNMP v1, v2, and v3 SSHv1, Telnet, FTP, TFTP, HTTP SSL