Cisco 5940 Embedded Services Routers

Certificate #1639

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 16.11.2011 , 23.02.2012 , 18.07.2012 , 08.02.2013
Standard FIPS 140-2
Security level 1
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode
Exceptions
  • Design Assurance: Level 2
Description The Cisco 5940 is a high-performance, ruggedized router. With onboard hardware encryption, the Cisco 5940 offloads encryption processing from the router to provide highly secure yet scalable video, voice, and data services for mobile and embedded outdoor networks. The Cisco 5940 Embedded Services Routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 1 requirements. The Cisco 5940 Router Card uses industrial-grade components and is optimized for harsh environments that require Cisco IOS Software routing technology.
Version (Hardware) Cisco 5940 ESR air-cooled card and Cisco 5940 ESR conduction-cooled card
Version (Firmware) 15.2(3)GC
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC4, DES, Triple-DES, TDES, HMAC
Asymmetric Algorithms
RSA 1024, Diffie-Hellman, DH
Hash functions
SHA-1, MD4, MD5
Schemes
MAC, Key Exchange, Key exchange
Protocols
SSH, IKE, VPN
Randomness
DRBG

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
Level 1, level 1
Side-channel analysis
SPA, malfunction

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 140, SP 800-90

File metadata

Title Microsoft Word - Cisco_Dusty_IOS_SP_submitted_CL-01182013.doc
Author wangzhi
Creation date D:20130201211912-05'00'
Modification date D:20130201211912-05'00'
Pages 20
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 8.0.0 (Windows)

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1639,
  "dgst": "5549c0d54cb3bce4",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#1535",
        "SHS#933",
        "AES#1643",
        "Triple-DES#1073",
        "HMAC#965",
        "AES#962",
        "DRBG#89",
        "SHS#1444",
        "RSA#811",
        "HMAC#537",
        "Triple-DES#757"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "15.2"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 7
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 21
        },
        "SSH": {
          "SSH": 20
        },
        "VPN": {
          "VPN": 4
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3,
          "Key exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1073": 1,
          "#1444": 1,
          "#1535": 1,
          "#1643": 1,
          "#811": 1,
          "#89": 1,
          "#965": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#537 DRBG": 1,
          "#757 SHS": 1,
          "#933 HMAC": 1,
          "AES #1643": 1,
          "DRBG #89": 1,
          "Diffie-Hellman 1024": 1,
          "HMAC #965": 2,
          "HMAC SHA-1": 1,
          "HMAC-SHA-1": 4,
          "HMAC-SHA-1 160": 2,
          "RSA #811": 1,
          "RSA 1024": 1,
          "SHA-1": 5,
          "SHS #1444": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 6,
          "level 1": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD4": {
            "MD4": 1
          },
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "SPA": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 2,
          "FIPS 140-2": 16,
          "FIPS PUB 140-2": 1
        },
        "NIST": {
          "SP 800-90": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "RC": {
            "RC4": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 6
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 23,
          "Cisco Systems": 4,
          "Cisco Systems, Inc": 20
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "wangzhi",
      "/CreationDate": "D:20130201211912-05\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20130201211912-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.0.0 (Windows)",
      "/Title": "Microsoft Word - Cisco_Dusty_IOS_SP_submitted_CL-01182013.doc",
      "pdf_file_size_bytes": 184661,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 20
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "0076925ff0bd06f04420525e51c8cc802d2d05594f024b5a91bdb1782281b421",
    "policy_txt_hash": "d459c000b8d2c808c9e086865385fd388cfcd817e81f580889734d77d5a4975e"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0011.pdf",
    "date_sunset": null,
    "description": "The Cisco 5940 is a high-performance, ruggedized router. With onboard hardware encryption, the Cisco 5940 offloads encryption processing from the router to provide highly secure yet scalable video, voice, and data services for mobile and embedded outdoor networks. The Cisco 5940 Embedded Services Routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 1 requirements. The Cisco 5940 Router Card uses industrial-grade components and is optimized for harsh environments that require Cisco IOS Software routing technology.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Design Assurance: Level 2"
    ],
    "fw_versions": "15.2(3)GC",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "Cisco 5940 ESR air-cooled card and Cisco 5940 ESR conduction-cooled card",
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Cisco 5940 Embedded Services Routers",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2011-11-16",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-02-23",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-07-18",
        "lab": "SAIC-VA",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2013-02-08",
        "lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
        "validation_type": "Update"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}