Certificate 2529 - FortiAnalyzer-200D
intCertNum 2529
strVendorName Fortinet, Inc.
strURL http://www.fortinet.com
strAddress1 326 Moodie Drive
strAddress2
strAddress3
strCity Ottawa
strStateProv ON
strPostalCode K2H 8G3
strCountry K2H 8G3
strContact Alan Kaye
strEmail akaye@fortinet.com
strPhone 613-225-9381
strFax 613-225-2951
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2529
strModuleName FortiAnalyzer-200D
strPartNumber Hardware Version: C4FA20-01AA-0000 with Tamper Evident Seal Kits: FIPS-SEAL-RED;
Firmware Version: v5.2.4-build0738 150923 (GA)
memModuleNotes When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy and configured according to the Entropy Token Section of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. There is no assurance of the minimum strength of generated keys
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL http://www.fortinet.com/products/index.html
strModuleType Hardware
strValidationDate 01/11/2016
intOverallLevel 2
memIndividualLevelNotes -Cryptographic Module Ports and Interfaces: Level 3;-Roles, Services, and Authentication: Level 3;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: N/A
strFIPSAlgorithms AES (Cert. #3595);
CVL (Cert. #617);
DRBG (Cert. #930);
HMAC (Cert. #2292);
RSA (Cert. #1849);
SHS (Cert. #2957);
Triple-DES (Cert. #2002)
strOtherAlgorithms Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 201 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
RSA (key wrapping;
key establishment methodology provides 112 or 128 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
DES;
MD5;
HMAC-MD5
strConfiguration Multi-Chip Stand Alone
memModuleDescription The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 01/11/16 00:00:00
strLabName CGI
strValidationYear 2016