This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Forcepoint Next Generation Firewall |
Forcepoint Next Generation Firewall |
|
---|---|---|
cert_id | 4867 | 3317 |
dgst | af93a06c80895edf | e6d41d208672a4e5 |
heuristics/algorithms | Safe Primes Key VerificationA2155, HMAC-SHA2-512A2166, SHA2-384A2166, ECDSA SigGen (FIPS186-4)A2155, RSA SigVer (FIPS186-4)A2155, KAS-ECC-SSC Sp800-56Ar3A2155, HMAC-SHA-1A2166, ECDSA KeyVer (FIPS186-4)A2155, SHA2-512A2166, AES-GCMA2166, AES-ECBA2209, SHA3-256A2167, HMAC-SHA2-384A2166, TLS v1.2 KDF RFC7627A2155, KDF IKEv1A2155, KDF SP800-108A2209, KAS-FFC-SSC Sp800-56Ar3A2155, AES-CBCA2166, RSA KeyGen (FIPS186-4)A2155, HMAC-SHA2-256A2166, KDF IKEv2A2155, HMAC-SHA2-224A2166, Counter DRBGA2155, Safe Primes Key GenerationA2155, ECDSA KeyGen (FIPS186-4)A2155, SHA2-256A2166, SHA2-224A2166, AES-CFB128A2209, SHA-1A2166, ECDSA SigVer (FIPS186-4)A2155, RSA SigGen (FIPS186-4)A2155, PBKDFA2209, AES-KWPA2155 | ECDSA#1339, Triple-DES#2774, DRBG#1946, CVL#1961, KTS#3670, SHS#4427, DRBG#2179, RSA#2777, KTS#3671, HMAC#3669, KTS#2778, KTS#3669, Triple-DES#2776, SHS#4423, Triple-DES#2632, KTS#2779, KTS#3668, HMAC#3667, ECDSA#1480, KTS#2775, SHS#4424, KBKDF#232, DRBG#2181, ECDSA#1482, CVL#1958, HMAC#3672, AES#5515, AES#5516, CVL#1962, HMAC#3429, SHS#4426, Triple-DES#2775, KTS#3672, AES#5513, CVL#1959, ECDSA#1481, CVL#1957, KBKDF#230, SHS#4425, Triple-DES#2778, SHS#4175, DRBG#2180, AES#5511, RSA#2959, KTS#2774, HMAC#3670, AES#5512, RSA#2957, AES#5168, KTS#3429, HMAC#3671, KTS#2632, Triple-DES#2777, SHS#4422, KTS#2777, HMAC#3668, KTS#2776, CVL#1960, Triple-DES#2779, CVL#1676, KBKDF#231, RSA#2958, KTS#3667, AES#5514 |
heuristics/cpe_matches | {} | cpe:2.3:a:forcepoint:next_generation_firewall_security_management_center:6.4.1:*:*:*:*:*:*:*, cpe:2.3:a:forcepoint:next_generation_firewall:6.4.1:*:*:*:*:*:*:* |
heuristics/extracted_versions | 6.10.3.26158 | 6.4.1.20056 |
heuristics/related_cves | {} | CVE-2021-41530, CVE-2019-6147, CVE-2019-6143 |
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When installed, initialized and configured as specified in Section 11.1 of the Security Policy. The tamper evident seals ACFIPS3 Forcepoint NGFW FIPS Kit installed as indicated in the Security Policy | When configured as specified in the section 3 Secure Operation of the Security Policy with tamper evident labels SKU ACFIPS3 Forcepoint NGFW FIPS Kit installed as indicated in the Security Policy. |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Consolidated-Nov2018.pdf | |
web_data/date_sunset | 05.11.2029 | |
web_data/description | The NGFW appliances are high-performance network security appliances that add a broad range of built-in security features, including VPN, IPS, anti-evasion, TLS inspection, SD-WAN, and mission-critical application proxies, to a traditional firewall and provides end-to-end protection across the entire enterprise network. | Forcepoint NGFW is a next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations. With Forcepoint NGFW, painlessly handle the rapid shift to encrypted transmissions for both incoming and outgoing traffic. |
web_data/exceptions | Operational environment: N/A, Non-invasive security: N/A, Mitigation of other attacks: N/A, Documentation requirements: N/A, Cryptographic module security policy: N/A | Mitigation of Other Attacks: N/A, , , , |
web_data/fw_versions | 6, ., 1, 0, ., 3, ., 2, 6, 1, 5, 8, , , , , , | 6, ., 4, ., 1, ., 2, 0, 0, 5, 6, ., f, i, p, s, ., 8 |
web_data/historical_reason | SP 800-56Arev3 transition | |
web_data/hw_versions | [, 2, 2, 0, 1, ,, , 2, 2, 0, 5, ,, , 2, 2, 1, 0, ,, , 3, 4, 0, 1, , a, n, d, , 3, 4, 1, 0, ], , w, i, t, h, , F, o, r, c, e, p, o, i, n, t, , N, G, F, W, , F, I, P, S, , K, i, t, , A, C, F, I, P, S, 3 | 1, 1, 0, 1, ,, , 2, 1, 0, 1, ,, , 2, 1, 0, 5, ,, , 3, 3, 0, 5, ,, , a, n, d, , 6, 2, 0, 5, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |
web_data/standard | FIPS 140-3 | FIPS 140-2 |
web_data/status | active | historical |
web_data/validation_history |
|
|