VSU-100/VSU-100R and VSU-2000

Certificate #158

Webpage information

Status historical
Historical reason Validation Sunsetting Policy - FIPS 140-1 Certificate
Validation dates 27.07.2001 , 02.08.2002
Standard FIPS 140-1
Security level 2
Type Hardware
Embodiment Multi-Chip Embedded
Caveat When operated in FIPS mode
Exceptions
  • EMI/EMC: Level 3
Description The VSU™ series of VPN gateways provide high performance ICSA certified IPSec VPN and firewall services for networks of all sizes and complexity. All VSU models are tamper evident network security appliances that cost effectively provide secure authenticated communications over public IP networks, and protect private enterprise networks from attack or intrusion.
Version (Hardware) 02
Vendor Avaya, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
RC5, DES, TDES, 3DES, HMAC
Asymmetric Algorithms
Diffie-Hellman
Hash functions
SHA1, SHA-1, MD5
Schemes
Key Exchange
Protocols
TLS, IKE, VPN
Block cipher modes
CBC

Security level
Level 2, Level 3

Standards
FIPS 140-1, RFC 2409

File metadata

Title 1.0_1-2.doc
Author Catherine
Creation date D:20010710172536
Modification date D:20010723101422-04'00'
Pages 17
Creator Microsoft Word
Producer Acrobat PDFWriter 4.05 for Windows

References

Incoming
  • 1066 - historical - Nortel VPN Router 600, 1750, 2700, 2750 and 5000
  • 1068 - historical - VPN Router 1750, 2700, 2750 and 5000 with Hardware Accelerator

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 158,
  "dgst": "7ed8f0f3b707956d",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "SHA-1#52",
        "SHA-1#28",
        "Triple-DES#60",
        "Triple-DES#61"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:avaya:vsu_2000:-:*:*:*:*:*:*:*",
        "cpe:2.3:a:avaya:vsu_100:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "02",
        "2000",
        "100"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1068",
          "1066"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1068",
          "1066"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 5
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 23
        },
        "TLS": {
          "TLS": {
            "TLS": 12
          }
        },
        "VPN": {
          "VPN": 13
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {},
      "fips_certlike": {
        "Certlike": {
          "HMAC SHA-1": 1,
          "SHA-1": 7,
          "SHA-1 7": 1,
          "SHA1": 6
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 11,
          "Level 3": 1
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 8,
            "SHA1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-1": 5
        },
        "RFC": {
          "RFC 2409": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "RC": {
            "RC5": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 4
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Catherine",
      "/CreationDate": "D:20010710172536",
      "/Creator": "Microsoft Word ",
      "/ModDate": "D:20010723101422-04\u002700\u0027",
      "/Producer": "Acrobat PDFWriter 4.05 for Windows",
      "/Title": "1.0_1-2.doc",
      "pdf_file_size_bytes": 171159,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 17
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "82c8862985e1380daf42de1f5b4bea023d31a2607b2724b4dc283e1f6f91c545",
    "policy_txt_hash": "8499b7bf62701bef1216cdcb2332ff5714485d1d05522a0660497dd76d96b583"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt158.pdf",
    "date_sunset": null,
    "description": "The VSU\u2122 series of VPN gateways provide high performance ICSA certified IPSec VPN and firewall services for networks of all sizes and complexity. All VSU models are tamper evident network security appliances that cost effectively provide secure authenticated communications over public IP networks, and protect private enterprise networks from attack or intrusion.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "EMI/EMC: Level 3"
    ],
    "fw_versions": null,
    "historical_reason": "Validation Sunsetting Policy - FIPS 140-1 Certificate",
    "hw_versions": "02",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "VSU-100/VSU-100R and VSU-2000",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-1",
    "status": "historical",
    "sw_versions": "3.1.34",
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2001-07-27",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2002-08-02",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Avaya, Inc.",
    "vendor_url": "http://www.vpnet.com"
  }
}