Aruba AP-214, AP-215, AP-224, AP-225, AP-228, AP-274, AP-275, AP-277, AP-324, and AP-325 Wireless Access Points

Certificate #3485

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 09.07.2019 , 11.03.2020 , 09.04.2021
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. When installed, initialized and configured as specified in Section 13 of the Security Policy. The tamper evident labels installed as indicated in the security policy
Exceptions
  • Mitigation of Other Attacks: N/A
Description Aruba's 802.11ac Wi-Fi access points operate at gigabit speeds, offering extreme performance for mobile devices. In FIPS 140-2 mode, Aruba APs in conjunction with a Mobility Controller support the IEEE 802.11i/WPA2 client standard along with optional Suite B cryptography. Aruba APs also support wireless intrusion detection/prevention services and wireless mesh topologies.
Version (Hardware) [AP-214-USF1 (HPE SKU JW169A), AP-215-USF1 (HPE SKU JW171A), AP-224-USF1 (HPE SKU JW173A), AP-225-USF1 (HPE SKU JW175A), AP-228-USF1 (HPE SKU JW183A), AP-274-USF1 (HPE SKU JW177A), AP-275-USF1 (HPE SKU JW179A), AP-277-USF1 (HPE SKU JW181A), AP-324-USF1 (HPE SKU JW185A) and AP-325-USF1 (HPE SKU JW187A)] with FIPS Kit 4011570-01 (HPE SKU JY894A)
Version (Firmware) ArubaOS 8.2.2.5-FIPS; ArubaOS 8.5.0.3-FIPS and ArubaOS 8.6.0.7-FIPS
Vendor Aruba, a Hewlett Packard Enterprise company
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC4, DES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, DH, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, MD5
Schemes
Key Exchange
Protocols
SSHv2, SSH, IKE, IKEv1, IKEv2, IPsec, VPN
Randomness
DRBG
Libraries
OpenSSL
Elliptic Curves
P-256, P-384
Block cipher modes
ECB, CBC, CTR, GCM, CCM

Security level
Level 2, Level 1, level 2

Standards
FIPS 140-2, FIPS 197, FIPS 186-2, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS 140, SP 800-38A, SP 800-135, SP 800-90A, SP 800-108, SP 800-67, SP 800-38F, SP 800-38D, SP 800-38C, PKCS1, PKCS#1

File metadata

Title Microsoft Word - ArubaOS8.6-AP-2XX-1SUB-Security-Policy.doc
Author tsengjk
Creation date D:20201218091208-05'00'
Modification date D:20201218091227-05'00'
Pages 60
Creator Nuance PDF Create
Producer Nuance PDF Create

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3485,
  "dgst": "07915fe7c4d1b930",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "DRBG#1188",
        "HMAC#1835",
        "ECDSA#1580",
        "AES#2900",
        "HMAC#538",
        "CVL#C2091",
        "KTS#4138",
        "RSA#2254",
        "AES#2884",
        "KBKDF#92",
        "AES#1649",
        "HMAC#2711",
        "SHS#C2090",
        "AES#5412",
        "SHS#3300",
        "AES#1648",
        "CVL#326",
        "CVL#944",
        "SHS#934",
        "SHS#3657",
        "HMAC#C2091",
        "KBKDF#32",
        "SHS#2425",
        "RSA#1528",
        "ECDSA#1578",
        "CVL#2154",
        "HMAC#2610",
        "RSA#2054",
        "SHS#1446",
        "CVL#C2090",
        "SHS#3633",
        "RSA#2419",
        "ECDSA#950",
        "HMAC#967",
        "SHS#C2091",
        "ECDSA#1211",
        "DRBG#528",
        "CVL#826",
        "KTS#2711",
        "HMAC#C2090",
        "SHS#3408",
        "SHS#2440",
        "AES#4138",
        "AES#3998",
        "HMAC#1818",
        "ECDSA#519",
        "RSA#2395",
        "ECDSA#1210",
        "RSA#1518"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.5.0.3",
        "8.2.2.5",
        "8.6.0.7"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 23
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "Diffie-Hellman": 20
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 1
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 8
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 16,
          "IKEv1": 23,
          "IKEv2": 17
        },
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 1,
          "SSHv2": 3
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 20,
          "P-384": 18
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1188": 1,
          "#528": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 2884": 2,
          "AES 2900": 1,
          "AES 3998": 1,
          "AES 4138": 2,
          "AES CTR 256": 1,
          "AES-CBC18": 1,
          "AES-CBC23": 1,
          "AES-CBC6": 1,
          "AES-CBC7": 1,
          "AES-GCM16": 1,
          "AES-GCM21": 1,
          "CVL12": 1,
          "CVL4": 1,
          "HMAC (384": 1,
          "HMAC 1818": 2,
          "HMAC 1835": 2,
          "HMAC 2610": 2,
          "HMAC 2711": 2,
          "HMAC-SHA-1": 23,
          "HMAC-SHA-1 (160": 1,
          "HMAC-SHA-256": 22,
          "HMAC-SHA-384": 22,
          "HMAC-SHA-512": 16,
          "HMAC-SHA-512 128": 4,
          "HMAC-SHA-512 160": 2,
          "HMAC-SHA-51213": 2,
          "HMAC-SHA-51219": 2,
          "HMAC-SHA-51224": 2,
          "HMAC-SHA1": 8,
          "PKCS#1": 2,
          "PKCS1": 8,
          "RSA 2048": 1,
          "RSA PKCS#1": 2,
          "SHA- 1": 1,
          "SHA- 384": 1,
          "SHA- 512": 5,
          "SHA- 51214": 1,
          "SHA-1": 15,
          "SHA-1 160": 2,
          "SHA-256": 14,
          "SHA-384": 8,
          "SHA-512": 3,
          "SHA1": 2,
          "SHA2-256": 2,
          "SHA2-384": 2
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 2": 74,
          "level 2": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 17,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-256": 14,
            "SHA-384": 8,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 23
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 1,
          "FIPS 140-2": 95,
          "FIPS 180-4": 6,
          "FIPS 186-2": 4,
          "FIPS 186-4": 9,
          "FIPS 197": 3,
          "FIPS 198-1": 5
        },
        "NIST": {
          "SP 800-108": 1,
          "SP 800-135": 2,
          "SP 800-38A": 3,
          "SP 800-38C": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 6,
          "SP 800-67": 3,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS1": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          },
          "RC": {
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 10
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 14,
            "HMAC-SHA-256": 11,
            "HMAC-SHA-384": 11,
            "HMAC-SHA-512": 11
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "tsengjk",
      "/CreationDate": "D:20201218091208-05\u002700\u0027",
      "/Creator": "Nuance PDF Create",
      "/ModDate": "D:20201218091227-05\u002700\u0027",
      "/Producer": "Nuance PDF Create",
      "/Title": "Microsoft Word - ArubaOS8.6-AP-2XX-1SUB-Security-Policy.doc",
      "pdf_file_size_bytes": 1886396,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "f2343f3a6fe078e49829bc03b51d13b435564d00cb5ce4c4113c4f456ffd190f",
    "policy_txt_hash": "cf2938b93fa5cabb33f30e0e6917fc4a6a4585b7ab8bffbd40974ded05be6c7d"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. When installed, initialized and configured as specified in Section 13 of the Security Policy. The tamper evident labels installed as indicated in the security policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidated.pdf",
    "date_sunset": null,
    "description": "Aruba\u0027s 802.11ac Wi-Fi access points operate at gigabit speeds, offering extreme performance for mobile devices. In FIPS 140-2 mode, Aruba APs in conjunction with a Mobility Controller support the IEEE 802.11i/WPA2 client standard along with optional Suite B cryptography. Aruba APs also support wireless intrusion detection/prevention services and wireless mesh topologies.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "ArubaOS 8.2.2.5-FIPS; ArubaOS 8.5.0.3-FIPS and ArubaOS 8.6.0.7-FIPS",
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": "[AP-214-USF1 (HPE SKU JW169A), AP-215-USF1 (HPE SKU JW171A), AP-224-USF1 (HPE SKU JW173A), AP-225-USF1 (HPE SKU JW175A), AP-228-USF1 (HPE SKU JW183A), AP-274-USF1 (HPE SKU JW177A), AP-275-USF1 (HPE SKU JW179A), AP-277-USF1 (HPE SKU JW181A), AP-324-USF1 (HPE SKU JW185A) and AP-325-USF1 (HPE SKU JW187A)] with FIPS Kit 4011570-01 (HPE SKU JY894A)",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Aruba AP-214, AP-215, AP-224, AP-225, AP-228, AP-274, AP-275, AP-277, AP-324, and AP-325 Wireless Access Points",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-07-09",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-03-11",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2021-04-09",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      }
    ],
    "vendor": "Aruba, a Hewlett Packard Enterprise company",
    "vendor_url": "http://www.arubanetworks.com"
  }
}