Module Name
Huawei AP2030, AP4030, AP4130, AP5030, AP5130, AP6050, AP6150, AP7050 and AP8130 Wireless Access Points
Validation Dates
08/14/2017
Caveat
When operated in FIPS mode and with the tamper evident seals installed as indicated in Section 5.1 of the Security Policy. The protocol TLS shall not be used when operated in FIPS mode.
Security Level Exceptions
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Huawei AP AP2030, AP4030, AP4130, AP5030, AP5130, AP6050, AP6150, AP7050 and AP8130 Wireless Access Points are multi-chip standalone cryptographic modules enclosed in hard, commercial grade plastic and metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to provide secure communication for data transmitted between different networks. The modules provide network interfaces for data input and output.
FIPS Algorithms
AES |
Cert. #4408 |
CKG |
vendor affirmed |
CVL |
Cert. #1114 |
DRBG |
Cert. #1421 |
ECDSA |
Cert. #1060 |
HMAC |
Cert. #2930 |
SHS |
Cert. #3634 |
Triple-DES |
Cert. #2375 |
Allowed Algorithms
Diffie Hellman (CVL Cert. #1114, key agreement; key establishment methodology provides 112 bits of encryption strength); NDRNG
Hardware Versions
P/Ns AP2030DN, AP4030DN, AP4130DN, AP5030DN, AP5130DN, AP6050DN, AP6150DN, AP7050DE and AP8130DN with Tamper-evident Seals 4057-113016
Firmware Versions
V200R007C10SPC100