Module Name
Mojo AirTight Sensor
Validation Dates
07/03/2018
Caveat
When operated in FIPS mode and with tamper evident seals installed as indicated in the security policy. When operated only on the specific platforms specified on the certificate.
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The module performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks.
Tested Configuration(s)
- Mojo AirTight Sensor (Hardware Versions: C-120 and C-130 with C-TPL-A) with Linux OS version 3.4.103
FIPS Algorithms
AES |
Cert. #5158 |
CKG |
vendor affirmed |
CVL |
Certs. #1672 and #1673 |
DRBG |
Cert. #1936 |
HMAC |
Cert. #3419 |
KBKDF |
Cert. #174 |
KTS |
AES Cert. #5158 and HMAC Cert. #3419; key establishment methodology provides 128 bits of encryption strength |
RSA |
Cert. #2774 |
SHS |
Cert. #4165 |
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1673, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG