intCertNum |
2448 |
strVendorName |
Vectra Networks |
strURL |
http://www.vectranetworks.com |
strAddress1 |
550 South Winchester Blvd, |
strAddress2 |
Suite 200 |
strAddress3 |
Bin 007 |
strCity |
San Jose |
strStateProv |
CA |
strPostalCode |
95128 |
strCountry |
95128 |
strContact |
Jason Kehl |
strEmail |
jk@vectranetworks.com |
strPhone |
|
strFax |
|
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2448 |
strModuleName |
Vectra Networks Cryptographic Module |
strPartNumber |
Software Version: 1.0 |
memModuleNotes |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy. |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
http:////www.vectranetworks.com/product/ |
strModuleType |
Software |
strValidationDate |
09/17/2015;02/10/2016 |
intOverallLevel |
1 |
memIndividualLevelNotes |
-Physical Security: N/A ;-Mitigation of Other Attacks: N/A ;;;-Operational Environment: Tested as meeting Level 1 with Tested as meeting Level 1 with SUSE Linux Enterprise 11 SP2 on a Dell OptiPlex 755; CentOS 6.3 on a Dell OptiPlex 755; Red Hat Enterprise Linux 6.3 on a Dell OptiPlex 755 (single-user mode) |
strFIPSAlgorithms |
AES (Cert. #2273); CVL (Cert. #44); DRBG (Cert. #281); DSA (Cert. #709); ECDSA (Cert. #368); HMAC (Cert. #1391); RSA (Cert. #1166); SHS (Cert. #1954); Triple-DES (Cert. #1420) |
strOtherAlgorithms |
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RNG |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The Vectra Networks Cryptographic Module provides cryptographic functions for the Vectra X-Series platforms software, which delivers a new class of advanced persistent threat (APT) defense delivering real-time detection and analysis of active network breaches. |
intModuleCount |
1 |
memAdditionalNotes |
RNG moved from approved to non-approved mode, removing services that depended on the RNG. Updated SP to reflect this. |
strFirstValidtionDate |
09/17/15 00:00:00 |
strLabName |
Acumen |
strValidationYear |
2015 |