Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
SonicWall Network Security Virtual Appliances
SonicWall Network Security Virtual Appliances
cert_id 3712 4262
dgst 95a10e2b95576e13 cf7dee3443a85994
heuristics/algorithms DRBG#C965, AES#C965, SHS#C965, CVL#C965, KTS#C965, Triple-DES#C965, ECDSA#C965, DSA#C965, HMAC#C965, RSA#C965 KTS#C2143, ECDSA#C2143, DRBG#C2143, SHS#C2143, HMAC#C2143, DSA#C2143, AES#C2143, CVL#C2143, RSA#C2143
heuristics/extracted_versions 6.5.4 7.0
pdf_data/keywords/fips_cert_id
  • Cert:
    • #1: 1
pdf_data/keywords/fips_security_level
  • Level:
    • Level 1: 3
    • level 1: 2
  • Level:
    • Level 1: 4
    • level 1: 2
pdf_data/keywords/fips_certlike
  • Certlike:
    • # C965: 1
    • AES 128 and 256: 1
    • AES CBC 128/192/256: 3
    • AES [197: 1
    • HMAC SHA(1: 1
    • HMAC [198: 1
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 4
    • HMAC-SHA-512: 4
    • RSA 2048: 1
    • SHA (256: 3
    • SHA( 256: 4
    • SHA(1: 13
    • SHA(256: 9
    • SHA- 256: 1
    • SHA-1: 9
    • SHA-256: 5
    • SHA-3: 1
    • SHA-384: 4
    • SHA-512: 3
    • SHA2-512: 2
  • Certlike:
    • # C2143: 2
    • AES CBC 128/192/256: 3
    • AES CBC 128/256: 1
    • AES [197: 1
    • HMAC SHA (1: 1
    • HMAC [198: 1
    • HMAC-SHA-256: 4
    • HMAC-SHA-384: 4
    • HMAC-SHA-512: 4
    • RSA 2048: 4
    • SHA (1: 1
    • SHA (256: 3
    • SHA(1: 12
    • SHA(256: 13
    • SHA- 256: 1
    • SHA-1: 9
    • SHA-256: 5
    • SHA-3: 1
    • SHA-384: 4
    • SHA-512: 3
pdf_data/keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 5
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 15
  • DES:
    • 3DES:
      • TDEA: 1
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 1
      • HMAC: 5
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 12
    • DSA:
      • DSA: 4
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 11
      • Diffie-Hellman: 7
    • DSA:
      • DSA: 4
  • RSA:
    • RSA 2048: 4
pdf_data/keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 3
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 2
pdf_data/keywords/crypto_protocol
  • IKE:
    • IKE: 26
    • IKEv1: 6
    • IKEv2: 6
  • IPsec:
    • IPsec: 25
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 43
      • TLS 1.0: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 33
  • IKE:
    • IKE: 28
    • IKEv1: 6
    • IKEv2: 6
  • IPsec:
    • IPsec: 25
  • SSH:
    • SSH: 6
  • TLS:
    • TLS:
      • TLS: 22
      • TLS 1.0: 1
      • TLS 1.2: 27
      • TLS 1.3: 5
      • TLSv1.2: 1
  • VPN:
    • VPN: 33
pdf_data/keywords/randomness
  • PRNG:
    • DRBG: 17
  • PRNG:
    • DRBG: 13
pdf_data/keywords/cipher_mode
  • CBC:
    • CBC: 8
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 4
  • CBC:
    • CBC: 10
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 8
pdf_data/keywords/ecc_curve
  • NIST:
    • P-192: 4
    • P-224: 12
    • P-256: 18
    • P-384: 14
    • P-521: 14
  • NIST:
    • P-192: 4
    • P-224: 10
    • P-256: 20
    • P-384: 18
    • P-521: 16
pdf_data/keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
pdf_data/keywords/standard_id
  • FIPS:
    • FIPS 140-2: 52
    • FIPS PUB 140-2: 1
    • FIPS PUB 202: 1
    • FIPS140-2: 1
  • NIST:
    • SP 800-90A: 6
  • RFC:
    • RFC 5246: 1
    • RFC 5288: 1
  • FIPS:
    • FIPS 140-2: 50
    • FIPS PUB 140-2: 1
    • FIPS PUB 202: 1
    • FIPS140-2: 1
  • NIST:
    • SP 800-135: 1
    • SP 800-52: 1
    • SP 800-90A: 5
  • RFC:
    • RFC 5288: 2
    • RFC 8446: 1
pdf_data/keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • service. Any other firmware version that is not listed in the module certificate is considered out of scope and requires separate FIPS 140-2 certificate. 12 MD5 (no security claimed) and keys derived from: 1
pdf_data/policy_metadata
  • /Author: Usha Sanagala
  • /CreationDate: D:20210224101126-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210224101126-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: FIPS 140-2 Security Policy Template
  • pdf_file_size_bytes: 598685
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: Usha Sanagala
  • /CreationDate: D:20220610122429-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220610122429-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Subject: FIPS 140-2 Security Policy Template
  • pdf_file_size_bytes: 579283
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
state/policy_pdf_hash Different Different
state/policy_txt_hash Different Different
web_data/caveat When operated in FIPS mode, installed, initialized and configured as specified in Sections 1.3.1 and 8 of the Security Policy When operated in FIPS mode
web_data/certificate_pdf_url https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2020_011020_0703.pdf https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/July 2022_010822_0659_signed.pdf
web_data/date_sunset 21.09.2026
web_data/exceptions Roles, Services, and Authentication: Level 2, Physical Security: N/A, Design Assurance: Level 3, Mitigation of Other Attacks: N/A Roles, Services, and Authentication: Level 3, Design Assurance: Level 3, Mitigation of Other Attacks: N/A,
web_data/fw_versions S, o, n, i, c, O, S, , v, 6, ., 5, ., 4 S, o, n, i, c, O, S, X, , 7, ., 0, ,
web_data/historical_reason SP 800-56Arev3 transition
web_data/status historical active
web_data/tested_conf SonicOS v6.5.4 on VMware ESXi 6.5 running on Dell PowerEdge M630 with Intel Xeon E5, SonicOS v6.5.4 on VMware ESXi 6.7 running on Dell PowerEdge R630 with Intel Xeon E5 SonicOSX 7.0 on VMware ESXi 6.7 running on Dell PowerEdge R740 with Intel Xeon Platinum 8260 (Cascade Lake), SonicOSX 7.0 on VMware ESXi 7.0 running on Dell PowerEdge R740 with Intel Xeon Platinum 8260 (Cascade Lake)
web_data/validation_history
  • date: 22.09.2020
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial
  • date: 08.07.2022
  • lab: ACUMEN SECURITY, LLC
  • validation_type: Initial