Certificate 2526 - FortiAnalyzer 5.2
intCertNum 2526
strVendorName Fortinet, Inc.
strURL http://www.fortinet.com
strAddress1 326 Moodie Drive
strAddress2
strAddress3
strCity Ottawa
strStateProv ON
strPostalCode K2H 8G3
strCountry K2H 8G3
strContact Alan Kaye
strEmail akaye@fortinet.com
strPhone 613-225-9381
strFax 613-225-2951
strContact2
strEmail2
strFax2
strPhone2
intCertNum 2526
strModuleName FortiAnalyzer 5.2
strPartNumber Firmware Version: v5.2.4-build0738 150923(GA)
memModuleNotes When operated in FIPS mode and configured according to the Entropy Token Section of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy. There is no assurance of the minimum strength of generated keys
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL http://www.fortinet.com/products/index.html
strModuleType Firmware
strValidationDate 01/05/2016
intOverallLevel 1
memIndividualLevelNotes -Cryptographic Module Ports and Interfaces: Level 3;-Roles, Services, and Authentication: Level 3;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: FortiAnalyzer-200D with the Fortinet entropy token (part number FTR-ENT-1)
strFIPSAlgorithms AES (Cert. #3595);
CVL (Cert. #617);
DRBG (Cert. #930);
HMAC (Cert. #2292);
RSA (Cert. #1849);
SHS (Cert. #2957);
Triple-DES (Cert. #2002)
strOtherAlgorithms Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 201 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
RSA (key wrapping;
key establishment methodology provides 112 or 128 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
DES;
MD5;
HMAC-MD5
strConfiguration Multi-Chip Stand Alone
memModuleDescription The FortiAnalyzer family of logging, analyzing, and reporting appliances securely aggregate log data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of customizable reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data.
intModuleCount 1
memAdditionalNotes
strFirstValidtionDate 01/05/16 00:00:00
strLabName CGI
strValidationYear 2016