intCertNum |
1448 |
strVendorName |
Cisco Systems, Inc. |
strURL |
http://www.cisco.com |
strAddress1 |
170 West Tasman Drive |
strAddress2 |
|
strAddress3 |
|
strCity |
San Jose |
strStateProv |
CA |
strPostalCode |
95134 |
strCountry |
95134 |
strContact |
Global Certification Team |
strEmail |
certteam@cisco.com |
strPhone |
|
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
1448 |
strModuleName |
Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e and CAP3502i Wireless LAN Access Points |
strPartNumber |
Hardware Versions: AP1131 Revision S0, AP1142 Revision G0, AP1242 Revision P0, AP1252 Revision F0, AP1262 Revision B0, CAP3502e Revision B0 and CAP3502i Revision B0; FIPS Kit AIRLAP-FIPSKIT=, Version B0; Firmware Versions: 7.0.98.0, 7.0.98.213, 7.0.116.0, 7.0.230.0, 7.0.240.0, 7.0.250.0, 7.2.103.0, 7.2.115.1, 7.2.115.2 or 7.0.251.2 |
memModuleNotes |
When operated in FIPS mode and with the tamper evident seals and security devices installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf][txt] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
11/15/2010;02/24/2011;05/12/2011;08/22/2011;02/23/2012;05/10/2012;03/28/2013;05/03/2013;05/16/2013;07/12/2013;02/20/2014;02/20/2015 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Design Assurance: Level 3 |
strFIPSAlgorithms |
AES (Certs. #1352, #1353, #1354, #1355, #1356, #1357, #1358, #1359, #1360 and #1361); HMAC (Certs. #791, #792, #793, #794, #795, #796 and #797); RNG (Certs. #744, #745, #746 and #747); RSA (Certs. #658, #659, #660 and #661); SHS (Certs. #1235, #1236, #1237, #1238, #1239, #1240 and #1241) |
strOtherAlgorithms |
RSA (key wrapping; key establishment methodology provides 96 bits of encryption strength; non-compliant); RC4; MD5; HMAC MD5 |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The Cisco Aironet Lightweight 3502i, 3502e, 1262, 1142, 1131, 1252, and 1242 access points deliver the versatility, high capacity and enterprise class security required for small, medium and large Government indoor and outdoor wireless deployments. In FIPS 140-2 mode of operation, the Cisco APs support the IEEE 802.11a/g/n, 802.11i & 802.1x standards, IETF CAPWAP standard and are Wi-Fi Alliance certified for WPA2 security. |
intModuleCount |
1 |
memAdditionalNotes |
02/24/11: Added FW 7.0.98.213 and updated Security Policy. 05/12/11: Added FW 7.0.116.0 and updated Security Policy. 08/22/2011: Updated POC Information. 02/23/12: Updated security policy. 05/10/12: Added FW 7.0.230.0 and 7.2.103.0, updated security policy. 03/28/13: Added FW 7.0.240.0 and updated security policy. 05/03/13: Added FW 7.2.115.0 and updated security policy. 05/16/13: changed FW 7.2.115.0 to corrected 7.2.115.1 07/12/13: Added FW 7.2.115.2 and updated security policy. 02/20/14: Added FW 7.0.250.0 and updated security policy. 02/20/15: Added FW 7.0.251.02 and updated security policy. |
strFirstValidtionDate |
11/15/10 00:00:00 |
strLabName |
InfoGard |
strValidationYear |
2010 |
|