Panorama Virtual Appliance 8.1

Certificate #3531

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 19.09.2019
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Physical Security: N/A
  • Design Assurance: Level 3
  • Mitigation of Other Attacks: N/A
Description Panorama Virtual Appliance 8.1 module provides centralized management and visibility of multiple Palo Alto Networks next-generation firewalls and supports distributed management and logging functions. It allows you to oversee all applications, users, and content traversing the network and then create application enablement policies that protect and control the entire network.
Tested configurations
  • KVM on CentOS 7.2 running on a Dell Power Edge R730 with Intel Xeon E5-2630 CPU
  • Microsoft Hyper-V 2012 R2 running on a Dell PowerEdge R730 with Intel Xeon E5-2640 CPU (single user mode)
  • Vmware ESXi v5.5 running on a Dell PowerEdge R730 with Intel Xeon E5-2640 CPU
  • Vmware ESXi v5.5 running on a PacStar 451 with Intel Xeon E3-1258 CPU
Vendor Palo Alto Networks
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-256, CAST, RC4, DES, Triple-DES, Blowfish, Camellia, SEED, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMAC
Asymmetric Algorithms
RSA 2048, RSA 3072, RSA 4096, ECDHE, ECDH, ECDSA, Diffie-Hellman, DHE, DH, DSA
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2, MD5, RIPEMD
Schemes
Key Exchange
Protocols
SSH, SSHv2, TLS, TLSv1.0, IKE
Randomness
DRBG, RNG
Elliptic Curves
P-256, P-384, P-521, P-224
Block cipher modes
ECB, CBC, CTR, CFB, GCM, CCM
TLS cipher suites
TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

Vendor
Microsoft

Security level
Level 1, Level 3, Level 2

Standards
FIPS 140-2, FIPS 197, FIPS 186-4, FIPS 198, FIPS 180-4, SP 800-56A, SP 800-52, RFC 5288

File metadata

Title PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series Firewalls Security Policy
Author InfoGard
Creation date D:20190722133709-07'00'
Modification date D:20190722133717-07'00'
Pages 28
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3531,
  "dgst": "335f13ccec68fcb9",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "CVL#2130",
        "KAS#2130",
        "HMAC#3882",
        "KTS#3882",
        "AES#5902",
        "KTS#5902",
        "RSA#3090",
        "CVL#2128",
        "KAS#2128",
        "SHS#4658",
        "CVL#2129",
        "CVL#2131",
        "DSA#1497",
        "DRBG#2464",
        "ECDSA#1575"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 4,
            "ECDHE": 4
          },
          "ECDSA": {
            "ECDSA": 19
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "DHE": 2,
            "Diffie-Hellman": 10
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 2048": 7,
          "RSA 3072": 1,
          "RSA 4096": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 2
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 3
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 13
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1
        },
        "SSH": {
          "SSH": 24,
          "SSHv2": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 33,
            "TLSv1.0": 4
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 2,
          "P-256": 36,
          "P-384": 30,
          "P-521": 32
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#2128": 3,
          "#2130": 2,
          "#2131": 1,
          "#4": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 256": 1,
          "AES 5902": 2,
          "AES-256": 1,
          "AES-GCM (128": 1,
          "CVL #2128": 1,
          "Cert. # AES": 1,
          "DRBG 2": 1,
          "HMAC 3882": 2,
          "HMAC SHA-256": 1,
          "HMAC- SHA-1": 1,
          "HMAC-SHA-1": 6,
          "HMAC-SHA-256": 6,
          "HMAC-SHA-384": 4,
          "HMAC-SHA-512": 2,
          "RSA 2048": 7,
          "RSA 3072": 1,
          "RSA 4096": 1,
          "SHA- 2": 1,
          "SHA-1": 5,
          "SHA-2": 2,
          "SHA-224": 3,
          "SHA-256": 5,
          "SHA-384": 4,
          "SHA-512": 5
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 3,
          "Level 2": 1,
          "Level 3": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "RIPEMD": {
          "RIPEMD": 1
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-2": 2,
            "SHA-224": 3,
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 15
        },
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 16,
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 197": 1,
          "FIPS 198": 1
        },
        "NIST": {
          "SP 800-52": 1,
          "SP 800-56A": 2
        },
        "RFC": {
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17,
            "AES-256": 1
          },
          "CAST": {
            "CAST": 1
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 8,
            "HMAC-SHA-256": 3,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 1
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 1
          },
          "Camellia": {
            "Camellia": 1
          },
          "SEED": {
            "SEED": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
          "TLS_RSA_WITH_AES_256_GCM_SHA384": 1
        }
      },
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "InfoGard",
      "/Comments": "",
      "/Company": "InfoGard Labaorties, Inc.",
      "/CreationDate": "D:20190722133709-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/Jive_LatestUserAccountName": "qtrinh",
      "/Jive_VersionGuid": "e43d67b5-e035-436e-885a-871c4472e5d9",
      "/Keywords": "",
      "/ModDate": "D:20190722133717-07\u002700\u0027",
      "/Offisync_ProviderInitializationData": "https://loop.paloaltonetworks.com",
      "/Offisync_ServerID": "a14a2c2f-da46-4240-9725-91cb14d4c581",
      "/Offisync_UniqueId": "32174",
      "/Offisync_UpdateToken": "1",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20190722203503",
      "/Subject": "",
      "/Title": "PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, and PA-5000 Series  Firewalls Security Policy",
      "pdf_file_size_bytes": 388004,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.paloaltonetworks.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "5cdc65a126737f88f0146917abe46926d9059934593640fd413c4af6c1e41f43",
    "policy_txt_hash": "7eaca0a1a84e9307dbd38cc8e0692dcbddfccf97aaafb05afba42c07637dceb4"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/SeptConsolidated.pdf",
    "date_sunset": null,
    "description": "Panorama Virtual Appliance 8.1 module provides centralized management and visibility of multiple Palo Alto Networks next-generation firewalls and supports distributed management and logging functions. It allows you to oversee all applications, users, and content traversing the network and then create application enablement policies that protect and control the entire network.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Physical Security: N/A",
      "Design Assurance: Level 3",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Panorama Virtual Appliance 8.1",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "8.1.6",
    "tested_conf": [
      "KVM on CentOS 7.2 running on a Dell Power Edge R730 with Intel Xeon E5-2630 CPU",
      "Microsoft Hyper-V 2012 R2 running on a Dell PowerEdge R730 with Intel Xeon E5-2640 CPU (single user mode)",
      "Vmware ESXi v5.5 running on a Dell PowerEdge R730 with Intel Xeon E5-2640 CPU",
      "Vmware ESXi v5.5 running on a PacStar 451 with Intel Xeon E3-1258 CPU"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2019-09-19",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Palo Alto Networks",
    "vendor_url": "http://www.paloaltonetworks.com"
  }
}