cert_id |
4630 |
3735 |
dgst |
2de9b960babeff3d |
cf6f8c91b5f482ba |
heuristics/algorithms |
KTS#A2690, AES#A2689, KAS#A2690, CVL#A2689, KAS-SSC#A2690, SHS#A2690, KDA#A2690, DSA#A2689, SHS#A2688, RSA#A2689, HMAC#A2690, RSA#A2690, RSA#A2688, SHS#A2689, HMAC#A2689, KAS-SSC#A2689, ECDSA#A2689, DSA#A2690, ECDSA#A2690, CVL#A2690, AES#A2690, KBKDF#A2690, DRBG#A2690 |
KTS#C414, DRBG#C413, ECDSA#C414, HMAC#C413, SHS#C1972, RSA#C414, HMAC#C414, SHS#C413, AES#C413, RSA#C413, CVL#C1974, CVL#C1972, CVL#C414, HMAC#C1974, CVL#C413, ECDSA#C413, SHS#C1974, KBKDF#C413, RSA#C818, SHS#C414, HMAC#C1972, SHS#C818, AES#C414 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
8.10.0.2 |
8.6.0.4, 8.5.0.3, 8.2.2.5 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
- Level:
- Level 1: 49
- level 1: 2
- level 2: 1
|
- Level:
- Level 1: 49
- level 1: 2
- level 2: 1
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES CTR 256: 1
- AES-CBC5: 1
- AES-CBC7: 1
- AES-GCM4: 1
- AES-GCM6: 1
- Certificate RSA: 1
- DRBG1: 1
- HMAC (384: 1
- HMAC SHA-1: 1
- HMAC- SHA-256: 3
- HMAC- SHA-512: 1
- HMAC- SHA1-96: 1
- HMAC- SHA256: 1
- HMAC- SHA384: 1
- HMAC-SHA- 384: 6
- HMAC-SHA-1: 11
- HMAC-SHA-1 (160: 1
- HMAC-SHA-256: 8
- HMAC-SHA-384: 2
- HMAC-SHA-512: 6
- HMAC-SHA-512 128: 2
- HMAC-SHA-5128: 2
- HMAC-SHA1: 8
- PKCS#1: 2
- PKCS1: 8
- RSA 2048: 4
- RSA PKCS#1: 2
- SHA- 1: 1
- SHA- 384: 4
- SHA-1: 17
- SHA-12: 1
- SHA-13: 1
- SHA-256: 18
- SHA-384: 3
- SHA-512: 6
- SHA1-96: 1
- SHA2-256: 13
- SHA2-384: 7
- SHA2-512: 7
- SHA256: 1
- SHA384: 1
|
- Certlike:
- AES CTR 256: 1
- AES-CBC2: 1
- AES-CBC4: 1
- AES-GCM1: 1
- AES-GCM3: 1
- Certificate RSA: 1
- HMAC (384: 1
- HMAC SHA-1: 1
- HMAC- SHA-256: 3
- HMAC- SHA-512: 1
- HMAC- SHA1-96: 1
- HMAC- SHA256: 1
- HMAC- SHA384: 1
- HMAC-SHA- 128: 2
- HMAC-SHA- 384: 4
- HMAC-SHA-1: 9
- HMAC-SHA-1 (160: 1
- HMAC-SHA-256: 6
- HMAC-SHA-512: 4
- HMAC-SHA-512 128: 2
- HMAC-SHA-5125: 2
- HMAC-SHA1: 12
- HMAC-SHA256: 4
- HMAC-SHA384: 4
- HMAC-SHA512: 4
- PKCS#1: 2
- PKCS1: 8
- RSA 2048: 4
- RSA PKCS#1: 2
- SHA- 1: 1
- SHA- 384: 6
- SHA-1: 15
- SHA-1 160: 2
- SHA-256: 19
- SHA-384: 2
- SHA-512: 5
- SHA1: 2
- SHA1-96: 1
- SHA2-256: 1
- SHA256: 3
- SHA384: 3
- SHA512: 2
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 9
- HMAC-SHA-256: 4
- HMAC-SHA-384: 1
- HMAC-SHA-512: 4
|
- AES_competition:
- DES:
- constructions:
- MAC:
- HMAC: 10
- HMAC-SHA-256: 3
- HMAC-SHA-512: 3
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 18
- SHA-384: 3
- SHA-512: 6
- SHA256: 1
- SHA384: 1
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 19
- SHA-384: 2
- SHA-512: 5
- SHA256: 3
- SHA384: 3
- SHA512: 2
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
- IKE:
- IKE: 18
- IKEv1: 15
- IKEv2: 17
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 41
- TLSv1.0: 1
- TLSv1.2: 1
- VPN:
|
- IKE:
- IKE: 18
- IKEv1: 14
- IKEv2: 17
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 41
- TLSv1.0: 1
- TLSv1.2: 1
- VPN:
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 66
- FIPS 180-4: 3
- FIPS 186-2: 1
- FIPS 186-4: 5
- FIPS 197: 3
- FIPS 198-1: 2
- NIST:
- SP 800-108: 1
- SP 800-133: 2
- SP 800-135: 2
- SP 800-38A: 2
- SP 800-38D: 1
- SP 800-38F: 4
- SP 800-52: 1
- SP 800-56A: 9
- SP 800-56C: 3
- SP 800-67: 2
- SP 800-90A: 2
- PKCS:
- RFC:
- X509:
|
- FIPS:
- FIPS 140-2: 66
- FIPS 180-4: 5
- FIPS 186-2: 2
- FIPS 186-4: 3
- FIPS 197: 3
- FIPS 198-1: 4
- NIST:
- SP 800-108: 1
- SP 800-133: 1
- SP 800-38A: 3
- SP 800-38D: 1
- SP 800-38F: 4
- SP 800-52: 1
- SP 800-67: 2
- SP 800-90A: 1
- PKCS:
- RFC:
- X509:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
- /Author: tsengjk
- /CreationDate: D:20201020093707-04'00'
- /Creator: Nuance PDF Create
- /ModDate: D:20201020093716-04'00'
- /Producer: Nuance PDF Create
- /Title: Microsoft Word - VMC_Security_Policy.doc
- pdf_file_size_bytes: 366376
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 8 of the Security Policy |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 8 of the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2023_011123_0711.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2020_021120_0702_signed.pdf |
web_data/date_sunset |
26.10.2025 |
|
web_data/description |
Aruba's family of Mobility Controllers are network infrastructure devices providing secure, scalable solutions for enterprise Wi-Fi, network security policy enforcement, VPN services, and wireless intrusion detection and prevention. Mobility controllers serve as central points of authentication, encryption, access control, and network coordination for all mobile network services. |
Aruba's family of Mobility Controllers are network infrastructure devices providing secure, scalable solutions for enterprise Wi-Fi, network security policy enforcement, VPN services, and wireless intrusion detection and prevention. Mobility controllers serve as central points of authentication, encryption, access control, and network coordination for all mobile network services. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 2, Mitigation of Other Attacks: N/A |
Roles, Services, and Authentication: Level 2, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
A, r, u, b, a, O, S, , 8, ., 1, 0, ., 0, ., 2, -, F, I, P, S, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |
A, r, u, b, a, O, S, , 8, ., 2, ., 2, ., 5, -, F, I, P, S, ,, , A, r, u, b, a, O, S, , 8, ., 5, ., 0, ., 3, -, F, I, P, S, , a, n, d, , A, r, u, b, a, O, S, , 8, ., 6, ., 0, ., 4, -, F, I, P, S |
web_data/historical_reason |
|
SP 800-56Arev3 transition - replaced by certificate #4630 |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Aruba Mobility Controller Virtual Appliances with ArubaOS FIPS Firmware |
Aruba Mobility Controller Virtual Appliances with ArubaOS FIPS Firmware |
web_data/module_type |
Firmware |
Firmware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
active |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
ArubaOS 8.10.0.2-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver with PAA, ArubaOS 8.10.0.2-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver without PAA, , , , |
ArubaOS 8.2.2.5-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver with PAA, ArubaOS 8.2.2.5-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver without PAA, ArubaOS 8.5.0.3-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver with PAA, ArubaOS 8.5.0.3-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver without PAA, ArubaOS 8.6.0.4-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver with PAA, ArubaOS 8.6.0.4-FIPS on ESXi 6.5 running on an HPE ProLiant ML110 Gen10 with an Intel Xeon Silver without PAA |
web_data/validation_history |
- date: 05.10.2023
- lab: LEIDOS CSTL
- validation_type: Initial
|
- date: 27.10.2020
- lab: LEIDOS CSTL
- validation_type: Initial
|
web_data/vendor |
Aruba, a Hewlett Packard Enterprise company |
Aruba, a Hewlett Packard Enterprise company |
web_data/vendor_url |
http://www.arubanetworks.com |
http://www.arubanetworks.com |