Module Name
FortiGate-1000C, FortiGate-1240B, FortiGate-3140B and FortiGate-3240C
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy and configured according to the Entropy Token Section of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. There is no assurance of the minimum strength of generated keys
Security Level Exceptions
- Cryptographic Module Ports and Interfaces: Level 3
- Roles, Services, and Authentication: Level 3
- Design Assurance: Level 3
Embodiment
Multi-chip standalone
Description
The FortiGate product family spans the full range of network environments, from SOHO to service provider, offering cost effective systems for any size of application. FortiGate appliances detect and eliminate the most damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, inappropriate Web content and more in real time - without degrading network performance.
Approved Algorithms
AES |
Certs. #3167, #3168, #3169 and #3171 |
CVL |
Certs. #415 and #416 |
DRBG |
Cert. #652 |
HMAC |
Certs. #1995, #1996, #1997 and #1999 |
RSA |
Certs. #1605, #1606, and #1607 |
SHS |
Certs. #2620, #2621, #2622 and #2624 |
Triple-DES |
Certs. #1805, #1806, #1807 and #1808 |
Other Algorithms
Diffie-Hellman (key agreement; key establishment methodology provides between 112 and 201 bits of encryption strength; non-compliant less than 112 bits of encryption strength); RSA (key wrapping; key establishment methodology provides 112 or 132 bits of encryption strength; non-compliant less than 112 bits of encryption strength); DES; MD5; HMAC-MD5; NDRNG
Hardware Versions
C4HR40 [1], C4CN43 [2], C4XC55 [3] and C4KC75 [4] with Tamper Evident Seal Kits: FIPS-SEAL-RED [1,3,4] or FIPS-SEAL-BLUE [2]
Firmware Versions
FortiOS 5.0, build0305,141216