Module Name
Security Management
Historical Reason
Moved to historical list in accordance with SP800-131A Revision 1 Transition (AES/TDES key wrapping)
Caveat
When operated in FIPS mode
Security Level Exceptions
- Roles, Services, and Authentication: Level 2
- Design Assurance: Level 3
- Tested: Check Point Smart-1 50 with Check Point SecurePlatform Operating System Version R7x
Embodiment
Multi-chip standalone
Description
Check Point Security Management technology provides security management. Businesses of all sizes can easily create domains based on geography, business unit or security function to strengthen security and simplify management.
Other Algorithms
CAST 40; CAST 128; HMAC-MD5; MD5; DES; AES-CMAC (non-compliant); RSA (key wrapping; key establishment methodology provides 112 or 150 bits of encryption strength); Triple-DES (Cert. #1186, key wrapping; key establishment methodology provides 112 bits of encryption strength); AES (Cert. #1835, key wrapping)
Firmware Versions
R71 with R7x hotfix