intCertNum |
2529 |
strVendorName |
Fortinet, Inc. |
strURL |
http://www.fortinet.com |
strAddress1 |
326 Moodie Drive |
strAddress2 |
|
strAddress3 |
|
strCity |
Ottawa |
strStateProv |
ON |
strPostalCode |
K2H 8G3 |
strCountry |
K2H 8G3 |
strContact |
Alan Kaye |
strEmail |
akaye@fortinet.com |
strPhone |
613-225-9381 |
strFax |
613-225-2951 |
strContact2 |
|
strEmail2 |
|
strFax2 |
|
strPhone2 |
|
intCertNum |
2529 |
strModuleName |
FortiAnalyzer-200D |
strPartNumber |
Hardware Version: C4FA20-01AA-0000 with Tamper Evident Seal Kits: FIPS-SEAL-RED; Firmware Version: v5.2.4-build0738 150923 (GA) |
memModuleNotes |
When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy and configured according to the Entropy Token Section of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. There is no assurance of the minimum strength of generated keys |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
http://www.fortinet.com/products/index.html |
strModuleType |
Hardware |
strValidationDate |
01/11/2016 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Cryptographic Module Ports and Interfaces: Level 3;-Roles, Services, and Authentication: Level 3;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: N/A |
strFIPSAlgorithms |
AES (Cert. #3595); CVL (Cert. #617); DRBG (Cert. #930); HMAC (Cert. #2292); RSA (Cert. #1849); SHS (Cert. #2957); Triple-DES (Cert. #2002) |
strOtherAlgorithms |
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 201 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 128 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; MD5; HMAC-MD5 |
strConfiguration |
Multi-Chip Stand Alone |
memModuleDescription |
The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
01/11/16 00:00:00 |
strLabName |
CGI |
strValidationYear |
2016 |