SonicWALL SMA Series v12.1 SMA 6210, SMA 7210

Certificate #3597

Webpage information

Status historical
Historical reason SP 800-56Arev3 transition
Validation dates 10.01.2020 , 19.04.2020
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Exceptions
  • Mitigation of Other Attacks: N/A
Description SonicWall Software SMA 6210 and SMA 7210 are part of the SonicWall Security Solution Enterprise product family. They provide hardware appliance based VPN Virtual Private Network mobile access solutions to a wide variety of end user devices including Microsoft Windows, Apple OSX, Linux, Apple iOS, Google Android and Google Chromebook among others.
Version (Hardware) SMA 6210 [P/N 101-500564-50] and SMA 7210 [P/N 101-500563-50]
Version (Firmware) 12.1.0-05887
Vendor SonicWall, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES-128, AES-256, AES, RC4, Triple-DES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
RSA 1024, RSA 2048, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA1, SHA-256, SHA256, SHA-384, SHA-512, MD5
Schemes
Key Exchange, Key Agreement
Protocols
SSH, SSHv2, SSL, TLS, IKE, IPsec, VPN
Randomness
DRBG, RNG
Elliptic Curves
P-256, P-384, P-160
Block cipher modes
ECB, CBC, CTR, GCM
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA2561, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_3DES_EDE_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256

Standards
FIPS 140-2, FIPS 186-4, FIPS 180-4, FIPS 197, FIPS 198-1, SP 800-52, SP 800-90, SP 800-133, SP 800-135, SP 800-38A, SP 800-38D, SP 800-38F, SP 800-67, SP 800-90A, PKCS #12, RFC 4106, RFC 2865, RFC 4254, RFC 4303, RFC 4511, RFC 5246, RFC 6379, X.509

File metadata

Author Gerrit Kruitbosch
Creation date D:20191206141621-05'00'
Modification date D:20191206141621-05'00'
Pages 21
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3597,
  "dgst": "bef1552cfd69363c",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#C619",
        "Triple-DES#C619",
        "ECDSA#C622",
        "AES#C620",
        "ECDSA#C620",
        "KTS#C621",
        "CVL#C627",
        "AES#C617",
        "SHS#C620",
        "Triple-DES#C621",
        "ECDSA#C621",
        "Triple-DES#C620",
        "HMAC#C620",
        "AES#C621",
        "SHS#C618",
        "RSA#C619",
        "HMAC#C618",
        "SHS#C622",
        "Triple-DES#C617",
        "CVL#C628",
        "Triple-DES#C622",
        "RSA#C621",
        "HMAC#C621",
        "HMAC#C619",
        "CVL#C621",
        "CVL#C624",
        "Triple-DES#C618",
        "RSA#C622",
        "SHS#C617",
        "RSA#C620",
        "DRBG#C618",
        "HMAC#C617",
        "KTS#C622",
        "ECDSA#C619",
        "AES#C618",
        "SHS#C619",
        "AES#C622",
        "CVL#C623",
        "HMAC#C622",
        "CVL#C626",
        "SHS#C621",
        "CVL#C622",
        "CVL#C625",
        "DRBG#C617"
      ]
    },
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:h:sonicwall:sma_6210:-:*:*:*:*:*:*:*",
        "cpe:2.3:h:sonicwall:sma_7210:-:*:*:*:*:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "12.1.0",
        "12.1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA 2048": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 9
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 17
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 3
        },
        "IPsec": {
          "IPsec": 7
        },
        "SSH": {
          "SSH": 12,
          "SSHv2": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 22
          }
        },
        "VPN": {
          "VPN": 6
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-160": 1,
          "P-256": 8,
          "P-384": 4
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 2,
          "#12": 3,
          "#2": 2
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES [197": 3,
          "AES-128": 7,
          "AES-256": 9,
          "DRBG 10": 1,
          "DRBG 11": 1,
          "DRBG 9": 1,
          "DRBG12": 1,
          "HMAC SHA-384": 1,
          "HMAC [198": 3,
          "HMAC-SHA- 1": 4,
          "HMAC-SHA-1": 16,
          "HMAC-SHA-114": 2,
          "HMAC-SHA-256": 10,
          "HMAC-SHA-256 128": 4,
          "HMAC-SHA-38413": 4,
          "HMAC-SHA-96": 2,
          "PKCS #12": 4,
          "RSA 1024": 1,
          "RSA 2048": 1,
          "SHA-1": 17,
          "SHA-256": 23,
          "SHA-384": 12,
          "SHA-38417": 3,
          "SHA-512": 1,
          "SHA-51216": 3,
          "SHA1": 1,
          "SHA256": 4,
          "SHS [180": 3
        }
      },
      "fips_security_level": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 17,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 23,
            "SHA-384": 12,
            "SHA-512": 1,
            "SHA256": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 12
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 31,
          "FIPS 180-4": 1,
          "FIPS 186-4": 2,
          "FIPS 197": 1,
          "FIPS 198-1": 1
        },
        "NIST": {
          "SP 800-133": 1,
          "SP 800-135": 1,
          "SP 800-38A": 1,
          "SP 800-38D": 1,
          "SP 800-38F": 1,
          "SP 800-52": 1,
          "SP 800-67": 1,
          "SP 800-90": 1,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #12": 2
        },
        "RFC": {
          "RFC 2865": 2,
          "RFC 4106": 1,
          "RFC 4254": 1,
          "RFC 4303": 2,
          "RFC 4511": 2,
          "RFC 5246": 2,
          "RFC 6379": 2
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11,
            "AES-128": 7,
            "AES-256": 9
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 15,
            "HMAC-SHA-256": 9
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA2561": 1,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
          "TLS_RSA_WITH_3DES_EDE_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA256": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Gerrit Kruitbosch",
      "/CreationDate": "D:20191206141621-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20191206141621-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 1446204,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "6a1618e081a265b117d89d0b2c6b2b7d0628ff4b1227ec45d27ac9ff363dedc6",
    "policy_txt_hash": "2cded46f18f562459ddd09e13d332c7cdfb950565a98c39595ec1360f975f58c"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Jan2020ConsolidatedCert.pdf",
    "date_sunset": null,
    "description": "SonicWall Software SMA 6210 and SMA 7210 are part of the SonicWall Security Solution Enterprise product family. They provide hardware appliance based VPN Virtual Private Network mobile access solutions to a wide variety of end user devices including Microsoft Windows, Apple OSX, Linux, Apple iOS, Google Android and Google Chromebook among others.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "12.1.0-05887",
    "historical_reason": "SP 800-56Arev3 transition",
    "hw_versions": "SMA 6210 [P/N 101-500564-50] and SMA 7210 [P/N 101-500563-50]",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "SonicWALL SMA Series v12.1 SMA 6210, SMA 7210",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-01-10",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-04-19",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Update"
      }
    ],
    "vendor": "SonicWall, Inc.",
    "vendor_url": "http://www.sonicwall.com"
  }
}