U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)

Cryptographic Module Validation Program CMVP

Certificate #3281

Details

Module Name
Mojo Wireless Manager
Standard
FIPS 140-2
Status
Active
Sunset Date
9/4/2023
Validation Dates
09/05/2018
Overall Level
1
Caveat
When operated in FIPS mode.
Security Level Exceptions
  • Roles, Services, and Authentication: Level 2
  • Mitigation of Other Attacks: N/A
Module Type
Firmware
Embodiment
Multi-Chip Stand Alone
Description
The module transmits policy and configuration information to wireless access points, wireless intrusion protection sensors, switches and traffic gateway that are deployed on the network. It receives, stores and processes information about network performance and security from the edge devices.
Tested Configuration(s)
  • CentOS Linux 2.6.32 on VMware ESXi hypervisor 6.000 running on a MA-370
FIPS Algorithms
AES Cert. #5318
CKG vendor affirmed
CVL Certs. #1782, #1783 and #1784
DRBG Cert. #2049
ECDSA Cert. #1396
HMAC Cert. #3516
KBKDF Cert. #188
KTS AES Cert. #5318 and HMAC Cert. #3516; key establishment methodology provides 128 or 256 bits of encryption strength
RSA Cert. #2848
SHS Cert. #4270
Allowed Algorithms
Diffie-Hellman (CVL Cert. #1782, key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #1782 and #1783, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); MD5; NDRNG; RSA (CVL Certs. #1782 and #1784, key wrapping; key establishment methodology provides 112 bits of encryption strength).
Firmware Versions
MA-VM 8.2.1

Vendor

Mojo Networks, Inc.
339 N. Bernardo Avenue
Suite 200
Mountain View, CA 94043
USA

Hemant Chaskar
Hemant.chaskar@arista.com
Phone: 650-961-1111
Fax: 650-961-1169

Lab

CYGNACOM SOLUTIONS INC
NVLAP Code: 200002-0