This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Forcepoint Next Generation Firewall |
Forcepoint Next Generation Firewall |
|
---|---|---|
cert_id | 4867 | 3317 |
dgst | af93a06c80895edf | e6d41d208672a4e5 |
heuristics/algorithms | AES-CFB128A2209, KDF IKEv1A2155, HMAC-SHA2-224A2166, ECDSA SigGen (FIPS186-4)A2155, SHA2-224A2166, KAS-FFC-SSC Sp800-56Ar3A2155, AES-CBCA2166, SHA2-256A2166, HMAC-SHA-1A2166, RSA SigGen (FIPS186-4)A2155, KAS-ECC-SSC Sp800-56Ar3A2155, KDF SP800-108A2209, HMAC-SHA2-256A2166, Safe Primes Key VerificationA2155, AES-KWPA2155, Counter DRBGA2155, HMAC-SHA2-384A2166, AES-ECBA2209, RSA KeyGen (FIPS186-4)A2155, SHA-1A2166, SHA3-256A2167, AES-GCMA2166, ECDSA KeyGen (FIPS186-4)A2155, PBKDFA2209, KDF IKEv2A2155, ECDSA SigVer (FIPS186-4)A2155, Safe Primes Key GenerationA2155, SHA2-512A2166, SHA2-384A2166, HMAC-SHA2-512A2166, RSA SigVer (FIPS186-4)A2155, TLS v1.2 KDF RFC7627A2155, ECDSA KeyVer (FIPS186-4)A2155 | ECDSA#1339, KBKDF#231, KTS#3672, HMAC#3667, RSA#2959, SHS#4423, KTS#2775, DRBG#1946, KTS#2776, CVL#1957, SHS#4427, CVL#1960, CVL#1959, Triple-DES#2779, AES#5514, HMAC#3671, RSA#2957, SHS#4175, Triple-DES#2632, AES#5515, KTS#2777, KTS#3671, DRBG#2180, DRBG#2181, KBKDF#230, SHS#4422, ECDSA#1482, SHS#4426, HMAC#3670, CVL#1958, Triple-DES#2777, KTS#3668, KTS#2779, AES#5512, ECDSA#1480, AES#5516, HMAC#3668, SHS#4424, Triple-DES#2774, KTS#2774, KTS#2632, KTS#3429, HMAC#3672, SHS#4425, KTS#3667, RSA#2958, DRBG#2179, Triple-DES#2775, AES#5511, KTS#3669, KTS#2778, KBKDF#232, CVL#1961, AES#5513, KTS#3670, Triple-DES#2776, AES#5168, CVL#1676, CVL#1962, RSA#2777, HMAC#3669, ECDSA#1481, HMAC#3429, Triple-DES#2778 |
heuristics/cpe_matches | {} | cpe:2.3:a:forcepoint:next_generation_firewall:6.4.1:*:*:*:*:*:*:*, cpe:2.3:a:forcepoint:next_generation_firewall_security_management_center:6.4.1:*:*:*:*:*:*:* |
heuristics/extracted_versions | 6.10.3.26158 | 6.4.1.20056 |
heuristics/related_cves | {} | CVE-2019-6143, CVE-2019-6147, CVE-2021-41530 |
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When installed, initialized and configured as specified in Section 11.1 of the Security Policy. The tamper evident seals ACFIPS3 Forcepoint NGFW FIPS Kit installed as indicated in the Security Policy | When configured as specified in the section 3 Secure Operation of the Security Policy with tamper evident labels SKU ACFIPS3 Forcepoint NGFW FIPS Kit installed as indicated in the Security Policy. |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Consolidated-Nov2018.pdf | |
web_data/date_sunset | 05.11.2029 | |
web_data/description | The NGFW appliances are high-performance network security appliances that add a broad range of built-in security features, including VPN, IPS, anti-evasion, TLS inspection, SD-WAN, and mission-critical application proxies, to a traditional firewall and provides end-to-end protection across the entire enterprise network. | Forcepoint NGFW is a next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations. With Forcepoint NGFW, painlessly handle the rapid shift to encrypted transmissions for both incoming and outgoing traffic. |
web_data/exceptions | Operational environment: N/A, Non-invasive security: N/A, Mitigation of other attacks: N/A | Mitigation of Other Attacks: N/A, , |
web_data/fw_versions | 6, ., 1, 0, ., 3, ., 2, 6, 1, 5, 8, , , , , , | 6, ., 4, ., 1, ., 2, 0, 0, 5, 6, ., f, i, p, s, ., 8 |
web_data/historical_reason | SP 800-56Arev3 transition | |
web_data/hw_versions | [, 2, 2, 0, 1, ,, , 2, 2, 0, 5, ,, , 2, 2, 1, 0, ,, , 3, 4, 0, 1, , a, n, d, , 3, 4, 1, 0, ], , w, i, t, h, , F, o, r, c, e, p, o, i, n, t, , N, G, F, W, , F, I, P, S, , K, i, t, , A, C, F, I, P, S, 3 | 1, 1, 0, 1, ,, , 2, 1, 0, 1, ,, , 2, 1, 0, 5, ,, , 3, 3, 0, 5, ,, , a, n, d, , 6, 2, 0, 5, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |
web_data/standard | FIPS 140-3 | FIPS 140-2 |
web_data/status | active | historical |
web_data/validation_history |
|
|