Mojo AirTight Sensor
SP 800-56Arev3 transition
When operated in FIPS mode and with tamper evident seals installed as indicated in the security policy. When operated only on the specific platforms specified on the certificate.
Security Level Exceptions
- Mitigation of Other Attacks: N/A
Multi-Chip Stand Alone
The module performs wireless intrusion detection and prevention. It monitors radio channels to ensure conformance of wireless activity to security policy. It mitigates various types of wireless security violations such as rogue wireless networks, unauthorized wireless connections, network mis-configurations and denial of service attacks.
- Mojo AirTight Sensor (Hardware Versions: C-120 and C-130 with C-TPL-A) with Linux OS version 3.4.103
||Certs. #1672 and #1673
||AES Cert. #5158 and HMAC Cert. #3419; key establishment methodology provides 128 bits of encryption strength
Diffie-Hellman (key agreement; key establishment methodology provides 112 bits of encryption strength); EC Diffie-Hellman (CVL Cert. #1673, key agreement; key establishment methodology provides 128 bits of encryption strength); MD5; NDRNG