Cisco 3201 Wireless Mobile Interface Card with thermal plates

Certificate #975

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 30.06.2008 , 28.05.2010 , 23.02.2012
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode
Description The C3201WMIC-TPAK9 provides wireless connectivity for the Cisco 3200 Series Mobile Access Router. The module can be configured as 802.11g Wireless Access Point, 802.11g Wireless Root Bridge or 802.11g Wireless Work Group Bridge and supports the 802.11b/g wi-fi standards for communications, and 802.11i for security.
Version (Hardware) 800-25522-02
Version (Firmware) S3201W7K9-12308JK
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC4, HMAC
Hash functions
SHA-1, MD5
Randomness
PRNG, RNG

Vendor
Cisco

Security level
Level 2

Standards
FIPS 140-2

File metadata

Title Microsoft Word - 3201 WMIC SecurityPolicy.doc
Author jhsiung
Creation date D:20080623115649
Modification date D:20080623115649
Pages 9
Creator PScript5.dll Version 5.2.2
Producer GPL Ghostscript 8.15

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 975,
  "dgst": "0aa598c735f77296",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#439",
        "CCM#11",
        "SHS#797",
        "AES#799",
        "RNG#459",
        "AES#370"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "02",
        "25522",
        "800",
        "3201"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#11": 1,
          "#370": 1,
          "#439": 1,
          "#797": 1,
          "#799": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES #370": 1,
          "HMAC SHA-1": 2,
          "HMAC-SHA-1 #439": 2,
          "SHA-1": 3,
          "SHA-1 #797": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 7
        },
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "RC": {
            "RC4": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 4
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "jhsiung",
      "/CreationDate": "D:20080623115649",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20080623115649",
      "/Producer": "GPL Ghostscript 8.15",
      "/Title": "Microsoft Word - 3201 WMIC SecurityPolicy.doc",
      "pdf_file_size_bytes": 2191230,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 9
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "2c6fd0d5464439fe5c9f727cf09dbc82f667574ea9d3115bb1902cddd3e3342a",
    "policy_txt_hash": "d2b0de9a7f3b1d105066f18d7e536802a2e989798e9c23bae29c9c5337e77021"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt975.pdf",
    "date_sunset": null,
    "description": "The C3201WMIC-TPAK9 provides wireless connectivity for the Cisco 3200 Series Mobile Access Router. The module can be configured as 802.11g Wireless Access Point, 802.11g Wireless Root Bridge or 802.11g Wireless Work Group Bridge and supports the 802.11b/g wi-fi standards for communications, and 802.11i for security.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": null,
    "fw_versions": "S3201W7K9-12308JK",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": "800-25522-02",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Cisco 3201 Wireless Mobile Interface Card with thermal plates",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2008-06-30",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-05-28",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-02-23",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}