U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Cryptographic Module Validation Program CMVP

Certificate #3982

Details

Module Name
R610-F Access Point, R710 Access Point, R720 Access Point, T610 Access Point, T610s Access Point, T710 Access Point, T710s Access Point, E510 Access Point
Standard
FIPS 140-2
Status
Historical
 Historical Reason
SP 800-56Arev3 transition
Overall Level
2
Caveat
When operated in FIPS mode and installed, initialized and configured as specified in Sections 2 and 8 of the Security Policy and with the tamper evident seals installed as specified in Section 7 of the Security Policy
Security Level Exceptions
  • EMI/EMC: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Stand Alone
Description
R610 is an indoor 802.11ac Wave 2 3x3:3 Wi-Fi AP; R710 is an indoor 802.11ac Wave 2 4x4:4 Wi-Fi AP; R720 is an indoor 802.11ac Wave 2 4x4:4 Wi-Fi AP with 2.5Gbps Backhaul; T610 is an outdoor 802.11ac Wave 2 4x4:4 Wi-Fi AP; T710 is an outdoor 802.11ac Wave 2 4x4:4 Wi-Fi AP; E510 is an embedded 802.11ac Wave 2 Wi-Fi AP with external antenna
Tested Configuration(s)
  • N/A
FIPS Algorithms
AES Certs. #5312, #C708 and #C710
CKG vendor affirmed
CVL Cert. #C710
DRBG Cert. #C710
DSA Cert. #C710
ECDSA Cert. #C710
HMAC Certs. #C708 and #C710
KBKDF Cert. #C710
KTS AES Cert. #C710; key establishment methodology provides 128 or 256 bits of encryption strength
KTS AES Cert. #C710 and HMAC Cert. #C710; key establishment methodology provides 128 or 256 bits of encryption strength
KTS AES Cert. #5312; key establishment methodology provides 128 of encryption strength
RSA Cert. #C710
SHS Certs. #C708 and #C710
Allowed Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 200 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #C710, key agreement; key establishment methodology provides between 128 and 256 bits of encryption strength); NDRNG; RSA (key wrapping; key establishment methodology provides 128 bits of encryption strength)
Hardware Versions
P/Ns 9F1-R610-US00, rev A; 9F1-R710-US00, rev A; 9F1-R720-US00, rev A; 9F1-T610-US01, rev B4; 9F1-T610-US51, rev A; 9F1-T710-US01, rev A; 9F1-T710-US51, rev A; 9F1-E510-US01, rev A; XBR-000195 (Tamper-Evident Seal)
Firmware Versions
5.1.1.3

Vendor

Ruckus Wireless, Inc.
350 W Java Drive
Sunnyvale, CA 94089
USA

Jule Lu
julie.lu@commscope.com
Phone: 855-478-2587
Saurabh Mathur
Saurabh.Mathur@commscope.com
Phone: 855-478-2587

Validation History

Date Type Lab
7/15/2021 Initial UL VERIFICATION SERVICES INC