Module Description
FortiGate-60C/110C/111C FIPS 140-2 Security Policy
01-430-157018-20111118
11
http://docs.fortinet.com/ · Feedback
The minimum password length is 8 characters when in FIPS-CC mode (maximum
password length is 32 characters). Using a strong password policy, where operator and
network user passwords are at least 8 characters in length and use a mix of alphanumeric
(printable) characters from the ASCII character set (as explained in "FIPS 140-2
Compliant Operation" on page 19), the odds of guessing a password are 1 in
8!x26x10x32x945.
For Network Users invoking the IPSec VPN encrypt/decrypt services, the module acts on
behalf of the Network User and negotiates a VPN connection with a remote module. The
strength of authentication for IPSec services is based on the authentication method
defined in the specific firewall policy: IPSec manual authentication key, IKE pre-shared
key or IKE RSA key (RSA certificate). The odds of guessing the authentication key for
each IPSec method is:
·1 in 1640 for the IPSec Manual Authentication key (based on a 40 digit, hexadecimal
key)
·1 in 948 for the IKE Pre-shared Key (based on an 8 character, ASCII printable key)
·1 in 21024 for the IKE RSA Key (based on a 1024bit RSA key size)
Therefore the minimum odds of guessing the authentication key for IPSec is 1 in 948,
based on the IKE Pre-shared key.
Physical Security
The modules meet FIPS 140-2 Security Level 2 requirements by using production grade
components and an opaque, sealed enclosure. Access to the enclosure is restricted
through the use of tamper-evident seals to secure the overall enclosure.
The seals are either blue wax/plastic with white lettering that reads "Fortinet Inc. Security
Seal" (FortiGate-110C/111C) or serialized red wax/plastic with black lettering that reads
"Fortinet Security Seal" (FortiGate-60C).
The tamper seals are not applied at the factory prior to shipping. It is the responsibility of
the Crypto Officer to apply the seals before use to ensure full FIPS 140-2 compliance. The
seals must be installed for the module to operate in a FIPS Approved mode of operation.
Once the seals have been applied, the Crypto Officer must develop an inspection
schedule to verify that the external enclosure of the module and the tamper seals have not
been damaged or tampered with in any way. The Crypto Officer is also responsible for
securing and controlling any unused seals.
The surfaces should be cleaned with rubbing alcohol to remove dirt and oil before
applying the seals. Ensure the surface is completely clean and dry before applying the
seals. If a seal needs to be re-applied, completely remove the old seal and clean the
surface with an adhesive remover before following the instructions for applying a new
seal.
Additional seals can be ordered through your Fortinet sales contact. Reference the
following SKUs when ordering: FIPS-SEAL-RED or FIPS-SEAL-BLUE. Specify the type
and number of seals required based on the specific module as described below.
The FortiGate-60C uses 2 seals to secure:
·
the external enclosure (one seal, see Figure 5)
·
the SDHC slot (one seal, see Figure 6)
The FortiGate-110C uses three seals to secure:
·
the external enclosure (two seals, see Figure 7 and Figure 8)
·
the rear cover plate (one seal, see Figure 9)