Fortress Mesh Points

Certificate #2894

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 28.04.2017
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The protocols SNMP and TLS shall not be used when operated in FIPS mode
Exceptions
  • Design Assurance: Level 3
Description The Fortress Mesh Point is an all-in-one network access device housed in a rugged compact chassis, with the most stringent security available today built in. It can serve as a wireless bridge, a WLAN access point, and an eight-port LAN switch, while performing all the functions of a Fortress controller device: encrypting wireless traffic and providing Multi-factor Authentication for devices on the network it protects.
Version (Hardware) ES210, ES2440, ES520v1, ES520v2 and ES820
Version (Firmware) 5.4.5
Vendor General Dynamics Mission Systems
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, HMAC
Asymmetric Algorithms
RSA2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Hash functions
SHA1, SHA-1, SHA256, SHA-256, SHA-384, SHA-512, SHA512, SHA384, MD5
Schemes
MAC, Key Exchange, Key Agreement
Protocols
SSH, SSL, TLS, IKE, IPsec, VPN
Randomness
DRBG, RNG
Elliptic Curves
P-256, P-384, P-284, secp256r1, secp384r1
Block cipher modes
ECB, CBC, OFB, GCM, CCM

Vendor
Broadcom

Security level
Level 2

Standards
FIPS 140-2, FIPS 197, FIPS 180-4, FIPS198-1, FIPS186-4, FIPS186-2, FIPS 186-2, SP 800-90A, SP 800-38A

File metadata

Author Niforatos, Matthew James
Creation date D:20170405140239-04'00'
Modification date D:20170405140239-04'00'
Pages 37
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2894,
  "dgst": "1dedb99499538a04",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KAS#95",
        "AES#3506",
        "HMAC#2238",
        "DSA#1053",
        "ECDSA#716",
        "CVL#573",
        "DRBG#874",
        "SHS#2891",
        "DRBG#66",
        "KBKDF#112",
        "CVL#937",
        "HMAC#890",
        "AES#1520",
        "SHS#1357",
        "RSA#1800",
        "ECDSA#833",
        "SHS#1358",
        "HMAC#889",
        "AES#1519",
        "CVL#938",
        "RSA#1967"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.4.5"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 24
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 8
          },
          "DSA": {
            "DSA": 4
          }
        },
        "RSA": {
          "RSA2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CCM": {
          "CCM": 2
        },
        "ECB": {
          "ECB": 4
        },
        "GCM": {
          "GCM": 2
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 7
        },
        "IPsec": {
          "IPsec": 41
        },
        "SSH": {
          "SSH": 24
        },
        "TLS": {
          "SSL": {
            "SSL": 22
          },
          "TLS": {
            "TLS": 7
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 16,
          "P-284": 1,
          "P-384": 12,
          "secp256r1": 1,
          "secp384r1": 1
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#112": 2,
          "#937": 1,
          "#938": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 1519": 1,
          "AES 256": 1,
          "CVL 573": 1,
          "CVL 937": 1,
          "CVL 938": 1,
          "DSA 1053": 1,
          "HMAC 889": 2,
          "HMAC-SHA1": 12,
          "HMAC-SHA256": 8,
          "HMAC-SHA384": 12,
          "HMAC-SHA512": 4,
          "HMACSHA1": 1,
          "HMACSHA256": 1,
          "RSA 1800": 1,
          "RSA2048": 1,
          "SHA 1 , 256": 6,
          "SHA( 256": 2,
          "SHA-1": 9,
          "SHA-1, 256": 1,
          "SHA-1, 384": 1,
          "SHA-256": 12,
          "SHA-384": 8,
          "SHA-512": 6,
          "SHA-512 66": 1,
          "SHA1": 2,
          "SHA256": 7,
          "SHA384": 1,
          "SHA512": 1,
          "SHS 1357": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 11,
            "SHA1": 2
          },
          "SHA2": {
            "SHA-256": 13,
            "SHA-384": 8,
            "SHA-512": 7,
            "SHA256": 7,
            "SHA384": 1,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 38
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 4,
          "FIPS 180-4": 3,
          "FIPS 186-2": 1,
          "FIPS 197": 3,
          "FIPS186-2": 1,
          "FIPS186-4": 5,
          "FIPS198-1": 3
        },
        "NIST": {
          "SP 800-38A": 3,
          "SP 800-90A": 18
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 28
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 18
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Niforatos, Matthew James",
      "/CreationDate": "D:20170405140239-04\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20170405140239-04\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "pdf_file_size_bytes": 1465835,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://en.wikipedia.org/wiki/Cryptographic_nonce"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "3093a991e72a203ee32e0e64787e11ffe5a1be2262bfd5f00df6298a6edf5457",
    "policy_txt_hash": "c5c721841c5be37c9fa64243fdcec42ba012d5ea67a66fea884bb82b9c28ece5"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The protocols SNMP and TLS shall not be used when operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertApr2017.pdf",
    "date_sunset": null,
    "description": "The Fortress Mesh Point is an all-in-one network access device housed in a rugged compact chassis, with the most stringent security available today built in. It can serve as a wireless bridge, a WLAN access point, and an eight-port LAN switch, while performing all the functions of a Fortress controller device: encrypting wireless traffic and providing Multi-factor Authentication for devices on the network it protects.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Design Assurance: Level 3"
    ],
    "fw_versions": "5.4.5",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "ES210, ES2440, ES520v1, ES520v2 and ES820",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Fortress Mesh Points",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2017-04-28",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Initial"
      }
    ],
    "vendor": "General Dynamics Mission Systems",
    "vendor_url": "http://gdmissionsystems.com"
  }
}