
Aruba Networks Security Target
Page 45 of 67
Table 14 - Crypto-Officer Services
Provide authenticated and
encrypted remote management
sessions to access the CLI
functionality
IKEv1/IKEv2 inputs and
data; IPSec inputs,
commands, and data
IKEv1/IKEv2
outputs, status, and
data; IPSec
outputs, status, and
data
29, 30, 31, 32 (read)
8, 9, 10, 11, 12, 13
(read/write)
17 (read)
18, 19, 20, 21, 22, 23
(read/write)
Configuring
Module Platform
Define the platform subsystem
firmware of the module by
entering Bootrom Monitor Mode,
File System, fault report,
message logging, and other
platform related commands
Commands and
configuration data
Status of
commands and
configuration data
Configuring
Hardware
Controllers
Define synchronization features
for module
Commands and
configuration data
Status of
commands and
configuration data
Configuring
Internet Protocol
Commands and
configuration data
Status of
commands and
configuration data
Configuring
Quality of Service
(QoS)
Configure QOS values for module
Commands and
configuration data
Status of
commands and
configuration data
Commands and
configuration data
Status of
commands and
configuration data
Define security features for
module, including Access List,
Authentication, Authorization and
Accounting (AAA).
Commands and
configuration data
Status of
commands and
configuration data
Install, rename, and delete X.509
certificates
Commands and
configuration data;
Certificates and keys
Status of
certificates,
commands, and
configuration
29, 30, 31, 32
(read/write)
Komentáře k této Příručce