SRA EX6000 and SRA EX7000

Certificate #1404

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 15.09.2010 , 21.04.2015
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Design Assurance: Level 3
Description Built on Aventail's powerful, proven SSL VPN platform, the Dell SonicWALL Aventail SRA EX6000 and SRA EX7000 appliances provide granular access control for any type of remote access by first detecting the identity and the security of the end point, protecting applications with granular policy based on who the user is and the trust established for the end point used for access, and then connecting authorized employees and business partners effortlessly from a broad range of cross-platform devices only to authorized resources.
Version (Hardware) P/Ns 101-500210-58 Rev. A (SRA EX6000) and 101-500188-58 Rev. A (SRA EX7000)
Version (Firmware) SRA 10.5.0
Vendor Dell Software, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, RC4, DES, Triple-DES, TDES, HMAC
Asymmetric Algorithms
RSA 1024
Hash functions
SHA-1, MD5
Protocols
SSH, SSL, TLS, VPN
Randomness
RNG
Block cipher modes
ECB, CBC

Security level
Level 2

Standards
FIPS 140-2, PKCS #12, RFC 4303, RFC 4511, RFC 2865, RFC 4254, RFC 5246, X.509

File metadata

Title Microsoft Word - 30c - SRA_EX6000_EX7000_Security_Policy 2010-09-02.doc
Author rignacio
Creation date D:20100902094140-07'00'
Modification date D:20100902094140-07'00'
Pages 21
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 8.1.0 (Windows)

References

Incoming
  • 2441 - historical - Red Hat Enterprise Linux 6.6 OpenSSL Module, Red Hat Enterprise Linux 7.1 OpenSSL Module

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1404,
  "dgst": "a8fd7dc0e1bf7187",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Triple-DES#809",
        "RSA#523",
        "AES#1111",
        "Triple-DES#808",
        "SHS#1035",
        "HMAC#623",
        "HMAC#624",
        "RSA#524",
        "SHS#1034",
        "Triple-DES#807",
        "HMAC#622",
        "AES#1110",
        "RNG#617",
        "AES#1112",
        "SHS#1033"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2018-1111"
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.5.0"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2011-3585",
        "CVE-2011-2717",
        "CVE-2011-2897",
        "CVE-2009-4067",
        "CVE-2018-1111",
        "CVE-2016-4983",
        "CVE-2011-1145",
        "CVE-2011-4967"
      ]
    },
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2441"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "2742",
          "2446",
          "2447",
          "2798",
          "2630",
          "3733",
          "2633",
          "2721",
          "2441"
        ]
      },
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 1024": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 11
        },
        "TLS": {
          "SSL": {
            "SSL": 5
          },
          "TLS": {
            "TLS": 41
          }
        },
        "VPN": {
          "VPN": 24
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#12": 3,
          "#2": 1,
          "#3": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES 128": 3,
          "AES 128 and 256": 1,
          "AES 128, 256": 2,
          "AES 256": 1,
          "HMAC- SHA-1 160": 3,
          "HMAC-SHA-1": 7,
          "HMAC-SHA-1 and 16": 1,
          "PKCS #12": 6,
          "RSA 1024": 3,
          "SHA-1": 2,
          "SHA-1 160": 3
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 13
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 9
        },
        "PKCS": {
          "PKCS #12": 3
        },
        "RFC": {
          "RFC 2865": 1,
          "RFC 4254": 1,
          "RFC 4303": 1,
          "RFC 4511": 1,
          "RFC 5246": 1
        },
        "X509": {
          "X.509": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 5,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "rignacio",
      "/CreationDate": "D:20100902094140-07\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20100902094140-07\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "Microsoft Word - 30c - SRA_EX6000_EX7000_Security_Policy 2010-09-02.doc",
      "pdf_file_size_bytes": 382880,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "c5f145cb9365f27d1a321bf3d2e1c2b82a06749891c067eeea62025056426cef",
    "policy_txt_hash": "770a274dc565ebee70812abfac85b8d8e0694191a3608747adea15c0cb100993"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1404.pdf",
    "date_sunset": null,
    "description": "Built on Aventail\u0027s powerful, proven SSL VPN platform, the Dell SonicWALL Aventail SRA EX6000 and SRA EX7000 appliances provide granular access control for any type of remote access by first detecting the identity and the security of the end point, protecting applications with granular policy based on who the user is and the trust established for the end point used for access, and then connecting authorized employees and business partners effortlessly from a broad range of cross-platform devices only to authorized resources.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Design Assurance: Level 3"
    ],
    "fw_versions": "SRA 10.5.0",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": "P/Ns 101-500210-58 Rev. A (SRA EX6000) and 101-500188-58 Rev. A (SRA EX7000)",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "SRA EX6000 and SRA EX7000",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2010-09-15",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-04-21",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "Dell Software, Inc.",
    "vendor_url": "http://www.sonicwall.com"
  }
}