Certificate 2140 - Uplogix 430 [1, a], 3200 [2, a], 500 [3, a, b] and 5000 [4, a b]
intCertNum 2140
strVendorName Uplogix, Inc.
strURL http://www.uplogix.com
strAddress1 7600B N. Capital of Texas Hwy., Suite 220
strAddress2
strAddress3
strCity Austin
strStateProv TX
strPostalCode 78731
strCountry 78731
strContact Martta Howard
strEmail mhoward@uplogix.com
strPhone 512-857-7043
strFax
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2140
strModuleName Uplogix 430 [1, a], 3200 [2, a], 500 [3, a, b] and 5000 [4, a b]
strPartNumber Hardware Versions: 43-1102-50 [1], 37-0326-04 [2], 61-5050-33 [3] and 61-5500-33 [4] with Tamper Evident Labels Part No. (61-0001-00);
Firmware Versions: 4.6.4.22900g [a] and 4.6.4.24340g [b]
memModuleNotes When operated in FIPS mode and with the tamper evident seals installed as indicated in the Security Policy
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Hardware
strValidationDate 04/30/2014;05/20/2014
intOverallLevel 2
memIndividualLevelNotes -Roles, Services, and Authentication: Level 3;-Mitigation of Other Attacks: N/A
strFIPSAlgorithms AES (Cert. #2293);
CVL (Certs. #46, #47 and #48);
DRBG (Cert. #285);
DSA (Cert. #719);
HMAC (Cert. #1409);
RSA (Cert. #1181);
SHS (Cert. #1976);
Triple-DES (Cert. #1442)
strOtherAlgorithms AES (non-compliant);
DES;
DSA (non-compliant);
Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength;
non-compliant less than 112 bits);
HMAC (non-compliant);
HMAC-MD5-96;
HMAC-SHA-96 (non-compliant);
IKE KDF;
MD5;
PBKDF2-SHA-256;
RC4;
RNG (non-compliant);
RSA (key wrapping;
key establishment methodology provides between 112 and 150 bits of encryption strength);
SHS (non-compliant);
Triple-DES (non-compliant)
strConfiguration Multi-chip standalone
memModuleDescription Uplogix is a network independent management platform that locates with - and directly connects to - managed devices. Standing alone or augmenting existing centralized management tools, Uplogix provides configuration, performance and security management actions that are best performed locally.

Local Management reduces operational costs, speeds problem resolution, and improves security and compliance versus centralized-only management. Our local focus on network device automation enables the transition to more network sensitive cloud and virtual infrastructure technologies.
intModuleCount 1
memAdditionalNotes 05/20/14: Added FW 4.6.4.24340g and updated security policy.
strFirstValidtionDate 04/30/14 00:00:00
strLabName Leidos
strValidationYear 2014