cert_id |
1941 |
1460 |
dgst |
5933b0b35d5d3e9d |
63d942da157a1ee4 |
heuristics/algorithms |
RSA#1035, AES#2006, HMAC#1211, SHS#1756, RNG#1049 |
RNG#653, AES#1184, HMAC#682, SHS#1091, RNG#655, RSA#565, RSA#564, RNG#654, AES#1183, HMAC#683, HMAC#684, AES#1182, RSA#563, SHS#1092, SHS#1093 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
4.3 |
4.1, 4.3, 3.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
- Cert:
- #1: 1
- #2: 1
- #3: 1
- #4: 1
- #5: 1
- #6: 1
- #7: 1
|
- Cert:
- #1: 3
- #2: 3
- #3: 2
- #4: 2
- #5: 2
- #6: 2
- #7: 1
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES 256: 1
- PKCS1: 2
- SHA1: 1
|
- Certlike:
- AES 256: 1
- PKCS1: 2
- SHA1: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140: 7
- FIPS 197: 1
- FIPS 198: 1
- PKCS:
- RFC:
|
- FIPS:
- FIPS 140: 6
- FIPS 197: 1
- FIPS 198: 1
- PKCS:
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /Author: brian
- /CreationDate: D:20130422142201-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130422142201-04'00'
- /Producer: Acrobat Distiller 9.5.3 (Windows)
- /Title: Microsoft Word - ISS GX 4-3 Series FIPS 140 Security Policy v1-2-7800-7412.docx
- pdf_file_size_bytes: 553051
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Author: brian
- /CreationDate: D:20130206115446-05'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130206115446-05'00'
- /Producer: Acrobat Distiller 9.5.2 (Windows)
- /Title: Microsoft Word - ISS GX 4-3 Series FIPS 140 Security Policy v1-6-LegacyGX.doc
- pdf_file_size_bytes: 530054
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode when installed with Firmware v4.3 and with the tamper evidence seals installed as indicated in the Security Policy. No assurance of module integrity when operating in non-FIPS mode. |
With Firmware Version 3.1, 4.1 or 4.3 and with the tamper evidence seals installed as indicated in the Security Policy |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0028.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1460.pdf |
web_data/date_sunset |
|
|
web_data/description |
The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments. Preemptive protection, or protection that works ahead of the threat, is available from IBM Internet Security Systems through its proprietary combination of line-speed performance, security intelligence and a modular protection engine that enables security convergence. |
The IBM Proventia Network Intrusion Prevention System (IPS) stops Internet threats before they impact your business and delivers protection to all three layers of the network: core, perimeter and remote segments. Preemptive protection, or protection that works ahead of the threat, is available from IBM Internet Security Systems through its proprietary combination of line-speed performance, security intelligence and a modular protection engine that enables security convergence. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
[] |
[] |
web_data/fw_versions |
4, ., 3, , , , , , , , , , , , |
3, ., 1, ,, , 4, ., 1, , o, r, , 4, ., 3 |
web_data/historical_reason |
RNG SP800-131A Revision 1 Transition |
RNG SP800-131A Revision 1 Transition |
web_data/hw_versions |
G, X, 7, 8, 0, 0, , a, n, d, , G, X, 7, 4, 1, 2, ;, , w, i, t, h, , F, I, P, S, -, L, A, B, E, L, S, :, , F, I, P, S, , 1, 4, 0, , t, a, m, p, e, r, , e, v, i, d, e, n, c, e, , l, a, b, e, l, s |
G, X, 4, 0, 0, 4, ,, , G, X, 5, 0, 0, 8, ,, , G, X, 5, 1, 0, 8, ,, , G, X, 5, 2, 0, 8, , a, n, d, , G, X, 6, 1, 1, 6, , , , , , , , , , , , , , , , , , , , , , , , , , , |
web_data/level |
2 |
2 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Proventia GX Series Security Appliances |
Proventia GX Series Security Appliances |
web_data/module_type |
Hardware |
Hardware |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
None |
None |
web_data/tested_conf |
[] |
[] |
web_data/validation_history |
- date: 30.04.2013
- lab: COACT INC CAFE LAB
- validation_type: Initial
|
- date: 29.11.2010
- lab: COACT INC CAFE LAB
- validation_type: Initial
|
web_data/vendor |
IBM Internet Security Systems, Inc. |
IBM Internet Security Systems, Inc. |
web_data/vendor_url |
http://www.iss.net |
http://www.iss.net |