cert_id |
4037 |
4567 |
dgst |
7e9ce5ed46ef9348 |
db2e7f1bd5ab9968 |
heuristics/algorithms |
KTS#C2085, DRBG#C2085, RSA#C2085, ECDSA#C2085, CVL#C2085, HMAC#C2085, AES#C2085, SHS#C2085 |
KTS#C2085, KAS#C2085, DRBG#C2085, RSA#C2085, KAS-SSC#A2458, ECDSA#C2085, CVL#C2085, HMAC#C2085, AES#C2085, SHS#C2085, KAS#A2458 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
- |
- |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
{} |
{} |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
{} |
{} |
heuristics/module_prunned_references |
{} |
{} |
heuristics/policy_processed_references/directly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/directly_referencing |
{} |
{} |
heuristics/policy_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/policy_processed_references/indirectly_referencing |
{} |
{} |
heuristics/policy_prunned_references |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- AES (128: 1
- AES 128/256: 1
- AES-256: 6
- AES-GCM (128: 1
- HMAC-SHA1: 4
- HMAC-SHA256: 6
- HMAC-SHA384: 2
- HMAC-SHA512: 6
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- RSA 4096: 3
- SHA-3: 1
- SHA-384: 3
- SHA1: 1
|
- Certlike:
- AES (128: 1
- AES 128/256: 1
- AES-256: 6
- AES-CBC 128/192/256: 2
- AES-GCM (128: 1
- HMAC-SHA1: 4
- HMAC-SHA256: 6
- HMAC-SHA384: 2
- HMAC-SHA512 160: 2
- HMAC-SHA512 256: 4
- PKCS#1: 2
- PKCS#12: 2
- PKCS#5: 2
- RSA 3072: 2
- RSA 4096: 3
- SHA-3: 1
- SHA-384: 3
- SHA1: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-: 2
- AES-256: 6
- DES:
- constructions:
|
- AES_competition:
- AES:
- AES: 7
- AES-: 2
- AES-256: 6
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 2
- SHA-512: 1
- SHA3:
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 2
- SHA-512: 1
- SHA3:
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
- NIST:
- P-256: 4
- P-384: 14
- P-521: 8
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 13
- FIPS 180-4: 2
- FIPS 186-2: 7
- FIPS 186-4: 9
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS 202: 1
- NIST:
- SP 800-108: 1
- SP 800-132: 1
- SP 800-133: 1
- SP 800-135: 2
- SP 800-38A: 2
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 2
- SP 800-38F: 3
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-56B: 1
- SP 800-56C: 1
- SP 800-89: 1
- SP 800-90A: 6
- PKCS:
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- RFC:
|
- FIPS:
- FIPS 140-2: 13
- FIPS 180-4: 2
- FIPS 186-2: 7
- FIPS 186-4: 9
- FIPS 197: 2
- FIPS 198-1: 2
- FIPS 202: 1
- NIST:
- SP 800-108: 1
- SP 800-132: 1
- SP 800-135: 2
- SP 800-38A: 2
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 2
- SP 800-38F: 3
- SP 800-52: 1
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-56C: 1
- SP 800-89: 1
- SP 800-90A: 6
- PKCS:
- PKCS#1: 1
- PKCS#12: 1
- PKCS#5: 1
- RFC:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
|
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode. When initialized and configured as specified in Section 8 of the Security Policy. |
When operated in FIPS mode. When initialized and configured as specified in Section 8 of the Security Policy. |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2021_011021_0714_Signed2.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/August 2023_010923_0844.pdf |
web_data/date_sunset |
|
21.09.2026 |
web_data/description |
The Ruckus Virtual SmartZone-Dataplane (vSZ-D) offers organizations more flexibility in deploying the dataplane as needed in a Network Function Virtualization (NFV) architecture aligned fashion. It offers secure tunneling of user data traffic that encrypts payload traffic, maintains flat network topology, enables mobility across L2 subnets, and offers differentiated per site policy control and QoS amongst others. |
The Ruckus Virtual SmartZone-Dataplane (vSZ-D) offers organizations more flexibility in deploying the dataplane as needed in a Network Function Virtualization (NFV) architecture aligned fashion. It offers secure tunneling of user data traffic that encrypts payload traffic, maintains flat network topology, enables mobility across L2 subnets, and offers differentiated per site policy control and QoS amongst others. |
web_data/embodiment |
Multi-Chip Stand Alone |
Multi-Chip Stand Alone |
web_data/exceptions |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 2, Mitigation of Other Attacks: N/A |
Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 2, Mitigation of Other Attacks: N/A |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition - replaced by certificate #4567 |
|
web_data/hw_versions |
[] |
[] |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Ruckus Networks Virtual SmartZone - Data Plane (vSZ-D) |
Ruckus Networks Virtual SmartZone - Data Plane (vSZ-D) |
web_data/module_type |
Software |
Software |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
active |
web_data/sw_versions |
5.2.1.3 |
5.2.1.3 |
web_data/tested_conf |
CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel Xeon E5-2650 v2 without AES-NI (single-user mode), CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel XeonE5-2650 v2 with AES-NI |
CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel Xeon E5-2650 v2 without AES-NI (single-user mode), CentOS 7.5 on VMware ESXi 6.5.0 running on Dell PowerEdge R620 with Intel XeonE5-2650 v2 with AES-NI |
web_data/validation_history |
- date: 24.09.2021
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
- date: 30.08.2023
- lab: GOSSAMER SECURITY SOLUTIONS INC
- validation_type: Initial
|
web_data/vendor |
CommScope Technologies LLC |
CommScope Technologies LLC |
web_data/vendor_url |
http://www.commscope.com/ruckus |
http://www.commscope.com/ruckus |