Module Name
Acme Packet 4600 [1] and Acme Packet 6300 [2] and Acme Packet 6350 [3]
Historical Reason
SP 800-56Arev3 transition
Caveat
When installed, initialized and configured as specified in the Security Policy Section 9 and operated in FIPS mode
Security Level Exceptions
- Roles, Services, and Authentication: Level 2
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Acme Packet 4600, 6300 and 6350 appliances is specifically designed to meet the unique price performance and manageability requirements of the small to medium sized enterprise and remote office/ branch office. Ideal for small site border control and Session Initiation Protocol (SIP) trunking service termination applications, the Acme Packet 4600, 6300 and 6350 appliances delivers Oracle’s industry leading ESBC capabilities in a small form factor appliance.
Approved Algorithms
AES |
Certs. #C141, #C143, #5256 and #5257 |
CKG |
vendor affirmed |
CKG |
vendor affirmed |
CVL |
Certs. #C141, #C143, #1727 and #1728 |
DRBG |
Cert. #C143 |
ECDSA |
Cert. #C143 |
HMAC |
Certs. #C141 and #C143 |
KTS |
AES Cert. #C143 and HMAC Cert. #C143; key establishment methodology provides 128 or 256 bits of encryption strength |
KTS |
AES Cert. #C141 and HMAC Cert. #C141; key establishment methodology provides 128 or 256 bits of encryption strength |
RSA |
Certs. #C141 and #C143 |
SHS |
Certs. #C141 and #C143 |
Triple-DES |
Certs. #C141, #C143 and #2659 |
Allowed Algorithms
Diffie-Hellman (CVL Certs. #C141, #C143 and #1727, key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C141, #C143 and #1727, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Hardware Versions
4600 [1], 6300 [2] and 6350 [3]
Firmware Versions
S-Cz8.2.0