intCertNum |
2344 |
strVendorName |
Dell, Inc. |
strURL |
http://www.dell.com |
strAddress1 |
One Dell Way |
strAddress2 |
|
strAddress3 |
|
strCity |
Round Rock |
strStateProv |
TX |
strPostalCode |
78682 |
strCountry |
78682 |
strContact |
Dell Networking Team |
strEmail |
OEM_Network_Engineering@Dell.com |
strPhone |
|
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2344 |
strModuleName |
Dell W-620 and W-650 Mobility Controllers with Dell AOS FIPS Firmware |
strPartNumber |
Hardware Versions: W-620-F1, W-620-USF1, W-650-F1 and W-650-USF1 with Aruba FIPS kit 4010061-01; Firmware Version: ArubaOS 6.3.1.7-FIPS |
memModuleNotes |
When operated in FIPS mode with tamper evident labels installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
04/08/2015 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Mitigation of Other Attacks: N/A |
strFIPSAlgorithms |
AES (Certs. #779, #2677 and #2680); CVL (Certs. #150 and #152); DRBG (Cert. #433); ECDSA (Certs. #466 and #469); HMAC (Certs. #426, #1663 and #1666); KBKDF (Cert. #16); RNG (Cert. #1250); RSA (Certs. #1376, #1379 and #1380); SHS (Certs. #781, #2246, #2249 and #2250); Triple-DES (Certs. #673, #1605 and #1607) |
strOtherAlgorithms |
DES; Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides 128 or 192 bits of encryption strength); HMAC-MD5; MD5; NDRNG; RC4; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength) |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
Dell W-Series family of Mobility Controllers are network infrastructure devices providing secure, scalable solutions for enterprise Wi-Fi, network security policy enforcement, VPN services, and wireless intrusion detection and prevention. Mobility controllers serve as central points of authentication, encryption, access control, and network coordination for all mobile network services. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
04/08/15 00:00:00 |
strLabName |
Leidos |
strValidationYear |
2015 |