cert_id |
3740 |
3343 |
dgst |
30e2fdaa7748f8af |
945ce179d4470c09 |
heuristics/algorithms |
AES#5008, DRBG#1828, HMAC#3329, RSA#2703, SHS#4074, CVL#1561, Triple-DES#2584, ECDSA#1277 |
AES#5008, DRBG#1828, HMAC#3329, RSA#2703, SHS#4074, CVL#1561, Triple-DES#2584, ECDSA#1277 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES 128/192/256: 3
- AES-256: 2
- Diffie-Hellman (CVL Cert. #1561: 2
- Diffie-Hellman 1: 1
- HMAC-SHA- 256/384: 2
- HMAC-SHA-1: 2
- HMAC-SHA-1 160: 2
- RSA 2048: 6
- SHA-1: 1
- SHA-512: 1
|
- Certlike:
- AES 128/192/256: 3
- AES-256: 3
- Certificate AES: 1
- Diffie-Hellman (CVL Cert. #1561: 2
- HMAC-SHA- 256/384: 2
- HMAC-SHA-1 160: 2
- HMAC-SHA1: 2
- RSA 2048: 5
- SHA-512: 1
- SHA-512 2048: 1
|
pdf_data/keywords/vendor |
- Cisco:
- Cisco: 20
- Cisco Systems: 2
- Cisco Systems, Inc: 15
|
- Cisco:
- Cisco: 15
- Cisco Systems: 2
- Cisco Systems, Inc: 15
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 17
- Diffie-Hellman: 22
- RSA:
|
- ECC:
- FF:
- DH:
- DH: 11
- Diffie-Hellman: 21
- RSA:
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 8
- P-521: 8
|
- NIST:
- P-256: 12
- P-384: 8
- P-521: 8
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 18
- FIPS 186-4: 4
- FIPS PUB 140-2: 1
- NIST:
- SP 800-52: 1
- SP 800-90A: 5
- RFC:
- RFC 4253: 2
- RFC 5246: 2
- RFC 5288: 1
- RFC 6071: 2
- RFC 7296: 1
|
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 15
- FIPS 186-4: 4
- FIPS PUB 140-2: 1
- NIST:
- SP 800-52: 1
- SP 800-90A: 5
- RFC:
- RFC 4253: 1
- RFC 5246: 1
- RFC 5288: 1
- RFC 6071: 1
- RFC 7296: 2
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: RichardWang
- /CreationDate: D:20201026142822-04'00'
- /ModDate: D:20201026142822-04'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Cisco FTDv Cryptographic Module Security Policy.docx
- pdf_file_size_bytes: 1470504
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: RichardWang
- /CreationDate: D:20181213163106-05'00'
- /ModDate: D:20181213163106-05'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Cisco FTDv Cryptographic Module Security Policy.docx
- pdf_file_size_bytes: 1397779
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 3 of the Security Policy |
When operated in FIPS mode. When installed, initialized and configured as specified in Section 3 of the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/October 2020_021120_0702_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Dec2018Cert.pdf |
web_data/date_sunset |
|
|
web_data/description |
Cisco Firepower Threat Defense (FTD) solution offers the combination of the industry's most deployed stateful firewall with a comprehensive range of next-generation network security services, intrusion prevention system (IPS), content security and secure unified communications. All running in a virtual environment. |
Cisco Firepower Threat Defense (FTD) solution offers the combination of the industry's most deployed stateful firewall with a comprehensive range of next-generation network security services, intrusion prevention system (IPS), content security and secure unified communications. All running in a virtual environment. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 3, Physical Security: N/A, Design Assurance: Level 2, Mitigation of Other Attacks: N/A |
Roles, Services, and Authentication: Level 3, Physical Security: N/A, Design Assurance: Level 2, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition |
SP 800-56Arev3 transition |
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Cisco Firepower Threat Defense Virtual (FTDv) Cryptographic Module |
Cisco Firepower Threat Defense Virtual (FTDv) Cryptographic Module |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
6.4 |
6.2 |
web_data/tested_conf |
FXOS version 2 on NFVIS 3 running on ENCS 5412 with Intel Xeon D-1528 (single-user mode), FXOS version 2 on VMware ESXi 6.0 running on Cisco UCS C220 M5 with Intel Xeon Silver 4110, FXOS version 2 on VMware ESXi 6.5 running on Cisco UCS C220 M5 with Intel Xeon Silver 4110 |
FXOS version 2 on VMware ESXi 5.5 running on Cisco C220 M4 with Intel Xeon E5, FXOS version 2 on VMware ESXi 6.0 running on Cisco C220 M4 with Intel Xeon E5 (single-user mode), |
web_data/validation_history |
- date: 29.10.2020
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
- date: 17.12.2018
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
web_data/vendor |
Cisco Systems, Inc. |
Cisco Systems, Inc. |
web_data/vendor_url |
http://www.cisco.com |
http://www.cisco.com |