This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Forcepoint Next Generation Firewall |
Forcepoint Next Generation Firewall |
|
---|---|---|
cert_id | 4867 | 3317 |
dgst | af93a06c80895edf | e6d41d208672a4e5 |
heuristics/algorithms | AES-CFB128A2209, PBKDFA2209, HMAC-SHA2-224A2166, KAS-FFC-SSC Sp800-56Ar3A2155, RSA KeyGen (FIPS186-4)A2155, ECDSA KeyGen (FIPS186-4)A2155, KDF IKEv1A2155, SHA2-256A2166, AES-ECBA2209, KDF IKEv2A2155, AES-CBCA2166, ECDSA SigGen (FIPS186-4)A2155, SHA2-512A2166, ECDSA SigVer (FIPS186-4)A2155, HMAC-SHA2-256A2166, SHA3-256A2167, HMAC-SHA2-384A2166, RSA SigVer (FIPS186-4)A2155, SHA-1A2166, HMAC-SHA2-512A2166, SHA2-384A2166, AES-GCMA2166, HMAC-SHA-1A2166, TLS v1.2 KDF RFC7627A2155, AES-KWPA2155, KAS-ECC-SSC Sp800-56Ar3A2155, Safe Primes Key VerificationA2155, KDF SP800-108A2209, RSA SigGen (FIPS186-4)A2155, SHA2-224A2166, ECDSA KeyVer (FIPS186-4)A2155, Safe Primes Key GenerationA2155, Counter DRBGA2155 | ECDSA#1481, KBKDF#230, KTS#2778, CVL#1957, DRBG#2179, KTS#2776, KTS#3667, DRBG#2181, KTS#2632, CVL#1960, KTS#3672, KTS#3669, SHS#4423, DRBG#1946, SHS#4424, KTS#2774, KTS#2779, KTS#2775, HMAC#3669, AES#5168, KTS#3668, Triple-DES#2777, RSA#2958, KTS#3670, KTS#3429, SHS#4175, SHS#4422, DRBG#2180, SHS#4427, RSA#2777, Triple-DES#2778, HMAC#3668, CVL#1962, HMAC#3667, HMAC#3672, Triple-DES#2775, CVL#1961, KTS#2777, Triple-DES#2779, HMAC#3670, AES#5514, CVL#1676, RSA#2957, SHS#4426, Triple-DES#2776, AES#5515, AES#5513, HMAC#3429, ECDSA#1339, RSA#2959, ECDSA#1482, KBKDF#231, CVL#1959, KTS#3671, AES#5512, SHS#4425, HMAC#3671, KBKDF#232, Triple-DES#2774, AES#5511, AES#5516, CVL#1958, Triple-DES#2632, ECDSA#1480 |
heuristics/cpe_matches | {} | cpe:2.3:a:forcepoint:next_generation_firewall_security_management_center:6.4.1:*:*:*:*:*:*:*, cpe:2.3:a:forcepoint:next_generation_firewall:6.4.1:*:*:*:*:*:*:* |
heuristics/extracted_versions | 6.10.3.26158 | 6.4.1.20056 |
heuristics/related_cves | {} | CVE-2019-6147, CVE-2021-41530, CVE-2019-6143 |
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
|
|
pdf_data/keywords/symmetric_crypto |
|
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/hash_function |
|
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
|
|
pdf_data/keywords/ecc_curve |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/standard_id |
|
|
pdf_data/policy_metadata |
|
|
state/policy_pdf_hash | Different | Different |
state/policy_txt_hash | Different | Different |
web_data/caveat | When installed, initialized and configured as specified in Section 11.1 of the Security Policy. The tamper evident seals ACFIPS3 Forcepoint NGFW FIPS Kit installed as indicated in the Security Policy | When configured as specified in the section 3 Secure Operation of the Security Policy with tamper evident labels SKU ACFIPS3 Forcepoint NGFW FIPS Kit installed as indicated in the Security Policy. |
web_data/certificate_pdf_url | https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/Consolidated-Nov2018.pdf | |
web_data/date_sunset | 05.11.2029 | |
web_data/description | The NGFW appliances are high-performance network security appliances that add a broad range of built-in security features, including VPN, IPS, anti-evasion, TLS inspection, SD-WAN, and mission-critical application proxies, to a traditional firewall and provides end-to-end protection across the entire enterprise network. | Forcepoint NGFW is a next generation firewall that blocks malicious attacks and prevents the theft of data and intellectual property while transforming infrastructure and increasing the efficiency of your operations. With Forcepoint NGFW, painlessly handle the rapid shift to encrypted transmissions for both incoming and outgoing traffic. |
web_data/exceptions | Operational environment: N/A, Non-invasive security: N/A, Mitigation of other attacks: N/A | Mitigation of Other Attacks: N/A, , |
web_data/fw_versions | 6, ., 1, 0, ., 3, ., 2, 6, 1, 5, 8, , , , , , | 6, ., 4, ., 1, ., 2, 0, 0, 5, 6, ., f, i, p, s, ., 8 |
web_data/historical_reason | SP 800-56Arev3 transition | |
web_data/hw_versions | [, 2, 2, 0, 1, ,, , 2, 2, 0, 5, ,, , 2, 2, 1, 0, ,, , 3, 4, 0, 1, , a, n, d, , 3, 4, 1, 0, ], , w, i, t, h, , F, o, r, c, e, p, o, i, n, t, , N, G, F, W, , F, I, P, S, , K, i, t, , A, C, F, I, P, S, 3 | 1, 1, 0, 1, ,, , 2, 1, 0, 1, ,, , 2, 1, 0, 5, ,, , 3, 3, 0, 5, ,, , a, n, d, , 6, 2, 0, 5, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |
web_data/standard | FIPS 140-3 | FIPS 140-2 |
web_data/status | active | historical |
web_data/validation_history |
|
|