This page was not yet optimized for use on mobile
devices.
Cisco Adaptive Security Appliance Virtual Cryptographic Module
Certificate #5114
Webpage information
Security policy
Symmetric Algorithms
AES-256, AES-128, AES-192, AES, AES-, CAST, HMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSAHash functions
SHA-1Schemes
MAC, Key AgreementProtocols
SSHv2, SSH, TLS v1.2, TLSv1.2, TLS, TLS 1.2, IKEv2, IKE, VPNRandomness
DRBG, RBGElliptic Curves
P-256, P-384, P-521Block cipher modes
GCMTrusted Execution Environments
PSPVendor
Cisco Systems, Inc, CiscoSecurity level
Level 1, level 1Certification process
out of scope, from the approved mode of operation. Any firmware that is not shown on the module certificate, is out of scope of this validation and requires a separate FIPS 140-3 validation. The Crypto Officer must configureStandards
FIPS 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, SP 800-140, SP 800-38A, SP 800-38D, SP 800-90A, SP 800-56A, SP 800-135, SP 800-52, PKCS 1, RFC7627, RFC 5288, RFC 7296, RFC 4419, RFC 7919, RFC 3526, ISO/IEC 19790File metadata
| Creation date | D:20251216160016-05'00' |
|---|---|
| Modification date | D:20251216160233-05'00' |
| Pages | 68 |
| Creator | Acrobat PDFMaker 25 for Word |
| Producer | Adobe PDF Library 25.1.201 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
- cpe:2.3:h:cisco:adaptive_security_appliance_5505:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:adaptive_security_appliance_5550:-:*:*:*:*:*:*:*
References
No references are available for this certificate.
Updates Feed
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 5114,
"dgst": "251d298116e31fdd",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": []
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:cisco:adaptive_security_appliance_5550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:adaptive_security_appliance_5510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:adaptive_security_appliance_5540:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:adaptive_security_appliance_5505:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:adaptive_security_appliance_5520:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 79
},
"ECDSA": {
"ECDSA": 76
}
},
"FF": {
"DH": {
"DH": 76,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 3
}
},
"RSA": {
"RSA 2048": 3
}
},
"certification_process": {
"OutOfScope": {
"from the approved mode of operation. Any firmware that is not shown on the module certificate, is out of scope of this validation and requires a separate FIPS 140-3 validation. The Crypto Officer must configure": 1,
"out of scope": 1
}
},
"cipher_mode": {
"GCM": {
"GCM": 56
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 2,
"IKEv2": 71
},
"SSH": {
"SSH": 109,
"SSHv2": 150
},
"TLS": {
"TLS": {
"TLS": 149,
"TLS 1.2": 1,
"TLS v1.2": 6,
"TLSv1.2": 117
}
},
"VPN": {
"VPN": 4
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 6
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 54,
"P-384": 56,
"P-521": 56
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#1": 1
}
},
"fips_certlike": {
"Certlike": {
"- PKCS 1": 2,
"AES-128": 2,
"AES-192": 1,
"AES-256": 3,
"DRBG 384": 1,
"HMAC- SHA-1": 1,
"HMAC-SHA-1": 6,
"PKCS 1": 2,
"RSA 2048": 3,
"SHA-1": 6,
"SHA2- 224": 1,
"SHA2- 256": 7,
"SHA2- 384": 1,
"SHA2- 512": 4,
"SHA2-224": 1,
"SHA2-256": 4,
"SHA2-384": 4,
"SHA2-512": 5,
"SHA3- 256": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 4,
"level 1": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 80
},
"RNG": {
"RBG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 10,
"FIPS 180-4": 5,
"FIPS 186-4": 11,
"FIPS 198-1": 5,
"FIPS186-4": 23
},
"ISO": {
"ISO/IEC 19790": 2
},
"NIST": {
"SP 800-135": 4,
"SP 800-140": 1,
"SP 800-38A": 1,
"SP 800-38D": 1,
"SP 800-52": 1,
"SP 800-56A": 3,
"SP 800-90A": 1
},
"PKCS": {
"PKCS 1": 2
},
"RFC": {
"RFC 3526": 2,
"RFC 4419": 2,
"RFC 5288": 1,
"RFC 7296": 1,
"RFC 7919": 2,
"RFC7627": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 56,
"AES-": 16,
"AES-128": 2,
"AES-192": 1,
"AES-256": 3
},
"CAST": {
"CAST": 48
}
},
"constructions": {
"MAC": {
"HMAC": 53
}
}
},
"tee_name": {
"AMD": {
"PSP": 18
}
},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 7,
"Cisco Systems, Inc": 71
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20251216160016-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 25 for Word",
"/Keywords": "",
"/ModDate": "D:20251216160233-05\u002700\u0027",
"/Producer": "Adobe PDF Library 25.1.201",
"/SourceModified": "",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 678961,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "699460b5e7fa913e60b49dbd751f3151a105de835f43645b38f4d2650fde5540",
"policy_txt_hash": "54f884a9634a8538cb509293a1766eb4744639660b72e0e24bf0d49ce3f6b1d3"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section Life-Cycle Assurance of the Security Policy",
"certificate_pdf_url": null,
"date_sunset": "2030-12-18",
"description": "Cisco Virtual Adaptive Security Appliances offers the combination of the industry\u0027s most deployed stateful firewall with a comprehensive range of next-generation network security services, intrusion prevention system (IPS), content security and secure unified communications. Delivering robust user and application policy enforcement, multi-vector attack protection, and secure connectivity services in cost-effective, easy-to-deploy solutions.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Non-invasive security: N/A",
"Mitigation of other attacks: N/A"
],
"fw_versions": null,
"historical_reason": null,
"hw_versions": null,
"level": 1,
"mentioned_certs": {},
"module_name": "Cisco Adaptive Security Appliance Virtual Cryptographic Module",
"module_type": "Firmware-Hybrid",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2025-12-19",
"lab": "Gossamer Security Solutions",
"validation_type": "Initial"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}