Module Name
Acme Packet VME
Historical Reason
SP 800-56Arev3 transition
Caveat
When installed, initialized and configured as specified in the Security Policy Section 8 and operated in FIPS mode
Security Level Exceptions
- Roles, Services, and Authentication: Level 2
- Physical Security: N/A
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Acme Packet VME appliance are specifically designed to meet the unique price performance and manageability requirements of the small to medium sized enterprise and remote office/ branch office. Ideal for small site border control and Session Initiation Protocol (SIP) trunking service termination applications, the Acme Packet VME appliance delivers Oracle’s industry leading ESBC capabilities in a small form factor appliance.
Tested Configuration(s)
- Oracle Linux 7 on VMware ESXi 6.5 running on a Oracle Server X7-2 with Intel Xeon Gold 6140 without PAA (single-user mode)
Approved Algorithms
AES |
Certs. #C142 and #C144 |
CKG |
vendor affirmed |
CVL |
Certs. #C142 and #C144 |
DRBG |
Cert. #C144 |
ECDSA |
Cert. #C144 |
HMAC |
Certs. #C142 and #C144 |
KTS |
AES Cert. #C142 and HMAC Cert. #C142; key establishment methodology provides 128 or 256 bits of encryption strength |
KTS |
AES Cert. #C144 and HMAC Cert. #C144; key establishment methodology provides 128 or 256 bits of encryption strength |
RSA |
Certs. #C142 and #C144 |
SHS |
Certs. #C142 and #C144 |
Triple-DES |
Certs. #C142 and #C144 |
Allowed Algorithms
Diffie-Hellman (CVL Certs. #C142 and #C144, key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Certs. #C142 and #C144, key agreement; key establishment methodology provides 128 or 192 bits of encryption strength); MD5; NDRNG; RSA (key wrapping; key establishment methodology provides 112 bits of encryption strength)
Software Versions
S-Cz8.2.0 and S-Cz8.2.0p5