FIPS Level 1 Security Policy Version Number: 1.5 Date: February 29, 2016
|
|
- Claire Nichols
- 5 years ago
- Views:
Transcription
1 Nn-Prprietary Bx JCA Cryptgraphic Mdule 1.0 FIPS Level 1 Security Plicy Versin Number: 1.5 Date: February 29, 2016
2 Table f Cntents 1. MODULE OVERVIEW 3 2. MODES OF OPERATION APPROVED CRYPTOGRAPHIC FUNCTIONS ALL OTHER ALGORITHMS 6 3. PORTS AND INTERFACES 6 4. ROLES AND SERVICES CRYPTO-OFFICER AND USER ROLES APPROVED SERVICES 7 5. CRYPTOGRAPHIC KEYS AND CSPS 8 6. SELF-TESTS 9 2
3 3 1. Mdule Overview The Bx Java Cryptgraphy Architecture (JCA) Cryptgraphic Mdule is a Java Cryptgraphy Architecture prvider that prvides encryptin, hashing and randm number generatin utilizing FIPS apprved algrithms. The JCA is a sftware mdule that executes in a mdifiable peratinal envirnment by a general purpse cmputer. The lgical bundary f the sftware mdule includes f the fllwing cmpnents (Figure 1): bxjca_prvider.jar bx_sunjce_prvider.jar lcal_plicy.jar US_exprt_plicy.jar bxjca_prvider.hmac Figure 1: Bx JCA Cryptgraphic Mdule Blck Diagram Cryptgraphic Bundary Bx JCA Cryptgraphic Mdule Includes: bxjca_prvider.jar, bx_sunjce_prvider.jar, lcal_plicy.jar, US_exprt_plicy.jar, and bxjca_prvider.hmac Java Virtual Machine Operating System FIPS cnfrmance testing was perfrmed at Security Level 1. The cnfiguratin tested by the lab is described in Table 1. 3
4 4 Table 1: Cnfiguratin tested by the lab Sftware Cmpnent Operating System Java Run-Time Envirnment (JRE) bxjca_prvider.jar bx_sunjce_prvider.jar lcal_plicy.jar US_exprt_plicy.jar bxjca_prvider.hmac Scientific Linux 6.4 JRE JRE CPU Dell PwerEdge R610 using Intel(R) Xen(R) X5675 The Bx JCA Cryptgraphic Mdule meets FIPS Level 1 requirements as described in Table 2. Table 2: Mdule Security Level Statement FIPS Security Area Security Level Cryptgraphic Mdule Specificatin 1 Mdule Prts and Interfaces 1 Rles, Services and Authenticatin 1 Finite State Mdel 1 Physical Security Operatinal Envirnment 1 Cryptgraphic Key Management 1 EMI/EMC 1 Self-tests 1 Design Assurance 1 Mitigatin f Other Attacks 4
5 5 2. Mdes f Operatin In the FIPS apprved mde f peratin, the JCA mdule perfrms FIPS apprved security functins as listed in sectin 2.1 Apprved Cryptgraphic Functins. When the Java virtual machine begins executin, it lads the class BxPrvider f the bxjca_prvider and instantiates the prvider if the pwer-up self-tests have been passed successfully. The pwer-up self-tests are called frm the cnstructr f the class BxPrvider. 2.1 Apprved Cryptgraphic Functins The fllwing apprved cryptgraphic algrithms are used in the FIPS apprved mde f peratin. Table 3: Apprved Cryptgraphic Functins Algrithm AES ECB (128, 192, 256) AES CTR (128, 192, 256) CAVP Certificate 2666 SHS (SHA1, SHA256, SHA384 and SHA512) 2239 HMAC (HMAC-SHA1, HMAC-SHA256, HMAC- SHA384, and HMAC-SHA512) 1657 SP A HMAC_DRBG 429 5
6 6 2.2 All Other Algrithms In the nn-fips mde f peratin the mdule perfrms nn-apprved functins listed in this sectin. With the exceptin f NDRNG these functins shall nt be used in FIPS apprved mde f peratin. AES (CBC, PCBC, CTS, CFB, CFB8, CFB128, OFB, OFB8, and OFB128 mdes; nn-cmpliant) Blwfish DES Triple-DES (nn-cmpliant) RC2 Diffie-Hellman (nn-cmpliant) PBEWithMD5AndDES PBEWithMD5AndTripleDES PBEWithSHA1AndTripleDES PBEWithSHA1AndRC2_40 ARCFOUR RSA (key wrapping; nn-cmpliant) HMAC-MD5 PBKDF2WithHmacSHA1 DSA (nn-cmpliant) MD2 MD5 SHA1PRNG NDRNG 3. Prts and Interfaces The lgical interfaces t the mdule are implemented via an Applicatin Prgramming Interface (API). The fllwing table describes each lgical interface. Table 4: FIPS Lgical Interfaces Lgical Interface Data Input Data Output Cntrl Input Status Output Descriptin Input parameters that are supplied t the API cmmands Output parameters that are returned by the API cmmands API cmmands Exceptins and return status prvided by API cmmands 6
7 4. Rles and Services and rles There are tw rles the mdule supprts: rle and a rle. 4.2 Apprved Services The mdule prvides the fllwing cryptgraphic services. Table 5: Rles and Services Service AES Cipher Encrypt / Decrypt SHA hash cmputatin HMAC hash cmputatin HMAC-SHA256 DRBG Randm utput Perfrm Self-Tests Zerizatin by pwer cycling r rebting the system Shw status Installatin f the mdule Crrespnding Rles Types f Access t Cryptgraphic Keys and Critical Security Parameters (CSPs) R Read W Write r Create Z Zerize AES Key: R Nne HMAC Key: R Entrpy Input: R DRBG seed: R, W AES key: W HMAC key: W All: Z 7
8 8 The mdule prvides the fllwing APIs: Cipher.getInstance Cipher.init Cipher.dFinal MessageDigest.getInstance MessageDigest.digest Mac.getInstance bxprvider.pweronselftest Mac.init Mac.dFinal SecureRandm.getInstance SecureRandm.setSeed SecureRandm.nextBytes The user must call the mdule s APIs with apprpriate parameters t invke the mdule s services. See user guidance fr details. Nn-Apprved cryptgraphic services are implementatins f Nn-Apprved algrithms. They are listed in the Sectin Cryptgraphic Keys and CSPs The table belw describes cryptgraphic keys and CSPs used by the mdule. Table 6: Cryptgraphic keys and CSPs emplyed by the mdule Key Descriptin/Usage Origin Zerizatin AES Key HMAC Key Entrpy Input DRBG Seed Used during AES encryptin and decryptin Used during cmputatin f HMAC Used during cnstructin f the seed Used during instantiatin f the DRBG Generated using HMAC_DRBG Generated using HMAC_DRBG Generated using NDRNG Cnstructed in accrdance with SP A Zerized during pwer cycle r rebt Zerized during pwer cycle r rebt Zerized during pwer cycle r rebt Zerized during pwer cycle r rebt The keys must be generated by using SP A HMAC_DRBG. The Keys and CSPs are stred in plain text within the mdule. 8
9 9 6. Self-tests The mdule perfrms pwer-up and cnditinal self-tests that are listed in the table belw. Upn failure f a pwer-up self-test the mdule thrws an exceptin and fails t lad. Upn failure f a cnditinal self-test the mdule thrws an exceptin and returns n data t the caller. The fllwing table describes self-tests implemented by the mdule. Table 7: Self-Tests Algrithm AES encrypt AES decrypt SHA1 SHA256 SHA384 SHA512 HMAC-SHA1 HMAC-SHA256 HMAC-SHA384 HMAC-SHA512 SP800-90A HMAC_DRBG Native NDRNG Bx entrpy surce NDRNG Sftware integrity test Test Knwn Answer Test [] Cntinuus Randm Number Generatr test DRBG Health test Cntinuus Randm Number Generatr test Cntinuus Randm Number Generatr test using HMAC 9
Cisco IOS 15.5M Router Security Policy
Cisc IOS 15.5M Ruter Security Plicy Integrated Services Ruter (ISR) 891W, 1941W, 829W FIPS 140-2 Nn Prprietary Security Plicy Level 1 Validatin Versin 1.0 June 2016 Cpyright 2016 Cisc Systems, Inc. Table
More informationAssurance Activity Report
Assurance Activity Reprt VID 10783 17-3660-R-0008 V1.2 August 24, 2017 Security Target fr Mercury Systems ASURRE-Str Slid State Self-Encrypting Drives Versin 1.0 August 21, 2017 Evaluated by: UL Verificatin
More informationSymantec Corporation
Symantec Corporation Symantec PGP Cryptographic Engine FIPS 140-2 Non-proprietary Security Policy Document Version 1.0.4 Revision Date 05/01/2015 Symantec Corporation, 2015 May be reproduced only in its
More informationLEVEL 3 NON-PROPRIETARY SECURITY POLICY FOR
LEVEL 3 NON-PROPRIETARY SECURITY POLICY FOR Luna PCI-E Cryptgraphic Mdule and Luna PCI-E Cryptgraphic Mdule fr Luna SA (Used as a Standalne Device that includes cnfiguratins Clning [CL] and Key Exprt [CKE];
More informationAssurance Activities Report for
Assurance Activities Reprt fr Pal Alt Netwrks PA-200, PA-500, PA- 2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series, PA-7000 Series, VM Series, Next-Generatin Firewall with PAN-OS 7.0.1-h4 Versin
More informationPatch Management Policy
Patch Management Plicy (Versin 1) Dcument Cntrl Infrmatin: Date: 21/5/18 Master Tracking Name Patch Management Plicy Master Tracking Reference Owning Service / Department Exeter IT Issue: 1 Apprvals: Authrs:
More informationVMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module
VMware, Inc. VMware Horizon JCE (Java Cryptographic Extension) Module Software Version: 1.0 FIPS 140-2 Non-Proprietary Security Policy F I P S S E C U R I T Y L E V E L 1 D O C U M E N T V E R S I O N
More informationW76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbond TrustME Secure Element. Security Target Lite
W76S(2/4)MR(KD/DN/D1/Q1/Q3/4F) Winbnd TrustME Secure Element Security Target Lite PUBLIC Publicatin Release date: July 2017 Table f Cntents 1 SECURITY TARGET INTRODUCTION... 5 1.1 SECURITY TARGET REFERENCE...
More informationProgramming Project: Building a Web Server
Prgramming Prject: Building a Web Server Submissin Instructin: Grup prject Submit yur cde thrugh Bb by Dec. 8, 2014 11:59 PM. Yu need t generate a simple index.html page displaying all yur grup members
More informationGE Multilin 850 Feeder Protection Relay Specifications
GE Multilin 850 Feeder Prtectin Relay Specificatins Prtectin, mnitring and metering shall be supplied in ne integrated digital relay package fr applicatin t mtrs suitable fr incrpratin int an integrated
More informationAvocent Universal Management Gateway Appliance Plug-in for the Avocent DSView 4.5 Management Software Release Notes
VERTIV Avcent Universal Management Gateway Appliance Plug-in fr the Avcent DSView 4.5 Management Sftware Release Ntes VERSION 4.2.0.33, SEPTEMBER 14, 2018 Release Ntes Sectin Outline 1 System Requirements
More informationIt has hardware. It has application software.
Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne
More informationPoint-to-Point Encryption (P2PE)
Payment Card Industry (PCI) Pint-t-Pint Encryptin (P2PE) Template fr P2PE Applicatin Reprt n Validatin (Applicatin P-ROV) Applicatin P-ROV Template Fr Applicatins used with PCI P2PE Hardware/Hardware Standard
More informationSetting up the ncipher nshield HSM for use with Kerberized Certificate Authority
Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized
More informationDigital Imaging and Communications in Medicine (DICOM) Supplement 204 TLS Security Profiles
Digital Imaging and Cmmunicatins in Medicine (DICOM) Supplement 204 TLS Security Prfiles Prepared by: DICOM Standards Cmmittee, Wrking Grup 6 1300 N. 17th Street Rsslyn, Virginia 22209 USA VERSION: Public
More informationInfrastructure Series
Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing
More informationApplication Note. Digi Connect Wi-SP Troubleshooting Guide. Digi Technical Support 10 May 2016
Applicatin Nte Digi Cnnect Wi-SP Trubleshting Guide Digi Technical Supprt 10 May 2016 Cntents 1 Intrductin... 3 1.1 Assumptins... 3 1.2 Crrectins... 3 2 Quick Facts... 3 2.1 Cmmn Questins Abut the Cnnect
More informationSecusmart. Security Target
SecuSUITE Client v3.0 and Vdafne Secure Call Client v3.0 May 2017 Dcument prepared by: Dcument prepared fr: Ark Infsec Labs, Inc. www.arkinfsec.net Electrnic Warfare Assciates-Canada, Ltd. https://www.ewa-canada.cm/
More informationDS-5 Release Notes. (build 472 dated 2010/04/28 08:33:48 GMT)
DS-5 Release Ntes (build 472 dated 2010/04/28 08:33:48 GMT) Intrductin This is a trial release f Keil Develpment Studi 5 (DS-5). DS-5 cntains tls fr building and debugging C/C++ and ARM assembly language
More informationDedicated to Tanjore (Ravi) Ravishankar, His leadership, passion and devotion inspired us all
Release Ntes Specificatins fr the Java Card 3 Platfrm Versin 3.0.5, Classic Editin Nvember 2017 Table f Cntents 1. Acknwledgment 2. Overview 3. Supprted Platfrms 4. Installatin Instructins 5. Changes in
More informationCourse 10262A: Developing Windows Applications with Microsoft Visual Studio 2010 OVERVIEW
Curse 10262A: Develping Windws Applicatins with Micrsft Visual Studi 2010 OVERVIEW Abut this Curse In this curse, experienced develpers wh knw the basics f Windws Frms develpment gain mre advanced Windws
More informationCSC IT practix Recommendations
CSC IT practix Recmmendatins CSC Healthcare 17 th June 2015 Versin 3.1 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationAvePoint Discovery Tool 3.5. User Guide
AvePint Discvery Tl 3.5 User Guide Issued January 2018 Table f Cntents What s New in this Release... 3 Abut AvePint Discvery Tl... 4 Submitting Dcumentatin Feedback t AvePint... 5 Befre Yu Begin... 6 System
More informationHistory of Java. VM (Java Virtual Machine) What is JVM. What it does. 1. Brief history of Java 2. Java Version History
Histry f Java 1. Brief histry f Java 2. Java Versin Histry The histry f Java is very interesting. Java was riginally designed fr interactive televisin, but it was t advanced technlgy fr the digital cable
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationFIPS Security Policy
FIPS 140-2 Security Policy BlackBerry Cryptographic Library Version 2.0.0.10 Document Version 1.2 BlackBerry Certifications, Research In Motion This document may be freely copied and distributed provided
More informationWHITE PAPER January 2019 RASPBERRY PI 3B+ AND VMWARE PULSE 1.1. Version 0.1
WHITE PAPER January 2019 RASPBERRY PI 3B+ AND VMWARE PULSE 1.1 Versin 0.1 Table f Cntents Executive Summary... 1 Business Case... 1 Slutin Overview... 1 Intrductin... 2 Purpse... 2 Audience... 2 Slutin
More informationImplementation of Authentication Mechanism for a Virtual File System
Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract
More informationTRAUMACAD 2.5 PREREQUISITES
TRAUMACAD 2.5 PREREQUISITES Befre beginning the TraumaCad Server sftware installatin, please verify all prerequisite are installed and minimum hardware and sftware requirements are met, as described belw.
More informationCookbook Qermid Defibrillator web service Version This document is provided to you free of charge by the. ehealth platform
Ckbk Qermid Defibrillatr web service Versin 1.01 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument
More informationOracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide
Oracle Universal Recrds Management Oracle Universal Recrds Manager Adapter fr Dcumentum Installatin Guide December 2009 Universal Recrds Manager Adapter fr Dcumentum Installatin Guide, Cpyright 2009, Oracle.
More informationSecurity Policy. Jan 2012
IBM Java JCE FIPS 140-2 Cryptographic Module Security Policy IBM JAVA JCE FIPS 140-2 Cryptographic Module Revision: 1.7 Jan 2012 Status: Final 1.7 Edition (February 2012) This edition applies to the 1.7
More information2. When logging is used, which severity level indicates that a device is unusable?
CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationCMC Blade BIOS Profile Cloning
This white paper describes the detailed capabilities f the Chassis Management Cntrller s Blade BIOS Prfile Clning feature. Authr Crey Farrar This dcument is fr infrmatinal purpses nly and may cntain typgraphical
More informationSamsung FIPS BC for Mobile Phone and Tablet FIPS Security Policy
Version 1.6 Last Update: 2014-02-11 Trademarks... 3 1. Introduction... 4 1.1. Purpose of the Security Policy... 4 1.2. Target Audience... 4 2. Cryptographic Module Specification... 5 2.1. Description of
More informationSecurity Target. BlackBerry Device Software Document Version 5.0. BlackBerry Certifications Research In Motion
BlackBerry Device Sftware 5.0.0 Dcument Versin 5.0 BlackBerry Certificatins Research In Mtin 2010 Research In Mtin Limited. All rights reserved. www.blackberry.cm BlackBerry Device Sftware Dcument and
More informationProtocol Insight UFS Test Executive Key Features and Benefits Deep packet inspection performed with a unique protocol-aware Rule Checker engine
Prtcl Insight UFS Test Executive UFS20COMP Test Executive prvides cmplete prtcl debug and analysis f UFS devices, including deep packet inspectin, stress testing, custm test case executin, and CTS and
More informationFirmware Download Anybus X-gateway Modbus-TCP
Firmware Dwnlad Anybus X-gateway Mdbus-TCP Firmware Dwnlad Anybus X-gateway Mdbus-TCP HMS Industrial Netwrks AB Page 1 (5) Firmware Dwnlad Anybus X-gateway Mdbus-TCP Histry Revisin Date Descriptin Respnsible
More informationACR122S. Serial NFC Reader. Application Programming Interface V2.02. Subject to change without prior notice.
ACR122S Serial NFC Reader Applicatin Prgramming Interface V2.02 Subject t change withut prir ntice Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Applicatin Prgramming Interface Overview...
More informationCisco Tetration Analytics, Release , Release Notes
Cisc Tetratin Analytics, Release 1.102.21, Release Ntes This dcument describes the features, caveats, and limitatins fr the Cisc Tetratin Analytics sftware. Additinal prduct Release ntes are smetimes updated
More informationSatisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017
Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications International Crypto Module Conference May 19, 2017 Synopsis Background NIAP policy relating to cryptographic requirements NIAP
More informationSecure Mobile Access to the Local ICS Network. Jan Vossaert Veilige industriële netwerken 29/09/2016
Secure Mbile Access t the Lcal ICS Netwrk Jan Vssaert Veilige industriële netwerken 29/09/2016 Intrductin ffice netwrk prductin cell ruter 192.168.2.0/24 Internet ICS DMZ servers 192.168.1.0/24 prductin
More informationD e v e l o p e r s G u i d e
A D S S A u t h r i s e d R e m t e S i g n i n g ( A R S ) D e v e l p e r s G u i d e A S C E R T I A LTD S E P T E M B E R 2 0 1 8 D c u m e n t V e r s i n - 5. 9. 0. 1 Ascertia Limited. All rights
More informationAPG8201 PINhandy 1. Technical Specifications V2.00. Subject to change without prior notice.
APG8201 PINhandy 1 Technical Specificatins V2.00 Subject t change withut prir ntice Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Typical Applicatins... 6 4.0. Technical Specificatins...
More informationRelease Notes MC92N0-KK v
Release Ntes MC92N0-KK v03.13.1006 Cntents Descriptin Device Cmpatibility Cmpnent Cntents Installatin Requirements Installatin Instructins Dwnladable Sftware included in this Release Descriptin The MC9200
More informationStandardizing On A Set Of Radio Set APIs To Ensure Waveform Portability
Standardizing On A Set Of Radi Set APIs T Ensure Wavefrm Prtability Glenn Fgarty Embedded Sftware Engineer The Being Cmpany, Anaheim, CA glenn.a.fgarty@being.cm (714) 762-0137 Wavefrm Applicatin Prtability
More informationVodafone MachineLink 3G Plus Firmware release notes
Vdafne MachineLink 3G Plus Firmware release ntes Vdafne Pwer t yu Cpyright Cpyright 2014 NetCmm Wireless Limited. All rights reserved. Cpyright 2014 Vdafne Grup Plc. All rights reserved. The infrmatin
More informationACR1255U-J1 Secure Bluetooth NFC Reader
ACR1255U-J1 Secure Bluetth NFC Reader Technical Specificatins V1.09 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 1.1. Smart Card Reader... 3 1.2.
More informationSilent Circle Mobile Application Cryptographic Module
FIPS 140-2 Non-Proprietary Security Policy Silent Circle Mobile Application Cryptographic Module Software Version 1.0 Document Version 1.2 February 2, 2016 Prepared For: Prepared By: Silent Circle 174
More informationMOBILE ARMOR DATAARMOR & POLICYSERVER V3.1
MOBILE ARMOR DATAARMOR & POLICYSERVER V3.1 SECURITY TARGET VERSION: 1.72 DATE: 4/2/2010 2010 Mbile Armr, Inc. All Rights Reserved. Mbile Armr DataArmr & PlicyServer v3.1 Security Target This dcument is
More information1 Getting and Extracting the Upgrader
Hughes BGAN-X 9202 Upgrader User Guide (PC) Rev 1.0 (23-Feb-12) This dcument explains hw t use the Hughes BGAN-X Upgrader prgram fr the 9202 User Terminal using a PC. 1 Getting and Extracting the Upgrader
More informationCryptography Introduction
Cryptgraphy Intrductin Last Updated: Sep 7, 2017 Cryptgraphy Literal definitin means hidden writing Until mdern times, cryptgraphy was synnymus with encryptin, but the field has expanded This lecture reviews
More informationJuniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0. Juniper Networks, Inc.
Juniper Network Connect Cryptographic Module Version 2.0 Security Policy Document Version 1.0 Juniper Networks, Inc. September 10, 2009 Copyright Juniper Networks, Inc. 2009. May be reproduced only in
More informationCookbook ORTHOpride web service Version v1. This document is provided to you free of charge by the. ehealth platform
Ckbk ORTHOpride web service Versin v1 This dcument is prvided t yu free f charge by the ehealth platfrm Willebrekkaai 38 38, Quai de Willebrek 1000 BRUSSELS All are free t circulate this dcument with reference
More informationACR3901U-S1. Bluetooth Contact Card Reader. Technical Specifications V1.02. Subject to change without prior notice.
ACR3901U-S1 Bluetth Cntact Card Reader Technical Specificatins V1.02 Subject t change withut prir ntice Table f Cntents 1.0. Intrductin... 3 1.1. Smart Card Reader... 3 1.2. Cmpact Design... 3 1.3. Firmware
More informationACR1283L Standalone Contactless Reader
ACR1283L Standalne Cntactless Reader Technical Specificatins V1.05 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Typical Applicatins...
More informationBrocade MLXe Family Devices with Multi-Service IronWare R (NDPP11E3/VPNGEP11) Security Target
Brcade MLXe Family Devices with Multi-Service IrnWare R06.0.00 (NDPP11E3/VPNGEP11) Security Target Versin 0.8 8/24/16 Prepared fr: Brcade Cmmunicatin Systems, Inc. 130 Hlger Way San Jse, CA 95134 Prepared
More informationQuick Installation Guide
Oracle Strategic Operatinal Planning Release 3.5.1 Quick Installatin Guide Quick Installatin Guide This file cntains the fllwing sectins: Purpse... 1 System Requirements... 1 Server Cnfiguratin... 1 Client
More informationDynamic Storage (ECS)
User Guide Dynamic Strage (ECS) Swisscm (Schweiz) AG 1 / 10 Cntent 1 Abut Dynamic Strage... 3 2 Virtual drive, the EMC CIFS-ECS Tl... 4 3 Amazn S3 Brwer... 6 4 Strage Gateway Appliance... 9 5 Amazn S3
More informationCustomer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist
This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System
More informationCCNA Security v2.0 Chapter 10 Exam Answers
CCNA Security v2.0 Chapter 10 Exam Answers 1. Which statement describes the functin prvided t a netwrk administratrwh uses the Cisc Adaptive Security Device Manager (ASDM) GUI that runs as a Java Web Start
More informationCCNA Security v2.0 Chapter 2 Exam Answers
CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept
More informationDocAve 6 VM Backup & Restore
DcAve 6 VM Backup & Restre User Guide Service Pack 10 Issued February 2018 The Enterprise-Class Management Platfrm fr SharePint Gvernance Table f Cntents What s New in this Guide... 3 Abut DcAve VM Backup
More informationLaunching Xacta 360 Marketplace AMI Guide June 2017
Launching Xacta 360 Marketplace AMI Guide June 2017 Tels Crpratin 2017. All rights reserved. U.S. patents Ns. 6,901,346; 6,980,927; 6,983,221; 6,993,448; and 7,380,270. Xacta is a registered trademark
More informationCNS-220-1I: Citrix NetScaler Essentials and Traffic Management
CNS-220-1I: Citrix NetScaler Essentials and Traffic Management Overview Designed fr students with little r n previus NetScaler experience, this curse is best suited fr individuals wh will be deplying r
More informationUsing CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command
Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.
More informationFIPS Security Policy
Motorola Mobility Linux Kernel Software Cryptographic Module FIPS 140-2 Security Policy Module Version 1.0 Document version 1.13 March 11, 2015 This document may be freely copied and distributed provided
More informationFujitsu Microelectronics Europe Application Note MCU-AN E-V11 FR FAMILY 32-BIT MICROCONTROLLER MB91460 RESET APPLICATION NOTE
Fujitsu Micrelectrnics Eurpe Applicatin Nte MCU-AN-300052-E-V11 FR FAMILY 32-BIT MICROCONTROLLER MB91460 RESET APPLICATION NOTE Revisin Histry Revisin Histry Date 2007-11-02 V1.0 RSchum First draft 2008-06-24
More informationDell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy
Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its
More information1 Getting and Extracting the Upgrader
Hughes BGAN-X 9211 Upgrader User Guide (Mac) Rev 1.2 (6-Jul-17) This dcument explains hw t use the Hughes BGAN Upgrader prgram fr the 9211 User Terminal using a Mac Nte: Mac OS X Versin 10.4 r newer is
More informationFinal Report. Graphical User Interface for the European Transport Model TREMOVE. June 15 th 2010
Date June 15 th 2010 Authrs Charitn Kuridis Dr Mia Fu Dr Andrew Kelly Thmas Papagergiu Client Eurpean Cmmissin DG Climate Actin Directrate A: Internatinal & Climate Strategy Unit A4: Strategy & Ecnmic
More informationUnderstanding Active Directory Domain Services (AD DS) Functional Levels
Understanding Active Directry Dmain Services (AD DS) Functinal Levels 92 ut f 99 rated this helpful - Rate this tpic Updated: May 28, 2014 Applies T:,,, Functinal levels determine the available Active
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested
More informationImprivata FIPS Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016
Imprivata FIPS 140-2 Cryptographic Module Non-Proprietary Security Policy Version: 2.9 Date: August 10, 2016 Copyright Imprivata 2016, all rights reserved Imprivata FIPS Crypto Module 1 Table of Contents
More informationPCI Multiple I/O Host Adapter 1. Introduction
PCI Multiple I/O Hst Adapter 1. Intrductin This PCI Hst Adapter is a PCI cntrller bard which can upgrade yur desktp cmputer t have Multiple RS232 (UART) prts. This Lw Prfile Frm factr can supprt Lw prfile
More informationIT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram
More informationEMV. Terminal Type Approval Contactless Product. Administrative Process. Version 2.6 February 2017
EMV Terminal Type Apprval Cntactless Prduct Administrative Prcess Versin 2.6 February 2017 Legal Ntice Page i / v Legal Ntice This dcument summarizes EMVC s present plans fr evaluatin services and related
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationOracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1
Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1 FIPS 140-2 Non-Proprietary Security Policy Level 1 Validation Version 1.3 2014-01-08 Copyright 2014 Oracle Corporation Table
More informationUSER MANUAL. RoomWizard Administrative Console
USER MANUAL RmWizard Administrative Cnsle Cntents Welcme... 3 Administer yur RmWizards frm ne lcatin... 3 Abut This Manual... 4 Setup f the Administrative Cnsle... 4 Installatin... 4 The Cnsle Windw...
More informationFIPS Non-Proprietary Security Policy. Cotap Cryptographic Module. Software Version 1.0. Document Version 1.4.
FIPS 140-2 Non-Proprietary Security Policy Cotap Cryptographic Module Software Version 1.0 Document Version 1.4 February 22, 2016 Prepared For: Prepared By: Cotap, Inc. 55 New Montgomery St. San Francisco,
More informationEuropean Component Oriented Architecture (ECOA ) Collaboration Programme: Architecture Specification Part 3: Mechanisms
Eurpean Cmpnent Oriented Architecture (ECOA ) Cllabratin Prgramme: Architecture Specificatin Part 3: Mechanisms BAE Ref N: IAWG-ECOA-TR-007 Dassault Ref N: DGT 144482-E Issue: 5 Prepared by BAE Systems
More informationHPE LoadRunner Best Practices Series. LoadRunner Upgrade Best Practices
HPE LadRunner Best Practices Series LadRunner 12.50 Upgrade Best Practices Dcument publicatin date: Nvember 2015 Cntents 1. Intrductin... 3 Overview... 3 Audience... 3 2. Preparatin... 3 Backup assets...
More informationDell Chassis Management Controller (CMC) Version 1.35 for Dell PowerEdge VRTX. Release Notes
Dell Chassis Management Cntrller (CMC) Versin 1.35 fr Dell PwerEdge VRTX Release Ntes Release Type and Definitin The Dell Chassis Management Cntrller (CMC) Versin 1.35 fr Dell PwerEdge VRTX is a System
More informationUFS Test Executive is certified by the UFSA to verify compliance of UFS devices with the UFSA UFS Compliance Test Matrix v1.0.
Prtcl Insight UFS Test Executive UFS20COMP Test Executive prvides cmplete prtcl debug and analysis f UFS devices, including deep packet inspectin, stress testing, custm test case executin, and UFS cmpliance
More informationHewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0
Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3
More informationAPG8205 OTP Generator
APG8205 OTP Generatr Technical Specificatins V1.00 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 3.0. Typical Applicatins... 6 4.0.
More informationParallels Operations Automation 5.3
Prduct Update Parallels Operatins Autmatin 5.3 What s New Learn mre at http://www.parallels.cm/spp Nvember 2011 Table f Cntents Intrductin... 1 Tp New Features... 1 Tp Imprvements... 2 SaaS Imprvements...
More informationCONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2
Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING
More informationPHP / JAVA Summer Training Program 2012
PHP / JAVA Summer Training Prgram 2012 Curse Duratin: 45 days Pre-Requisite: Basic Knwledge f Internet Curse Fee: 10,000 ( Online Examinatin Fee, Bks, Certificatin, Tls & Sftware's Included ) Intrductin
More informationDELL PowerVault MD3200/MD3220 Series of Storage Arrays. A Dell Transition Guide Version 1.0
DELL PwerVault MD3200/MD3220 Series f Strage Arrays A Dell Transitin Guide Versin 1.0 Transitin Guide fr PwerVault MD3200 and MD3220 Series Arrays THIS TRANSITION GUIDE IS FOR INFORMATIONAL PURPOSES ONLY,
More informationIntel ICH6 I/O Controller Hub 6 R (ICH6R) Advance Host Controller Interface (AHCI)
Intel ICH6 I/O Cntrller Hub 6 (ICH6) Advance Hst Cntrller Interface (AHCI) Prgrammer s eference Manual (PM) June 2004 Dcument Number: 301444-001 INFOMATION IN THIS DOCUMENT IS POVIDED IN CONNECTION WITH
More informationVMware AirWatch SDK Plugin for Apache Cordova Instructions Add AirWatch Functionality to Enterprise Applicataions with SDK Plugins
VMware AirWatch SDK Plugin fr Apache Crdva Instructins Add AirWatch Functinality t Enterprise Applicatains with SDK Plugins v1.2 Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using
More informationGE Multilin F650 Feeder Protection Relay and Bay Controller Specifications
GE Multilin F650 Feeder Prtectin Relay and Bay Cntrller Specificatins Prtectin, mnitring and metering shall be supplied in ne integrated digital relay package fr applicatins suitable fr incrpratin int
More informationASM Educational Center (ASM) Est Authorized SCNP Security Certified Network Professional Boot Camp
ASM Educatinal Center (ASM) Est. 1992 11200 Rckville Pike, Suite 220 Rckville, MD 20852 Phne: 301-984-7400 Fax: 301-984-7401 Web: www.asmed.cm E-mail: inf@asmed.cm Authrized SCNP Security Certified Netwrk
More informationCITI Technical Report 08-1 Parallel NFS Block Layout Module for Linux
CITI Technical Reprt 08-1 Parallel NFS Blck Layut Mdule fr Linux William A. Adamsn, University f Michigan andrs@citi.umich.edu Frederic Isaman, University f Michigan iisaman@citi.umich.edu Jasn Glasgw,
More informationRSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services
Security Policy 01.02.11 RSA BSAFE Crypto-J JSAFE and JCE Software Module 5.0 Security Policy Level 1 Roles, Authentication and Services This document is a non-proprietary security policy for RSA BSAFE
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More information