Module Name
Huawei AC6605 Wireless Access Controller
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode and with the tamper-evident seals and external baffles installed as indicated in the Security Policy. The protocols IKEv1, SNMP and TLS shall not be used when operated in FIPS mode.
Security Level Exceptions
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Huawei Access Controller (AC) are multi-chip standalone cryptographic modules enclosed in hard, commercial grade metal cases. The cryptographic boundary for these modules is the enclosure. The primary purpose of these modules is to handle the configuration of wireless access-points. The modules provide network interfaces for data input and output.
Approved Algorithms
AES |
Cert. #4408 |
CKG |
vendor affirmed |
CVL |
Cert. #1114 |
DRBG |
Cert. #1421 |
ECDSA |
Cert. #1060 |
HMAC |
Cert. #2930 |
SHS |
Cert. #3634 |
Triple-DES |
Cert. #2375 |
Other Algorithms
Diffe-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength; non-compliant less than 112 bits of encryption strength); HMAC-SHA-1-96 (HMAC Cert. #2930); NDRNG; AES (non-compliant); Blowfish; DES; HMAC-MD5; IKEv1 KDF (non-compliant); MD5; PBKDF2 (non-compliant); RC4; RSA (non-compliant); SM1; SM3; SM4; SNMP KDF (non-compliant); TLS KDF (non-compliant)
Hardware Versions
P/Ns AC6605-26, 99089JEB [Baffles] and 4057-113016 [Tamper-Evident Seals]
Firmware Versions
V200R007C10SPC100