Module Name
Extreme Networks FIPS Object Module
Historical Reason
Moved to historical list due to sunsetting
Caveat
When operated in FIPS mode. No assurance of the minimum strength of generated keys.
Security Level Exceptions
- Roles, Services, and Authentication: Level 2
- Physical Security: N/A
- Design Assurance: Level 3
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The Extreme Networks FIPS Object Module is a general-purpose cryptographic module integrated into Extreme Networks’ products to provide FIPS 140-2 validated cryptography for the protection of sensitive information.
Tested Configuration(s)
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ 5420 with Broadcom BCM56274 with Embedded ARM Cortex A72 (ARMv8-A) with PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ 5420 with Broadcom BCM56274 with Embedded ARM Cortex A72 (ARMv8-A) without PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ 5520 with Broadcom BCM56376 with Embedded ARM Cortex A72 (ARMv8) with PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ 5520 with Broadcom BCM56376 with Embedded ARM Cortex A72 (ARMv8) without PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X435 with Broadcom BCM53549 with Embedded ARM Cortex A72 (ARMv7) with PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X435 with Broadcom BCM53549 with Embedded ARM Cortex A72 (ARMv7) without PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X460-G2 with Cavium Octeon II
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X465 with Intel Atom C3338 with PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X465 with Intel Atom C3338 without PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X695 with Intel Atom C3758 with PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X695 with Intel Atom C3758 without PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X870 with Intel Atom C2558 with PAA
- ExtremeXOS-Linux 4 running on ExtremeSwitching™ X870 with Intel Atom C2558 without PAA (single user mode).
Allowed Algorithms
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength)
Software Versions
2.0.16i or 2.0.16m