This page was not yet optimized for use on mobile
devices.
Aruba AP-214, AP-215, AP-224, AP-225, AP-228, AP-274, AP-275, AP-277, AP-324, and AP-325 Wireless Access Points
Certificate #3485
Webpage information
Security policy
Symmetric Algorithms
AES, RC4, DES, Triple-DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA1, SHA-256, SHA-384, SHA-512, MD5Schemes
Key ExchangeProtocols
SSHv2, SSH, IKE, IKEv1, IKEv2, IPsec, VPNRandomness
DRBGLibraries
OpenSSLElliptic Curves
P-256, P-384Block cipher modes
ECB, CBC, CTR, GCM, CCMSecurity level
Level 2, Level 1, level 2Standards
FIPS 140-2, FIPS 197, FIPS 186-2, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS 140, SP 800-38A, SP 800-135, SP 800-90A, SP 800-108, SP 800-67, SP 800-38F, SP 800-38D, SP 800-38C, PKCS1, PKCS#1File metadata
| Title | Microsoft Word - ArubaOS8.6-AP-2XX-1SUB-Security-Policy.doc |
|---|---|
| Author | tsengjk |
| Creation date | D:20201218091208-05'00' |
| Modification date | D:20201218091227-05'00' |
| Pages | 60 |
| Creator | Nuance PDF Create |
| Producer | Nuance PDF Create |
Heuristics
No heuristics are available for this certificate.
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3485,
"dgst": "07915fe7c4d1b930",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DRBG#1188",
"HMAC#1835",
"ECDSA#1580",
"AES#2900",
"HMAC#538",
"CVL#C2091",
"KTS#4138",
"RSA#2254",
"AES#2884",
"KBKDF#92",
"AES#1649",
"HMAC#2711",
"SHS#C2090",
"AES#5412",
"SHS#3300",
"AES#1648",
"CVL#326",
"CVL#944",
"SHS#934",
"SHS#3657",
"HMAC#C2091",
"KBKDF#32",
"SHS#2425",
"RSA#1528",
"ECDSA#1578",
"CVL#2154",
"HMAC#2610",
"RSA#2054",
"SHS#1446",
"CVL#C2090",
"SHS#3633",
"RSA#2419",
"ECDSA#950",
"HMAC#967",
"SHS#C2091",
"ECDSA#1211",
"DRBG#528",
"CVL#826",
"KTS#2711",
"HMAC#C2090",
"SHS#3408",
"SHS#2440",
"AES#4138",
"AES#3998",
"HMAC#1818",
"ECDSA#519",
"RSA#2395",
"ECDSA#1210",
"RSA#1518"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"8.5.0.3",
"8.2.2.5",
"8.6.0.7"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 23
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 20
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 2048": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CCM": {
"CCM": 1
},
"CTR": {
"CTR": 4
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 8
}
},
"crypto_protocol": {
"IKE": {
"IKE": 16,
"IKEv1": 23,
"IKEv2": 17
},
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 1,
"SSHv2": 3
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 20,
"P-384": 18
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1188": 1,
"#528": 1
}
},
"fips_certlike": {
"Certlike": {
"AES 2884": 2,
"AES 2900": 1,
"AES 3998": 1,
"AES 4138": 2,
"AES CTR 256": 1,
"AES-CBC18": 1,
"AES-CBC23": 1,
"AES-CBC6": 1,
"AES-CBC7": 1,
"AES-GCM16": 1,
"AES-GCM21": 1,
"CVL12": 1,
"CVL4": 1,
"HMAC (384": 1,
"HMAC 1818": 2,
"HMAC 1835": 2,
"HMAC 2610": 2,
"HMAC 2711": 2,
"HMAC-SHA-1": 23,
"HMAC-SHA-1 (160": 1,
"HMAC-SHA-256": 22,
"HMAC-SHA-384": 22,
"HMAC-SHA-512": 16,
"HMAC-SHA-512 128": 4,
"HMAC-SHA-512 160": 2,
"HMAC-SHA-51213": 2,
"HMAC-SHA-51219": 2,
"HMAC-SHA-51224": 2,
"HMAC-SHA1": 8,
"PKCS#1": 2,
"PKCS1": 8,
"RSA 2048": 1,
"RSA PKCS#1": 2,
"SHA- 1": 1,
"SHA- 384": 1,
"SHA- 512": 5,
"SHA- 51214": 1,
"SHA-1": 15,
"SHA-1 160": 2,
"SHA-256": 14,
"SHA-384": 8,
"SHA-512": 3,
"SHA1": 2,
"SHA2-256": 2,
"SHA2-384": 2
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 2": 74,
"level 2": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"SHA": {
"SHA1": {
"SHA-1": 17,
"SHA1": 2
},
"SHA2": {
"SHA-256": 14,
"SHA-384": 8,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 23
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 1,
"FIPS 140-2": 95,
"FIPS 180-4": 6,
"FIPS 186-2": 4,
"FIPS 186-4": 9,
"FIPS 197": 3,
"FIPS 198-1": 5
},
"NIST": {
"SP 800-108": 1,
"SP 800-135": 2,
"SP 800-38A": 3,
"SP 800-38C": 1,
"SP 800-38D": 1,
"SP 800-38F": 6,
"SP 800-67": 3,
"SP 800-90A": 1
},
"PKCS": {
"PKCS#1": 2,
"PKCS1": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19
},
"RC": {
"RC4": 2
}
},
"DES": {
"3DES": {
"Triple-DES": 10
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 14,
"HMAC-SHA-256": 11,
"HMAC-SHA-384": 11,
"HMAC-SHA-512": 11
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "tsengjk",
"/CreationDate": "D:20201218091208-05\u002700\u0027",
"/Creator": "Nuance PDF Create",
"/ModDate": "D:20201218091227-05\u002700\u0027",
"/Producer": "Nuance PDF Create",
"/Title": "Microsoft Word - ArubaOS8.6-AP-2XX-1SUB-Security-Policy.doc",
"pdf_file_size_bytes": 1886396,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 60
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "f2343f3a6fe078e49829bc03b51d13b435564d00cb5ce4c4113c4f456ffd190f",
"policy_txt_hash": "cf2938b93fa5cabb33f30e0e6917fc4a6a4585b7ab8bffbd40974ded05be6c7d"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode. When installed, initialized and configured as specified in Section 13 of the Security Policy. The tamper evident labels installed as indicated in the security policy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidated.pdf",
"date_sunset": null,
"description": "Aruba\u0027s 802.11ac Wi-Fi access points operate at gigabit speeds, offering extreme performance for mobile devices. In FIPS 140-2 mode, Aruba APs in conjunction with a Mobility Controller support the IEEE 802.11i/WPA2 client standard along with optional Suite B cryptography. Aruba APs also support wireless intrusion detection/prevention services and wireless mesh topologies.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "ArubaOS 8.2.2.5-FIPS; ArubaOS 8.5.0.3-FIPS and ArubaOS 8.6.0.7-FIPS",
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": "[AP-214-USF1 (HPE SKU JW169A), AP-215-USF1 (HPE SKU JW171A), AP-224-USF1 (HPE SKU JW173A), AP-225-USF1 (HPE SKU JW175A), AP-228-USF1 (HPE SKU JW183A), AP-274-USF1 (HPE SKU JW177A), AP-275-USF1 (HPE SKU JW179A), AP-277-USF1 (HPE SKU JW181A), AP-324-USF1 (HPE SKU JW185A) and AP-325-USF1 (HPE SKU JW187A)] with FIPS Kit 4011570-01 (HPE SKU JY894A)",
"level": 2,
"mentioned_certs": {},
"module_name": "Aruba AP-214, AP-215, AP-224, AP-225, AP-228, AP-274, AP-275, AP-277, AP-324, and AP-325 Wireless Access Points",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-07-09",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2020-03-11",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2021-04-09",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
}
],
"vendor": "Aruba, a Hewlett Packard Enterprise company",
"vendor_url": "http://www.arubanetworks.com"
}
}