SWRS226C February 2020 – December 2024 CC3230S , CC3230SF
PRODUCTION DATA
Table 5-1 lists the features supported across different CC3x3x devices.
| FEATURE | DEVICE | |||||
|---|---|---|---|---|---|---|
| CC3130 | CC3135 | CC3230S | CC3230SF | CC3235S | CC3235SF | |
| Classification | Network Processor | Network Processor | Wireless microcontroller | Wireless microcontroller | Wireless microcontroller | Wireless microcontroller |
| Standard | 802.11b/g/n | 802.11a/b/g/n | 802.11b/g/n | 802.11b/g/n | 802.11a/b/g/n | 802.11a/b/g/n |
| TCP/IP stack | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 |
| Sockets | 16 | 16 | 16 | 16 | 16 | 16 |
| Package | 9mm × 9mm VQFN | 9mm × 9mm VQFN | 9mm × 9mm VQFN | 9mm × 9mm VQFN | 9mm × 9mm VQFN | 9mm × 9mm VQFN |
| ON-CHIP APPLICATION MEMORY | ||||||
| Flash | — | — | — | 1MB | — | 1MB |
| RAM | — | — | 256KB | 256KB | 256KB | 256KB |
| RF FEATURES | ||||||
| Frequency | 2.4GHz | 2.4GHz, 5GHz | 2.4GHz | 2.4GHz | 2.4GHz, 5GHz | 2.4GHz, 5GHz |
| Coexistence with BLE Radio | Yes | Yes | Yes | Yes | Yes | Yes |
| SECURITY FEATURES | ||||||
| Secure boot | — | — | Yes | Yes | Yes | Yes |
| FIPS 140-2 Level 1 Certification(1) | No | Yes | No | No | Yes | Yes |
| Enhanced application level security | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming | File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
| Wi-Fi level of security | WEP, WPS, WPA / WPA2 PSK, WPA2 (802.1x), WPA3 personal and enterprise | |||||
| Additional networking security | Unique device identity Trusted root-certificate catalog TI Root-of-trust public key Online certificate status protocol (OCSP) Certificate signing request (CSR) Unique per-device key pair | |||||
| Hardware acceleration | Hardware crypto engines | |||||