Solved

Cisco Aironet 1250 FIPS 140-2  Compliant?

Posted on 2012-04-04
3
686 Views
Last Modified: 2012-04-05
I am doing some testing on a Cisco Aironet 1250 and need to be sure it is FIPS 140-2 compliant and to what level. I see some references on the Cisco web site, but am not sure I am seeing the correct information.  Can an expert point me to a link which shows if this device is FIPS  140-2 compliant?

Product/Model Number: AIR-AP1252AG-A-K9  
 Top Assembly Serial Number: FTX1537900R  
 System Software Filename: c1250-k9w7-tar.124-10b.JDA3  
 System Software Version: 12.4(10b)JDA3  
 Bootloader Version: 12.4(18a)JA1
0
Comment
Question by:banjo1960
  • 2
3 Comments
 
LVL 15

Expert Comment

by:Nayyar HH (CCIE RS)
ID: 37806538
0
 
LVL 1

Author Comment

by:banjo1960
ID: 37806703
Thanks for the quick  response. I see 2 items on that page that reference the AP1252 but the software versions are something like 7.x,  It appears mine is 12.4.  Are these totally different operating systems?  So do you think my unit is on the list based on the versions of software?

Thanks!
0
 
LVL 15

Accepted Solution

by:
Nayyar HH (CCIE RS) earned 500 total points
ID: 37806815
I believe the link refers Light-weight APs Only - Yours is an Autonomous AP

Best to Call Cisco to confirm the Autonomous AP's aren't FIPS certified - from the list they dont look to be

Although you can convert Autonomous to Light-weight AP's (but would need a Wireless LAN Controller) again a question for Cisco - Will conversion process break certification?
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question