Aruba 2930F, 2930M, 3810M and 5400R zl2 Switch Series

Certificate #3764

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition - replaced by certificate #4572
Validation dates 10.12.2020
Standard FIPS 140-2
Security level 1
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. When initialized and configured as specified in Section 10 of the Security Policy
Exceptions
  • Roles, Services, and Authentication: Level 3
  • Design Assurance: Level 2
  • Mitigation of Other Attacks: N/A
Description The Aruba 2930F, 2930M and 3810M Switch Series are designed for customers creating digital workplaces that are optimized for mobile users with an integrated wired and wireless approach. The 2930F is basic Layer 3 switch that supports 10GbE uplinks, PoE+, robust QoS, RIP Routing, Access OSPF, and IPV6, ACLs. The module delivers consistent wired/wireless user experience with unified management tools such as Aruba ClearPass Policy Manager and Aruba Airwave. The 2930M and 3810M are Layer 3 access switches that support 10GbE and 40GbE uplinks, Dual Modular Power Supplies, full PoE+, HPE Smart Rat
Version (Hardware) Aruba 2930F Switches (JL258A, JL259A, JL260A, JL261A, JL262A, JL263A, JL264A, JL557A, JL559A and JL692A) [1], Aruba 2930M Switches (JL319A, JL320A, JL321A, JL322A, JL323A, JL324A, R0M67A and R0M68A) [1] with Expansion Cards listed in Table 3 of the Security Policy, Aruba 3810M Switches (JL071A, JL072A, JL073A, JL074A, JL075A and JL076A) [2] with Expansion Cards listed in Table 4 of the Security Policy, Aruba 5400R zl2 Switches (5406R zl2 J9821A and 5412R zl2 J9822A) [2] with Management card and Interface Cards listed in Table 5 of the Security Policy
Version (Firmware) WC.16.08 [1] or KB.16.08 [2]
Vendor Hewlett Packard Enterprise
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, AES-, AES-128, DES, Triple-DES, HMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-384, SHA-512, MD5
Schemes
Key Agreement, Key agreement
Protocols
SSH, SSHv2, SSL, TLSv1.2, TLS, TLS 1.2
Randomness
DRBG
Elliptic Curves
P-256, P-384
Block cipher modes
CBC, CTR, GCM

Security level
Level 1

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 197, FIPS 198-1, FIPS 180-4, FIPS 186-4, SP 800-38A, SP 800-38D, SP 800-90A, SP 800-67, SP 800-133, SP 800-90a, PKCS1

File metadata

Title HPE Aruba 2930F Security Policy
Author [email protected]
Creation date D:20201201152858-05'00'
Modification date D:20201201152858-05'00'
Pages 54
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3764,
  "dgst": "ca7aa52051ff3da0",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#C809",
        "SHS#C809",
        "Triple-DES#C809",
        "CVL#C809",
        "RSA#C809",
        "DRBG#C809",
        "HMAC#C809"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "16.08"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 7
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CTR": {
          "CTR": 2
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 32,
          "SSHv2": 10
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 29,
            "TLS 1.2": 1,
            "TLSv1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2,
          "Key agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 4,
          "P-384": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#2": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128": 1,
          "AES 256": 1,
          "AES-128": 1,
          "AES-256": 1,
          "AES-CBC 128": 1,
          "Diffie- Hellman 2048": 1,
          "Diffie- Hellman 224": 1,
          "HMAC-SHA1": 4,
          "HMAC-SHA1 160": 2,
          "PKCS1": 4,
          "RSA 2048": 8,
          "SHA-1": 4,
          "SHA-224": 1,
          "SHA-256": 7,
          "SHA-384": 2,
          "SHA-512": 3,
          "SHA1": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 6
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 7,
            "SHA-384": 2,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 22
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 11,
          "FIPS 180-4": 1,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS 198-1": 1,
          "FIPS PUB 140-2": 2
        },
        "NIST": {
          "SP 800-133": 1,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-67": 1,
          "SP 800-90A": 7,
          "SP 800-90a": 1
        },
        "PKCS": {
          "PKCS1": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5,
            "AES-": 1,
            "AES-128": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 5
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20201201152858-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20201201152858-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "HPE Aruba 2930F Security Policy",
      "pdf_file_size_bytes": 990752,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?source=C\u0026number=809",
          "file:///C:/Users/sweingart/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.Outlook/V3LN0ZO3/www.hpe.com",
          "http://www.hpe.com./",
          "https://www.hpe.com/us/en/networking/switches.html",
          "http://h20566.www2.hpe.com/hpsc/doc/public/display?sp4ts.oid=1008995294\u0026docLocale=en_US\u0026docId=emr_na-c05163011",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search",
          "http://www.arubanetworks.com/",
          "http://h17007.www1.hpe.com/us/en/networking/library/#.WqnKvTaWzSd",
          "https://csrc.nist.gov/projects/cryptographic-module-validation-program",
          "https://cyber.gc.ca/en/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 54
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "532d6cbfc03256f03ae1df8528f846ecfeac7d5ca5e9e5c00ae89769d300269b",
    "policy_txt_hash": "b47b7172ae710ab61580f47cd5ba88d84bac1dddc44ae01ba763c752dd2c9f96"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. When initialized and configured as specified in Section 10 of the Security Policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf",
    "date_sunset": null,
    "description": "The Aruba 2930F, 2930M and 3810M Switch Series are designed for customers creating digital workplaces that are optimized for mobile users with an integrated wired and wireless approach. The 2930F is basic Layer 3 switch that supports 10GbE uplinks, PoE+, robust QoS, RIP Routing, Access OSPF, and IPV6, ACLs. The module delivers consistent wired/wireless user experience with unified management tools such as Aruba ClearPass Policy Manager and Aruba Airwave. The 2930M and 3810M are Layer 3 access switches that support 10GbE and 40GbE uplinks, Dual Modular Power Supplies, full PoE+, HPE Smart Rat",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 3",
      "Design Assurance: Level 2",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "WC.16.08 [1] or KB.16.08 [2]",
    "historical_reason": "SP 800-56Arev3 transition - replaced by certificate #4572",
    "hw_versions": "Aruba 2930F Switches (JL258A, JL259A, JL260A, JL261A, JL262A, JL263A, JL264A, JL557A, JL559A and JL692A) [1], Aruba 2930M Switches (JL319A, JL320A, JL321A, JL322A, JL323A, JL324A, R0M67A and R0M68A) [1] with Expansion Cards listed in Table 3 of the Security Policy, Aruba 3810M Switches (JL071A, JL072A, JL073A, JL074A, JL075A and JL076A) [2] with Expansion Cards listed in Table 4 of the Security Policy, Aruba 5400R zl2 Switches (5406R zl2 J9821A and 5412R zl2 J9822A) [2] with Management card and Interface Cards listed in Table 5 of the Security Policy",
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Aruba 2930F, 2930M, 3810M and 5400R zl2 Switch Series",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-12-10",
        "lab": "Gossamer Security Solutions",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Hewlett Packard Enterprise",
    "vendor_url": "http://www.hpe.com/networking"
  }
}