Module Name
Extreme Networks FIPS Object Module
Validation Dates
12/04/2019
Caveat
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy.
Security Level Exceptions
- Roles, Services, and Authentication: Level 2
- Physical Security: N/A
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Extreme Networks FIPS Object Module is a general-purpose cryptographic module integrated into Extreme Networks’ products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Tested Configuration(s)
- ExtremeXOS-Linux 4 running on X460-GE with Cavium Octeon II
- ExtremeXOS-Linux 4 running on X465 with Intel Atom C3338 with PAA
- ExtremeXOS-Linux 4 running on X465 with Intel Atom C3338 without PAA
- ExtremeXOS-Linux 4 running on X870 with Intel Atom C2558 with PAA (single user mode)
- ExtremeXOS-Linux 4 running on X870 with Intel Atom C2558 without PAA
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C1154 and #C1155, key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength); NDRNG; RSA (key agreement; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
2.0.16i or 2.0.16m