NIST-accredited security for Vision ONE and Vision 7300 Network Packet Brokers

The Ixia Vision ONE and Vision 7303 Network Packet Broker (NPB) products are FIPS 140-2 validated. Now government agencies, military and other security conscious organizations can be assured that these NPB solutions meet the highest standards of security integrity.

Related Products: 

Vision 7300/7303

Vision ONE

FIPS 140-2 Validated

What is FIPS 140-2?

FIPS 140-2, also known as Federal Information Processing Standards Publication (FIPS PUB 140-2), is a NIST (National Institute of Standards and Technology) standard outlining security requirements for cryptographic solutions and modules. Corsec Security, the global leader in product security requirements hardening, assisted Ixia with FIPS 140-2 validation. For more on Corsec and how to achieve product certifications, visit www.corsec.com.

NIST logo

The FIPS 140-2 program ensures that all cryptographic keys and algorithms conform to strict NIST guidelines. There are four levels of FIPS 140-2 security, Level 1-Level 4.

  • Level 1
  • Level 2
  • Level 3
  • Level 4
  • The first and most fundamental level of FIPS 140-2 security, Level 1 specifies the inclusion of at least one approved algorithm or security function. At this level, physical security for the device itself beyond normal production hardware is not required. One example of Level 1 security is an encryption board running on a PC.

  • FIPS 140-2 Level 2 extends and enhances Level 1 by adding the requirement for tamper resistance, including pick resistant locks, covers and doors as well as tamper evident coatings or seals preventing physical access.

  • Like lower levels, Level 3 extends and enhances the security of lower levels by adding physical security mechanisms that include tamper detection and response mechanisms that can zero out or wipe critical security parameters within a device.

  • FIPS 140-2 Level 4 requires that the cryptographic module in question be protected from compromise by physical security mechanisms likely to detect tampering and reply to such attempts by wiping all plaintext critical security parameters. The module should also protect against environmental attacks including attempts to compromise via voltage and/or temperature outside the normal operating range.