Acme Packet 1100 [1] and Acme Packet 3900 [2]

Certificate #3490

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition - replaced by certificate #4532
Validation dates 15.07.2019 , 18.12.2019
Standard FIPS 140-2
Security level 1
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in the Security Policy Section 9 and operated in FIPS mode
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description The Acme Packet 1100 and Acme Packet 3900 appliances are specifically designed to meet the unique price performance and manageability requirements of the small to medium sized enterprise and remote office/ branch office. Ideal for small site border control and Session Initiation Protocol (SIP) trunking service termination applications, the Acme Packet 1100 and Acme Packet 3900 appliances delivers Oracle’s industry leading ESBC capabilities in a small form factor appliance.
Version (Hardware) 1100 [1] and 3900 [2]
Version (Firmware) S-Cz8.2.0
Vendor Oracle Communications
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, AES128, AES256, AES-128, AES-, Rijndael, DES, Triple-DES, TDEA, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, Diffie-Hellman, DH, DHE, DSA
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, MD5
Schemes
Key Exchange, Key agreement
Protocols
SSH, TLS, TLSv1.2, IKEv1, IKEv2, IKE, IPsec
Randomness
DRBG
Elliptic Curves
P-256, P-384
Block cipher modes
ECB, CBC, CTR, GCM
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

Security level
Level 1, Level 2

Standards
FIPS 140-2, FIPS 140, FIPS186-2, FIPS186-4, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 186-4, FIPS PUB 180-4, NIST SP 800-90A, SP 800-90a, SP 800-90A, NIST SP 800-135, SP 800-133, NIST SP 800-67, NIST SP 800-131A, PKCS1, PKCS#1, RFC 4251, RFC 5246, RFC 5288

File metadata

Author chris brych
Creation date D:20191206140710-05'00'
Modification date D:20191206140710-05'00'
Pages 36
Creator Microsoft® Word for Office 365
Producer Microsoft® Word for Office 365

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3490,
  "dgst": "22fefb3e2c6808a3",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#C139",
        "AES#C140",
        "SHS#C140",
        "CVL#C139",
        "ECDSA#C140",
        "KTS#C140",
        "SHS#C139",
        "HMAC#C139",
        "RSA#C140",
        "CVL#C140",
        "Triple-DES#C140",
        "DRBG#C140",
        "HMAC#C140",
        "Triple-DES#C139",
        "RSA#C139"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 8
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "DHE": 1,
            "Diffie-Hellman": 19
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CTR": {
          "CTR": 7
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 17,
          "IKEv1": 2,
          "IKEv2": 5
        },
        "IPsec": {
          "IPsec": 7
        },
        "SSH": {
          "SSH": 33
        },
        "TLS": {
          "TLS": {
            "TLS": 42,
            "TLSv1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 2,
          "P-384": 4
        }
      },
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 128": 1,
          "AES 128 and 256": 1,
          "AES- 128": 2,
          "AES- 256": 3,
          "AES-128": 17,
          "AES-256": 8,
          "AES128": 6,
          "AES256": 6,
          "DES1": 1,
          "DES2": 1,
          "HMAC-SHA-1": 16,
          "HMAC-SHA-256": 20,
          "HMAC-SHA-384": 8,
          "HMAC-SHA-512": 18,
          "HMAC-SHA1": 8,
          "PKCS#1": 4,
          "PKCS1": 2,
          "RSA 2048": 3,
          "SHA (1": 2,
          "SHA (256": 2,
          "SHA(1": 6,
          "SHA-1": 6,
          "SHA-256": 9,
          "SHA-384": 4,
          "SHA-512": 4
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4,
          "Level 2": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 6
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          },
          "SHA2": {
            "SHA-256": 9,
            "SHA-384": 4,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 20
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 2,
          "FIPS 140-2": 27,
          "FIPS PUB 140-2": 8,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 1,
          "FIPS186-2": 2,
          "FIPS186-4": 1
        },
        "NIST": {
          "NIST SP 800-131A": 1,
          "NIST SP 800-135": 11,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 2,
          "SP 800-133": 1,
          "SP 800-90A": 10,
          "SP 800-90a": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS1": 1
        },
        "RFC": {
          "RFC 4251": 1,
          "RFC 5246": 2,
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 23,
            "AES-": 5,
            "AES-128": 17,
            "AES-256": 8,
            "AES128": 6,
            "AES256": 6
          },
          "Rijndael": {
            "Rijndael": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 16
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 9,
            "HMAC-SHA-256": 10,
            "HMAC-SHA-384": 4,
            "HMAC-SHA-512": 9
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256": 1,
          "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "chris brych",
      "/CreationDate": "D:20191206140710-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20191206140710-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Office 365",
      "pdf_file_size_bytes": 700191,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.oracle.com/industries/communications/enterprise/products/session-border-controller/index.html",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30534",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=30535",
          "http://csrc.nist.gov/groups/STM/cmvp/index.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "cb84c0054f4d5735eb9ba4b71618d4c91a98321f3c42968f1fecd6050d1ebf0c",
    "policy_txt_hash": "f459a112975baf13d841ac7bc30193b2af0c66b0946fbaaca2655c652ccb0a26"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in the Security Policy Section 9 and operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/JulyConsolidated.pdf",
    "date_sunset": null,
    "description": "The Acme Packet 1100 and Acme Packet 3900 appliances are specifically designed to meet the unique price performance and manageability requirements of the small to medium sized enterprise and remote office/ branch office. Ideal for small site border control and Session Initiation Protocol (SIP) trunking service termination applications, the Acme Packet 1100 and Acme Packet 3900 appliances delivers Oracle\u2019s industry leading ESBC capabilities in a small form factor appliance.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "S-Cz8.2.0",
    "historical_reason": "SP 800-56Arev3 transition - replaced by certificate #4532",
    "hw_versions": "1100 [1] and 3900 [2]",
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Acme Packet 1100 [1] and Acme Packet 3900 [2]",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-07-15",
        "lab": "Acumen Security",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-12-18",
        "lab": "Acumen Security",
        "validation_type": "Update"
      }
    ],
    "vendor": "Oracle Communications",
    "vendor_url": "http://www.oracle.com"
  }
}