Cisco Software VPN Client

Certificate #407

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 29.03.2004 , 07.04.2004 , 24.05.2005 , 09.04.2007 , 28.05.2010 , 23.02.2012
Standard FIPS 140-2
Security level 1
Type Software
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Description The Cisco Software VPN client for Window OS is an award winning IPsec VPN client which is available free of charge for use across all termination products. It is the most advanced VPN client available and enables secure Remote Access connectivity to employees and partners. The Cisco Software VPN Client is also a key part of the industries best load balancing, fail-over and recovery strategy.
Tested configurations
  • Windows 2000, Windows XP (single user mode)
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, 3DES, TDES, HMAC
Asymmetric Algorithms
Diffie-Hellman
Hash functions
SHA-1, MD5
Schemes
MAC
Protocols
IKE, IPsec, VPN
Randomness
PRNG, RNG
Block cipher modes
CBC

Vendor
Microsoft, Cisco, Cisco Systems, Cisco Systems, Inc

Security level
Level 1

Standards
FIPS 140-2, FIPS 180-1, FIPS 46-3, FIPS 197, PKCS#1, PKCS #1, PKCS #7, PKCS#12, PKCS#5, X.509

File metadata

Title FIPSipsecclient_042.fm
Creation date D:20040405120315-04'00'
Modification date D:20070321154215-04'00'
Pages 11
Creator FrameMaker 5.5.6p145
Producer Acrobat Distiller 6.0.1 (Windows)

References

Outgoing
  • 212 - historical - Gemplus GemXpresso Pro E64 PK - FIPS ICC with ActivCard Applet Suite
Incoming
  • 1282 - historical - SecureVue Central Cryptographic Module
  • 1284 - historical - SecureVue Data Collector Cryptographic Module
  • 1285 - historical - SecureVue Regional Cryptographic Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 407,
  "dgst": "a5abb1500bdeaef4",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC-SHA-1#153",
        "SHA-1#153",
        "Triple-DES MAC#169",
        "Triple-DES#169",
        "RSA#1",
        "AES#58"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1285",
          "1284",
          "1282"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "212"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "1285",
          "1284",
          "1282"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "212"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "212"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 3
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 3
        },
        "IPsec": {
          "IPsec": 1
        },
        "VPN": {
          "VPN": 116
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "# 153": 2,
          "# 169": 2,
          "# 212": 2,
          "# 58": 1,
          "#1": 1,
          "#7": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "HMAC SHA-1": 1,
          "HMAC-SHA1": 2,
          "PKCS #1": 2,
          "PKCS #7": 2,
          "PKCS#1": 2,
          "PKCS#12": 2,
          "PKCS#5": 4,
          "SHA-1": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 6
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 34,
          "FIPS 180-1": 1,
          "FIPS 197": 1,
          "FIPS 46-3": 2
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS #7": 1,
          "PKCS#1": 1,
          "PKCS#12": 1,
          "PKCS#5": 2
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 1
          },
          "DES": {
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 42,
          "Cisco Systems": 10,
          "Cisco Systems, Inc": 4
        },
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/CreationDate": "D:20040405120315-04\u002700\u0027",
      "/Creator": "FrameMaker 5.5.6p145",
      "/ModDate": "D:20070321154215-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0.1 (Windows)",
      "/Title": "FIPSipsecclient_042.fm",
      "pdf_file_size_bytes": 240909,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 11
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "14edb1efe5b1971814e1c621e6368b3b5af15408b738e3cce1715f4e8c99fe73",
    "policy_txt_hash": "0fc87b1298f8a4321eeb6e91e8623ad7df1103f1e485b2ed778dac4218249cd6"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt407.pdf",
    "date_sunset": null,
    "description": "The Cisco Software VPN client for Window OS is an award winning IPsec VPN client which is available free of charge for use across all termination products. It is the most advanced VPN client available and enables secure Remote Access connectivity to employees and partners. The Cisco Software VPN Client is also a key part of the industries best load balancing, fail-over and recovery strategy.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": null,
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "Cisco Software VPN Client",
    "module_type": "Software",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": "3.6.5",
    "tested_conf": [
      "Windows 2000, Windows XP (single user mode)"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2004-03-29",
        "lab": "SAIC-VA",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2004-04-07",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2005-05-24",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2007-04-09",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-05-28",
        "lab": "",
        "validation_type": "Update"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2012-02-23",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}