U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #2994

Details

Module Name
Huawei AP2030, AP4030, AP4130, AP5030, AP5130, AP6050, AP6150, AP7050 and AP8130 Wireless Access Points
Standard
FIPS 140-2
Status
Active
Sunset Date
8/13/2022
Validation Dates
08/14/2017
Overall Level
2
Caveat
When operated in FIPS mode and with the tamper evident seals installed as indicated in Section 5.1 of the Security Policy. The protocol TLS shall not be used when operated in FIPS mode.
Security Level Exceptions
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Stand Alone
Description
The Huawei AP AP2030, AP4030, AP4130, AP5030, AP5130, AP6050, AP6150, AP7050 and AP8130 Wireless Access Points are multi-chip standalone cryptographic modules enclosed in hard, commercial grade plastic and metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to provide secure communication for data transmitted between different networks. The modules provide network interfaces for data input and output.
Tested Configuration(s)
  • N/A
FIPS Algorithms
AES Cert. #4408
CKG vendor affirmed
CVL Cert. #1114
DRBG Cert. #1421
ECDSA Cert. #1060
HMAC Cert. #2930
SHS Cert. #3634
Triple-DES Cert. #2375
Allowed Algorithms
Diffie Hellman (CVL Cert. #1114, key agreement; key establishment methodology provides 112 bits of encryption strength); NDRNG
Hardware Versions
P/Ns AP2030DN, AP4030DN, AP4130DN, AP5030DN, AP5130DN, AP6050DN, AP6150DN, AP7050DE and AP8130DN with Tamper-evident Seals 4057-113016
Firmware Versions
V200R007C10SPC100

Vendor

Huawei Technologies Co., Ltd.
No. 328, Xinghu Street
Suzhou, JIANGSU 215000
CHINA

Yang Ze
yangze1@huawei.com
Phone: +86 15919432118
Ji Xiang
maximus.ji@huawei.com
Phone: +86 15261806635

Lab

UL VERIFICATION SERVICES INC
NVLAP Code: 100432-0