intCertNum |
1832 |
strVendorName |
Fortinet, Inc. |
strURL |
http://www.fortinet.com |
strAddress1 |
326 Moodie Drive |
strAddress2 |
|
strAddress3 |
|
strCity |
Ottawa |
strStateProv |
Ontario |
strPostalCode |
K2H 8G3 |
strCountry |
K2H 8G3 |
strContact |
Alan Kaye |
strEmail |
akaye@fortinet.com |
strPhone |
613-225-9381 |
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
1832 |
strModuleName |
FortiGate-60C [1], FortiGate-110C [2] and FortiGate-111C [3] |
strPartNumber |
Hardware Versions: C4DM93 [1], C4HA15 [2] and C4BQ31 [3] with Tamper Evident Seal Kit: FIPS-SEAL-RED [1] or FIPS-SEAL-BLUE [2,3]; Firmware Versions: FortiOS 4.0, build8892, 111128 |
memModuleNotes |
When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
11/07/2012 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Cryptographic Module Ports and Interfaces: Level 3;-Roles, Services, and Authentication: Level 3;-Design Assurance: Level 3 |
strFIPSAlgorithms |
AES (Certs. #1408, #1899, and #1900); Triple-DES (Certs. #961, #1234 and #1235); SHS (Certs. #1278, #1668 and #1669); RNG (Cert. #996); HMAC (Certs. #829, #1139 and #1140); RSA (Certs. #685 and #973) |
strOtherAlgorithms |
DES; SHA-256 (non-compliant); HMAC-SHA-256 (non-compliant); MD5; HMAC-MD5; Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 196 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The FortiGate product family spans the full range of network environments, from SOHO to service provider, offering cost effective systems for any size of application. FortiGate appliances detect and eliminate the most damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, inappropriate Web content and more in real time - without degrading network performance. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
11/07/12 00:00:00 |
strLabName |
CSC |
strValidationYear |
2012 |
|