cert_id |
3732 |
4098 |
dgst |
1db2269b74d1467a |
cae3f2d4f75f1834 |
heuristics/algorithms |
HMAC#C843, RSA#C843, AES#C844, AES#C842, SHS#C843, ECDSA#C843, DRBG#C845, DRBG#C842, CVL#C853, CVL#C842, ECDSA#C842, CVL#C843, SHS#C842, AES#C843, RSA#C842, Triple-DES#C842, CVL#C854, HMAC#C842, DRBG#C843, CVL#C855, CVL#C856, AES#C845 |
ECDSA#C1918, CVL#C1919, CVL#C1918, AES#C1917, SHS#C1918, CVL#C853, DRBG#C1918, ECDSA#C1917, RSA#C1917, RSA#C1918, RSA#A606, HMAC#C1917, DRBG#C1917, AES#C1918, CVL#C854, SHS#C1917, HMAC#C1918, CVL#C855, Triple-DES#C1918, CVL#C1917 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
4556 |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
3637, 4556 |
heuristics/policy_prunned_references |
{} |
4556 |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES GCM IV 96: 1
- AES GCM IV63: 1
- AES encrypt KAT75: 1
- AES25: 1
- CVL31: 1
- DRBG33: 1
- Diffie-Hellman 33: 1
- HMAC SHA-1: 3
- HMAC SHA-256: 2
- HMAC38: 2
- RSA 2048: 1
- RSA36: 1
- SHA- 256: 2
- SHA- 512: 2
- SHA- 512 160: 1
- SHA-1: 10
- SHA-224: 2
- SHA-256: 8
- SHA-384: 4
- SHA-512: 5
- SHA-512 160: 1
- SHS40: 1
|
- Certlike:
- AES CBC encrypt KAT95: 1
- AES GCM IV82: 1
- AES25: 1
- CVL31: 1
- DRBG 2: 1
- DRBG34: 1
- Diffie-Hellman 34: 1
- Diffie-Hellman 45: 1
- Diffie-Hellman 54: 1
- HMAC SHA-1: 3
- HMAC SHA-256: 3
- HMAC37: 2
- RSA 2048: 1
- RSA55: 1
- SHA- 256: 2
- SHA- 512: 2
- SHA- 512 160: 1
- SHA-1: 10
- SHA-224: 2
- SHA-256: 11
- SHA-384: 4
- SHA-512: 5
- SHA-512 160: 1
- SHS59: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 8
- SHA-384: 4
- SHA-512: 6
|
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 11
- SHA-384: 4
- SHA-512: 6
|
pdf_data/keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 2
- KEX:
|
pdf_data/keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 111
- TLS 1.2: 1
- TLS v1.2: 1
|
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 116
- TLS 1.2: 1
- TLS v1.2: 1
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-224: 10
- P-256: 14
- P-384: 10
- P-521: 6
|
- NIST:
- P-224: 14
- P-256: 18
- P-384: 14
- P-521: 8
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 11
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- FIPS PUB 186-2: 1
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- NIST:
- NIST SP 800-132: 2
- NIST SP 800-133: 3
- NIST SP 800-38D: 3
- NIST SP 800-52: 1
- NIST SP 800-67: 1
- SP 800-90A: 5
- RFC:
|
- FIPS:
- FIPS 140-2: 14
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- FIPS PUB 198-1: 2
- NIST:
- NIST SP 800-132: 2
- NIST SP 800-133: 3
- NIST SP 800-38D: 3
- NIST SP 800-52: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 3
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: Corsec Security, Inc.
- /CreationDate: D:20200930150752-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20200930150752-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 931044
- pdf_hyperlinks: https://docs.citrix.com/en-us/netscaler/12-1/licensing/netscaler-licensing-overview.html, https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program, mailto:[email protected], https://docs.citrix.com/en-us/netscaler/12-1/getting-started-with-netscaler.html, https://docs.citrix.com/en-us/categories/solution_content/downloads/secure-deployment-guide-for-netscaler.pdf, https://www.citrix.com/downloads/citrix-adc/, https://docs.citrix.com/en-us/citrix-adc/12-1.html, https://docs.citrix.com/en-us/netscaler/12-1/deploying-vpx.html, https://support.citrix.com/article/CTX122521, http://www.citrix.com/, https://www.mycitrix.com/, https://www.citrix.com/, https://docs.citrix.com/en-us/citrix-adc/12-1/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-config-users-and-grps-tsk.html, https://www.citrix.com/content/dam/citrix/en_us/documents/guide/citrix-netscaler-adc-deployment-guide.pdf, https://csrc.nist.gov/Projects/cryptographic-module-validation-program/Validated-Modules/Search, https://docs.citrix.com/en-us/netscaler/12-1/deploying-vpx/supported-hypervisors-features-limitations.html, https://www.nist.gov/publications/guidelines-selection-configuration-and-use-transport-layer-security-tls-implementations?pub_id=915295, http://www.corsec.com/, https://docs.citrix.com/en-us/citrix-adc/12-1/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-config-external-user-authn-con.html, https://docs.citrix.com/en-us/netscaler/12-1/deploying-vpx/install-vpx-on-esx.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: Corsec Security, Inc.
- /CreationDate: D:20211123115735-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20211123115735-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: FIPS 140-2 Non-Proprietary Security Policy
- pdf_file_size_bytes: 959393
- pdf_hyperlinks: https://docs.citrix.com/en-us/netscaler/12-1/licensing/netscaler-licensing-overview.html, https://docs.citrix.com/en-us/citrix-adc/12-1/aaa-tm/ns-aaa-config-protocols-con/ns-aaa-config-protocols-krb5-ntlm-intro-con/kerberos-config-on-citrix-adc.html, https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program, https://docs.citrix.com/en-us/netscaler/12-1/getting-started-with-netscaler.html, mailto:[email protected], https://docs.citrix.com/en-us/categories/solution_content/downloads/secure-deployment-guide-for-netscaler.pdf, https://docs.citrix.com/en-us/citrix-adc/12-1.html, https://docs.citrix.com/en-us/netscaler/12-1/deploying-vpx.html, https://docs.citrix.com/en-us/citrix-adc/12-1/clustering.html, https://support.citrix.com/article/CTX122521, http://www.citrix.com/, https://www.mycitrix.com/, https://www.citrix.com/, https://docs.citrix.com/en-us/citrix-adc/12-1/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-config-external-user-authn-con.html, https://docs.citrix.com/en-us/citrix-adc/12-1/system/ns-ag-aa-intro-wrapper-con/ns-ag-aa-config-users-and-grps-tsk.html, https://www.citrix.com/content/dam/citrix/en_us/documents/guide/citrix-netscaler-adc-deployment-guide.pdf, https://csrc.nist.gov/Projects/cryptographic-module-validation-program/Validated-Modules/Search, https://docs.citrix.com/en-us/citrix-adc/12-1/aaa-tm/ns-aaa-sso-con/ns-aaa-sso-overview-con.html, https://docs.citrix.com/en-us/netscaler/12-1/deploying-vpx/supported-hypervisors-features-limitations.html, http://www.corsec.com/, https://www.citrix.com/downloads/citrix-adc/, https://docs.citrix.com/en-us/netscaler/12-1/deploying-vpx/install-vpx-on-esx.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When installed, initialized and configured as specified in Section [3.1.3] of the Security Policy. The module generates cryptographic keys whose strengths are modified by available entropy |
When operated in FIPS mode. The module generates cryptographic keys whose strengths are modified by available entropy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2020_021120_0702_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2021_020122_0905_signed.pdf |
web_data/date_sunset |
|
21.09.2026 |
web_data/description |
Citrix ADC VPX is a virtual application delivery controller that provides the best possible experience to users with flexible deployment options, intelligent global load balancing, centralized management from a single pane, and integrated application and API security. |
Citrix ADC VPX is a virtual application delivery controller that provides the best possible experience to users with flexible deployment options, intelligent global load balancing, centralized management from a single pane, and integrated application and API security. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Physical Security: N/A |
Physical Security: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Citrix ADC VPX |
Citrix ADC VPX |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
12.1.51.152 |
12.1.55.180 |
web_data/tested_conf |
FreeBSD 8.4 on VMware ESXi v6.5 U2 running on a Dell PowerEdge R630 with an Intel® Xeon® E5-2680 v4 with PAA, FreeBSD 8.4 on VMware ESXi v6.5 U2 running on a Dell PowerEdge R630 with an Intel® Xeon® E5-2680 v4 without PAA (single-user mode) |
FreeBSD 8.4 on VMware ESXi v6.5 U2 running on a Dell PowerEdge R630 with an Intel® Xeon® E5-2680 v4 with PAA, FreeBSD 8.4 on VMware ESXi v6.5 U2 running on a Dell PowerEdge R630 with an Intel® Xeon® E5-2680 v4 without PAA (single-user mode) |
web_data/validation_history |
- date: 22.10.2020
- lab: Lightship Security, Inc.
- validation_type: Initial
|
- date: 12.12.2021
- lab: Lightship Security, Inc.
- validation_type: Initial
|
web_data/vendor |
Citrix Systems, Inc. |
Citrix Systems, Inc. |
web_data/vendor_url |
http://www.citrix.com |
http://www.citrix.com |