Cisco 1841 Integrated Services Router with AIM-VPN/BPII-Plus and Cisco 2801 Integrated Services Router with AIM- VPN/EPII-Plus

Certificate #620

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 06.01.2006 , 28.05.2010 , 23.02.2012
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Description The Cisco 1841 and 2801 routers feature the ability to deliver multiple high-quality simultaneous services at wire speeds up to multiple T1/E1/xDSL connections. These routers offer embedded encryption acceleration on the motherboard. For additional performance, the Cisco 1841 and 2801 routers feature the ability to optionally add encryption acceleration advanced integration modules (AIMs).
Version (Hardware) 1841 and 2801; AIM-VPN/BPII-Plus Version: 1.0, Board Version: C1; AIM-VPN/EPII-Plus Version: 1.0, Board Version: D0
Version (Firmware) 12.3(11)T03
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC4, DES, 3DES, HMAC
Asymmetric Algorithms
DH, Diffie-Hellman
Hash functions
SHA-1, MD5
Schemes
Key Exchange
Protocols
SSH, SSL, IKE, PGP
Randomness
PRNG, RNG

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
Level 2
Side-channel analysis
malfunction

Standards
FIPS 140-2, RFC 1334

File metadata

Title 18aimfip.fm
Author sshorter
Creation date D:19920624090927Z
Modification date D:20060109113300-05'00'
Pages 28
Creator FrameMaker 7.0
Producer Acrobat Distiller 5.0.5 (Windows)

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 620,
  "dgst": "524148f24802f8c6",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#38",
        "AES#100",
        "AES#219",
        "Triple-DES#213",
        "SHS#300",
        "RNG#31",
        "SHS#401",
        "Triple-DES#311",
        "HMAC#29",
        "SHS#267",
        "AES#181",
        "Triple-DES#283",
        "HMAC#27"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0",
        "12.3"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 16,
            "Diffie-Hellman": 7
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 24
        },
        "PGP": {
          "PGP": 3
        },
        "SSH": {
          "SSH": 9
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "AES 13": 1,
          "HMAC- SHA-1": 4,
          "HMAC-SHA-1": 16,
          "SHA-1": 13
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 5
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 3
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 13
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 4
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 24
        },
        "RFC": {
          "RFC 1334": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 8
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 235,
          "Cisco Systems": 14,
          "Cisco Systems, Inc": 4
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "sshorter",
      "/CreationDate": "D:19920624090927Z",
      "/Creator": "FrameMaker 7.0",
      "/ModDate": "D:20060109113300-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Title": "18aimfip.fm",
      "pdf_file_size_bytes": 810943,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/en/US/products/index.html",
          "http://www.cisco.com/en/US/learning/index.html",
          "http://csrc.nist.gov/cryptval/",
          "http://ciscoiq.texterity.com/ciscoiq/sample/",
          "http://www.cisco.com/techsupport/contacts",
          "http://csrc.nist.gov/cryptval",
          "www.cisco.com",
          "http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html",
          "mailto:[email protected]",
          "http://www.cisco.com/go/iqmagazine",
          "mailto:[email protected]",
          "http://www.cisco.com/techsupport/servicerequest",
          "http://www.cisco.com",
          "http://www.cisco.com/go/marketplace/",
          "http://www.cisco.com/en/US/products/hw/routers/index.html",
          "http://www.cisco.com/discuss/networking",
          "http://tools.cisco.com/RPF/register/register.do",
          "mailto:[email protected]",
          "http://www.cisco.com/packet",
          "http://www.cisco.com/en/US/products/products_psirt_rss_feed.html",
          "http://www.cisco.com/public/countries_languages.shtml",
          "http://www.cisco.com/ipj",
          "http://www.ciscopress.com",
          "http://www.cisco.com/techsupport",
          "http://www.cisco.com/go/psirt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 28
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "df7e3ecd75f5189525147c8459b79c072252044682569e16304f7b9aa22fc293",
    "policy_txt_hash": "d57b6b484709e31f094ba01d6debae5c92fdb69b3a91f0943580dc0821f06919"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt620.pdf",
    "date_sunset": null,
    "description": "The Cisco 1841 and 2801 routers feature the ability to deliver multiple high-quality simultaneous services at wire speeds up to multiple T1/E1/xDSL connections. These routers offer embedded encryption acceleration on the motherboard. For additional performance, the Cisco 1841 and 2801 routers feature the ability to optionally add encryption acceleration advanced integration modules (AIMs).",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": "12.3(11)T03",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": "1841 and 2801; AIM-VPN/BPII-Plus Version: 1.0, Board Version: C1; AIM-VPN/EPII-Plus Version: 1.0, Board Version: D0",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Cisco 1841 Integrated Services Router with AIM-VPN/BPII-Plus and Cisco 2801 Integrated Services Router with AIM- VPN/EPII-Plus",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2006-01-06",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-05-28",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-02-23",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}