Module Name
FortiAnalyzer 6.2
Caveat
When operated in FIPS mode and installed, initialized and configured as specified in the FIPS 140-2 Compliant Operation Section of the Security Policy with the entropy token installed as indicated in the Security Policy. Authentication at level 3 is only applicable when identity-based authentication is enforced for the User role. No assurance of the minimum strength of generated keys
Security Level Exceptions
- Roles, Services, and Authentication: Level 3
- Design Assurance: Level 2
- Mitigation of Other Attacks: N/A
Embodiment
Multi-Chip Stand Alone
Description
The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data.
Tested Configuration(s)
- FortiAnalyzer-3500G with Intel® Xeon® Gold 5118 processor
Approved Algorithms
AES |
Certs. #A1062, #C1908 and #C2013 |
CVL |
Cert. #C2013 |
DRBG |
Cert. #C1985 |
ECDSA |
Cert. #A1062 |
HMAC |
Cert. #C2013 |
KAS |
KAS-SSC Cert. #A1062, CVL Cert. #C2013 |
KAS-SSC |
Cert. #A1062 |
KTS |
AES Cert. #C1908 and HMAC Cert. #C2013; key establishment methodology provides 128 or 256 bits of encryption strength |
KTS |
AES Cert. #C2013; key establishment methodology provides 128 or 256 bits of encryption strength |
RSA |
Certs. #A1062 and #C2013 |
SHS |
Cert. #C2013 |
Firmware Versions
FortiAnalyzer v6.2, build9599