SpectraGuard® Enterprise Server

Certificate #1649

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 14.12.2011 , 31.01.2012
Standard FIPS 140-2
Security level 1
Type Firmware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Tested: AirTight SA-350 Spectraguard Enterprise Appliance with CentOS 5.2
Description The implementation performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks
Version (Firmware) 6.5.35
Vendor AirTight Networks, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-128, AES-, AES, CAST128, RC2, RC4, DES, Triple-DES, IDEA
Asymmetric Algorithms
RSA 2048, Diffie-Hellman, DSA
Hash functions
SHA1, SHA-1, MD5, RIPEMD-160
Protocols
SSH, TLS 1.0, TLS
Randomness
PRNG

Vendor
Cisco

Security level
Level 1

Standards
FIPS 140-2, SP 800-57, RFC4418

File metadata

Title Microsoft Word - Security Policy - SpectraGuard Server - Aug 31 2011_marke…
Author josmith7
Creation date D:20110831112715-04'00'
Modification date D:20110831112715-04'00'
Pages 30
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0.5 (Windows)

References

Outgoing
  • 1024 - historical - STS Secure for Linux

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1649,
  "dgst": "3cc16f8f6eede20f",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "RSA#748",
        "RNG#833",
        "HMAC#896",
        "AES#1545",
        "DSA#477",
        "SHS#1370",
        "Triple-DES#1015"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.5.35"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "1024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "1024"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "1024"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 22
          },
          "DSA": {
            "DSA": 12
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 61
        },
        "TLS": {
          "TLS": {
            "TLS": 51,
            "TLS 1.0": 4
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1015": 1,
          "#1370": 1,
          "#1545": 1,
          "#477": 1,
          "#748": 1,
          "#833": 1,
          "#896": 1,
          "Certificate 1024": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES #1545": 1,
          "AES- 256": 2,
          "AES-128": 2,
          "AES-CBC (128": 4,
          "DSA #477": 1,
          "DSA (1024": 6,
          "Diffie-Hellman (1024": 5,
          "HMAC- SHA1": 2,
          "HMAC- SHA1 #896": 1,
          "HMAC-SHA-1": 2,
          "HMAC-SHA1": 8,
          "HMAC-SHA1-96": 1,
          "RSA #748": 1,
          "RSA 2048": 1,
          "SHA-1": 3,
          "SHA1": 4,
          "SHA1 #1370": 1,
          "SHA1 #896": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 6
          }
        },
        "RIPEMD": {
          "RIPEMD-160": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 3,
            "SHA1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 6
        },
        "NIST": {
          "SP 800-57": 1
        },
        "RFC": {
          "RFC4418": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3,
            "AES-": 2,
            "AES-128": 2
          },
          "CAST": {
            "CAST128": 1
          },
          "RC": {
            "RC2": 1,
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 4
          },
          "DES": {
            "DES": 1
          }
        },
        "miscellaneous": {
          "IDEA": {
            "IDEA": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "josmith7",
      "/CreationDate": "D:20110831112715-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20110831112715-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Title": "Microsoft Word - Security Policy - SpectraGuard Server - Aug 31  2011_marke\u2026",
      "pdf_file_size_bytes": 100517,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "2e0cc497dc76ad237bf23fb7ed24c79810c626627fd0af84f0beab02f3049b1b",
    "policy_txt_hash": "22915b54f4d94967a9c4d71d7093af937acca8c90cd3ed84f9424f5e5e9c0808"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0012.pdf",
    "date_sunset": null,
    "description": "The implementation performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Tested: AirTight SA-350 Spectraguard Enterprise Appliance with CentOS 5.2"
    ],
    "fw_versions": "6.5.35",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "SpectraGuard\u00ae Enterprise Server",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-12-14",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-01-31",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Update"
      }
    ],
    "vendor": "AirTight Networks, Inc.",
    "vendor_url": "http://www.airtightnetworks.com"
  }
}