This page was not yet optimized for use on mobile
devices.
Cisco Catalyst 6506, 6509, 6506(E), 6509(E), 7606 and 7609 Routers With IPSec VPN SPA
Certificate #658
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, HMACAsymmetric Algorithms
DH, Diffie-HellmanHash functions
SHA-1, MD5Schemes
Key ExchangeProtocols
SSH, IKE, IPsec, VPN, PGPRandomness
PRNG, RNGTrusted Execution Environments
SEVendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
Level 2, level 1Side-channel analysis
SPA, malfunctionStandards
FIPS 140-2, RFC 1334File metadata
| Title | zamboni security policy with HMAC 1.1.fm |
|---|---|
| Author | sshorter |
| Creation date | D:20040722143115Z00'00' |
| Modification date | D:20060502142206Z00'00' |
| Pages | 38 |
| Creator | FrameMaker 7.0 |
| Producer | Acrobat Distiller 5.0.5 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 658,
"dgst": "c22e1a4acbd2d996",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES#156",
"HMAC#153",
"SHS#285",
"SHS#422",
"RNG#123",
"AES#209",
"Triple-DES#298",
"Triple-DES#258",
"HMAC#15"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0",
"1.1",
"3.0",
"4.0",
"12.2",
"4.1"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 8,
"Diffie-Hellman": 6
}
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 17
},
"IPsec": {
"IPsec": 13
},
"PGP": {
"PGP": 2
},
"SSH": {
"SSH": 10
},
"VPN": {
"VPN": 70
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"HMAC SHA-1": 2,
"HMAC-SHA-1": 4,
"SHA-1": 11
}
},
"fips_security_level": {
"Level": {
"Level 2": 4,
"level 1": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 11
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 5
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"SCA": {
"SPA": 70
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 23
},
"RFC": {
"RFC 1334": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"Triple-DES": 10
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"tee_name": {
"IBM": {
"SE": 5
}
},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 224,
"Cisco Systems": 13,
"Cisco Systems, Inc": 6
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "sshorter",
"/CreationDate": "D:20040722143115Z00\u002700\u0027",
"/Creator": "FrameMaker 7.0",
"/ModDate": "D:20060502142206Z00\u002700\u0027",
"/Producer": "Acrobat Distiller 5.0.5 (Windows)",
"/Title": "zamboni security policy with HMAC 1.1.fm",
"pdf_file_size_bytes": 2178201,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cisco.com/en/US/learning/index.html",
"http://www.cisco.com/techsupport/contacts",
"http://www.cisco.com/en/US/partner/ordering/",
"http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html",
"http://pgp.mit.edu:11371/pks/lookup?search=psirt%40cisco.com\u0026op=index\u0026exact=on",
"mailto:[email protected]",
"http://www.cisco.com/go/iqmagazine",
"http://www.cisco.com/techsupport/servicerequest",
"http://www.cisco.com",
"http://www.cisco.com/go/marketplace/",
"http://www.cisco.com/univercd/home/home.htm",
"http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm",
"http://tools.cisco.com/RPF/register/register.do",
"mailto:[email protected]",
"http://www.cisco.com/packet",
"http://www.cisco.com/en/US/products/products_psirt_rss_feed.html",
"http://www.cisco.com/public/countries_languages.shtml",
"http://www.cisco.com/ipj",
"http://www.ciscopress.com",
"http://www.cisco.com/techsupport",
"http://www.cisco.com/go/psirt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "234aaf2ce5c360b6d89e357897d3658314377cc41535b10c4d20fa7658818700",
"policy_txt_hash": "c658f2a3b46faecdc940407a241ca31042e42b70d62c418b378bcc8f59716bf5"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt658.pdf",
"date_sunset": null,
"description": "The Catalyst 6500 series switches and the Cisco 7606 and Cisco 7609 routers with the IPSec VPN SPA offer versatility, integration, and security to branch offices. With numerous network modules and service modules available, the modular architecture of the Cisco router easily allows interfaces to be upgraded to accommodate network expansion. The Catalyst 6500 series switches and the Cisco 7606 and Cisco 7609 routers provide a scalable, secure, manageable remote access server that meets FIPS 140-2 Level 2 requirements.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": null,
"fw_versions": "12.2(18)SXE2",
"historical_reason": "RNG SP800-131A Revision 1 Transition",
"hw_versions": "6506, 6509, 6506-E, 6509-E, 7606, 7609; Backplane chassis: Hardware Versions 1.0 (6505(E), 7606, 7609), 1.1 (6509(E)), 3.0 (6506, 6509); Supervisor Blade: Hardware Versions 4.1 (SUP720-3B), 4.0 (SUP720-3BXL); IPSec VPN SPA: Hardware Version 1.0",
"level": 2,
"mentioned_certs": {},
"module_name": "Cisco Catalyst 6506, 6509, 6506(E), 6509(E), 7606 and 7609 Routers With IPSec VPN SPA",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2006-04-20",
"lab": "SAIC-VA",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2006-05-16",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2010-05-28",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2012-02-23",
"lab": "",
"validation_type": "Update"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}