This page was not yet optimized for use on mobile
devices.
Cisco Systems 3504, 5520, and 8540 Wireless LAN Controllers
Certificate #3398
Webpage information
Security policy
Symmetric Algorithms
AES, RC4, HMAC, CMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-512, SHA-256, SHA-384, SHA-224, SHA512, MD5Schemes
MAC, Key ExchangeProtocols
SSH, SSHv1, SSHv2, SSL, TLS, TLS v1.2, TLSv1.2, DTLS, DTLS v1.2, IKE, IKEv2, IPsecRandomness
DRBGElliptic Curves
P-256, P-384, P-521Block cipher modes
ECB, CBC, CTR, OFB, GCM, CCM, XTSVendor
Cisco Systems, Inc, Cisco Systems, CiscoSecurity level
Level 1, level 1Standards
FIPS 140-2, FIPS PUB 140-2, SP 800-133, SP 800-90A, SP 800-108, SP 800-52, RFC 5288, RFC 7296, X.509File metadata
| Author | [email protected] |
|---|---|
| Creation date | D:20190308071304-05'00' |
| Modification date | D:20190308071304-05'00' |
| Pages | 30 |
| Creator | Microsoft® Word for Office 365 |
| Producer | Microsoft® Word for Office 365 |
References
Incoming- 3561 - historical - Cisco Aironet 1572 EAC, 1702i, 2702e/i, 3702e/i/p Wireless LAN Access Points
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.CPE matches
- cpe:2.3:h:cisco:3504_wireless_controller:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:3504_wireless_lan_controller:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:5520_wireless_controller:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:5520_wireless_lan_controller:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:8540_wireless_controller:-:*:*:*:*:*:*:*
- cpe:2.3:h:cisco:8540_wireless_lan_controller:-:*:*:*:*:*:*:*
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 3398,
"dgst": "b8b445ba5ddcf7da",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"DRBG#2299",
"AES#3301",
"RSA#3058",
"DSA#1462",
"HMAC#3776",
"AES#2346",
"HMAC#2095",
"ECDSA#1540",
"DSA#1459",
"AES#5674",
"SHS#4546",
"ECDSA#1537",
"CVL#2059",
"DRBG#2294",
"CVL#2076",
"CVL#2060",
"ECDSA#1536",
"RSA#3053",
"CVL#2057",
"AES#5675",
"HMAC#3784",
"KBKDF#239",
"KTS#5675",
"RSA#3054",
"SHS#2737",
"DRBG#2293",
"KTS#5674",
"KTS#5683",
"CVL#2075",
"HMAC#3777",
"SHS#2023",
"HMAC#1455",
"SHS#4545",
"SHS#4555",
"AES#5683",
"KBKDF#236",
"CVL#2058",
"DSA#1460",
"KBKDF#237"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:cisco:5520_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:5520_wireless_lan_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8540_wireless_lan_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:8540_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:3504_wireless_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:3504_wireless_lan_controller:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"8.5"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"3561"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"3561"
]
},
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 24
}
},
"FF": {
"DH": {
"DH": 3,
"Diffie-Hellman": 38
}
},
"RSA": {
"RSA 2048": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 3
},
"CTR": {
"CTR": 1
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 8
},
"OFB": {
"OFB": 1
},
"XTS": {
"XTS": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 16,
"IKEv2": 10
},
"IPsec": {
"IPsec": 2
},
"SSH": {
"SSH": 14,
"SSHv1": 1,
"SSHv2": 1
},
"TLS": {
"DTLS": {
"DTLS": 21,
"DTLS v1.2": 1
},
"SSL": {
"SSL": 3
},
"TLS": {
"TLS": 37,
"TLS v1.2": 1,
"TLSv1.2": 1
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 38,
"P-384": 22,
"P-521": 2
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"# 2076": 1,
"#1": 1,
"#2057": 1,
"#2058": 4,
"#2059": 1,
"#2060": 4,
"#2075": 1,
"#2076": 3,
"#5674": 1,
"#5675": 1,
"#5683": 1
}
},
"fips_certlike": {
"Certlike": {
"AES 128/192/256": 2,
"AES Cert. #5683": 1,
"Diffie-Hellman (CVL Cert. #2076": 1,
"HMAC SHA-1": 3,
"HMAC SHA-224": 2,
"HMAC SHA-256": 3,
"HMAC SHA-384": 3,
"HMAC SHA-512": 3,
"HMAC-SHA-1": 2,
"HMAC-SHA1": 4,
"RSA 2048": 1,
"SHA-1": 7,
"SHA-224": 4,
"SHA-256": 6,
"SHA-384": 5,
"SHA-512": 6,
"SHA512": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 5,
"level 1": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 3
}
},
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-224": 4,
"SHA-256": 6,
"SHA-384": 5,
"SHA-512": 6,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 28
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 20,
"FIPS PUB 140-2": 1
},
"NIST": {
"SP 800-108": 1,
"SP 800-133": 1,
"SP 800-52": 1,
"SP 800-90A": 13
},
"RFC": {
"RFC 5288": 1,
"RFC 7296": 2
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 30
},
"RC": {
"RC4": 2
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 25
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 25,
"Cisco Systems": 8,
"Cisco Systems, Inc": 30
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "[email protected]",
"/CreationDate": "D:20190308071304-05\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Office 365",
"/ModDate": "D:20190308071304-05\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Office 365",
"pdf_file_size_bytes": 1150096,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/index.html",
"http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080a829b8.shtml",
"http://csrc.nist.gov/groups/STM/cmvp/validation.html",
"https://software.cisco.com/",
"http://www.cisco.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 30
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "935c7d7f8fb04dd40038b7707e60c5941655cf29c2b2d4c9d22566477b0bbb5a",
"policy_txt_hash": "36c0d0cff4c43c1f30f8e7261143df903bdf30011d22ac488f46dc1994da9e05"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in the Security Policy Section 3 and operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPSConsolidatedMarch2019.pdf",
"date_sunset": null,
"description": "The Cisco Series Wireless Controllers, are a highly scalable and flexible platform that enables system-wide services for mission-critical wireless networking in medium-sized to large enterprises and campus environments.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 2",
"Mitigation of Other Attacks: N/A"
],
"fw_versions": "8.5",
"historical_reason": "SP 800-56Arev3 transition",
"hw_versions": "3504, 5520 and 8540",
"level": 1,
"mentioned_certs": {},
"module_name": "Cisco Systems 3504, 5520, and 8540 Wireless LAN Controllers",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2019-03-13",
"lab": "Acumen Security",
"validation_type": "Initial"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}