{"product_id":3029,"v_id":3029,"product_name":"3e Technologies International 3e-010F-A-2 and 3e-010F-C-2 Crypto Client Software","certification_status":"Not Certified","certification_date":"2006-09-14T00:09:00Z","tech_type":"Wireless LAN","vendor_id":{"name":"3e Technologies International, Inc.","website":"http://www.3eti.com/"},"vendor_poc":"Joseph Horky","vendor_phone":"301.944.1282","vendor_email":"jhorky@3eti.com","assigned_lab":{"cctl_name":"CygnaCom Solutions, Inc"},"product_description":"<p>The 3e-010F-A-2 is cryptographic WLAN client comprised of either the 3e-010F-C-2 or 3e-010F-A-2 Crypto Client Software. The difference between the clients is in the drivers related to the supported hardware. The 3e-010F-C-2 supports Intel PRO/Wireless 2200BG and 2915ABG cards, and the 3e-010F-A-2 supports WLAN cards based on the Atheros AR5001X+, AR5002G and AR5002X chipsets. It is expected that the client will be a component of a larger system (e.g. the WLAN client communicating to a 3eTI Enterprise WLAN Access Point). The WLAN client software is in most cases installed into a laptop or mobile device. The Crypto Client provides standard 802.11a/b/g wireless access along with enhanced protection through a variety of cryptographic features, providing a high level of security for wireless environments. This product is intended to be used in conjunction with the FIPS 140-2 Validated&acirc;&bdquo;&cent; 3eTI 3e-525A-3 Access System includes 3e-525A-3 Hardware Version 1.0, Software Version 4.0.9.11 / 3e-030-2 Software Version 3.0 which is the subject of a separate concurrent evaluation by the same lab.</p>\r\n<p>The Crypto Client provides standard 802.11a/b/g wireless access along with enhanced protection through a variety of cryptographic features, providing a high level of security for wireless environments.</p>\r\n<p>If encryption is desired for the WLAN, different encryption can be employed depending on the mode selected. In FIPS 140-2 mode (highly secure), encryption can be set for None, Static AES, Static 3DES, Dynamic Key Exchange and WPA2 Enterprise and Personal (AES-CCMP). In non-FIPS mode, you can select None, Static AES, Static 3DES, Dynamic Key Exchange, Static WEP, WPA-Enterprise and Personal (TKIP or AES-CCMP) and WPA2-Enterprise and Personal (TKIP or AES-CCMP).</p>\r\n<p>The Configuration Utility provides an intuitive user interface to configure, manage and use various features. The administrator can configure up to 10 separate profiles. Each profile consists of various wireless configuration parameters (e.g., Security Mode (FIPS or non-FIPS mode), SSID, card type (802.11a/b/g), wireless authentication type, encryption (AES, 3DES, DKE, AES-CCMP) and related keys or certificate, power level, transmit rate, etc.).</p>\r\n<p>The user interface also provides a Site Survey tool. The FIPS 140-2 mandated Self test suite can also be invoked from the GUI. The Radio state can also be controlled.</p>\r\n<p>The following security modules have been implemented in the Crypto-Client:</p>\r\n<ul>\r\n    <li>AES (128/192/256 bit)</li>\r\n    <li>3DES (192 bit)</li>\r\n    <li>AES-CCMP</li>\r\n    <li>TKIP</li>\r\n    <li>WEP</li>\r\n    <li>802.1x/EAP-TLS for authentication</li>\r\n    <li>WPA</li>\r\n    <li>WPA2/802.11i</li>\r\n</ul>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) processes and procedures. TOE was evaluated against the criteria contained in the Common Criteria for Information Technology Security Evaluation, Version 2.3. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.3.</p>\r\n<p>CygnaCom Solutions has determined that the product meets the security criteria in the Security Target, which specifies an assurance level of Evaluation Assurance Level (EAL) 2 augmented with, ACM_SCP.1 (TOE CM Coverage), ALC_FLR.2 (Flaw Remediation), ACM_CAP.3 (Authorization Controls), and AVA_MSU.1 (Misuse &ndash; Examination of Guidance).</p>\r\n<p>A team of validators, on behalf of the CCEVS Validation Body, monitored the evaluation. The evaluation was completed in September 2006.</p>","environmental_strengths":"<p>The Crypto Client provides standard 802.11a/b/g wireless access along with enhanced protection through a variety of cryptographic features, providing a high level of security for wireless environments.</p>\r\n<!-- InstanceEndEditable -->","features":[]}