Cryptographic Module Validation Program CMVP

Certificate #2925

Details

Module Name
Huawei AC6605 Wireless Access Controller
Standard
FIPS 140-2
Status
Active
Sunset Date
6/18/2022
Validation Dates
06/19/2017
Overall Level
2
Caveat
When operated in FIPS mode and with the tamper-evident seals and external baffles installed as indicated in the Security Policy. The protocols IKEv1, SNMP and TLS shall not be used when operated in FIPS mode.
Security Level Exceptions
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Module Type
Hardware
Embodiment
Multi-Chip Stand Alone
Description
The Huawei Access Controller (AC) are multi-chip standalone cryptographic modules enclosed in hard, commercial grade metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to handle the configuration of wireless access-points. The modules provide network interfaces for data input and output.
Tested Configuration(s)
  • N/A
FIPS Algorithms
AES Cert. #4408
CKG vendor affirmed
CVL Cert. #1114
DRBG Cert. #1421
ECDSA Cert. #1060
HMAC Cert. #2930
SHS Cert. #3634
Triple-DES Cert. #2375
Other Algorithms
Diffe-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2930); NDRNG; AES (non-compliant); Blowfish; DES; HMAC-MD5; IKEv1 KDF (non-compliant); MD5; PBKDF2 (non-compliant); RC4; RSA (non-compliant); SM1; SM3; SM4; SNMP KDF (non-compliant); TLS KDF (non-compliant)
Hardware Versions
P/Ns AC6605-26, 99089JEB [Baffles] and 4057-113016 [Tamper-Evident Seals]
Firmware Versions
V200R007C10SPC100

Vendor

Huawei Technologies Co., Ltd.
No.328, Xinghu Street
SuZhou, JIANGSU 215000
CHINA

Yan Ze (Allen)
yangze1@huawei.com
Phone: +86 15919432118
Ji Xiang
maximus.ji@huawei.com
Phone: +8615261806635

Lab

UL VERIFICATION SERVICES INC
NVLAP Code: 100432-0