HP BladeSystem c-Class Virtual Connect Module

Certificate #2501

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 18.12.2015
Standard FIPS 140-2
Security level 1
Type Firmware
Embodiment Multi-Chip Embedded
Caveat When installed, initialized and configured as specified in Section 3.1 of the Security Policy
Exceptions
  • Roles, Services, and Authentication: Level 2
  • Mitigation of Other Attacks: N/A
Description Virtual Connect implements server edge virtualization between the server and data center infrastructure allowing networks to communicate with individual servers or pools of HP BladeSystem server blades. Virtual Connect simplifies the setup and administration of server LAN and SAN connections.
Version (Firmware) 4.41
Tested configurations
  • HP Virtual Connect Flex-10 10Gb Ethernet Blade
  • HP Virtual Connect Flex-10/10D Blade
  • HP Virtual Connect FlexFabric 10Gb/24-Port Blade
  • HP Virtual Connect FlexFabric 20/40 F8 Blade
Vendor Hewlett Packard Enterprise Development LP
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, DES, Triple-DES, HMAC
Asymmetric Algorithms
ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, PBKDF2, PBKDF
Schemes
MAC, Key Agreement
Protocols
SSH, SSL, TLS, TLS 1.2
Randomness
DRBG
Libraries
OpenSSL
Block cipher modes
ECB, CBC, CTR, OFB, GCM

Vendor
Broadcom

Security level
Level 1

Standards
FIPS 140-2, FIPS 186-4, SP 800-132, NIST SP 800-132, NIST SP 800-38D, SP 800-90A, PKCS37

File metadata

Title Security Policy
Subject HP BladeSystem c-Class Virtual Connect Module
Author Manoj Maskara
Creation date D:20151208150211-05'00'
Modification date D:20151208150211-05'00'
Pages 33
Creator Microsoft® Word 2013
Producer Microsoft® Word 2013

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 2501,
  "dgst": "dafff407d7450f62",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "AES#3334",
        "RSA#1713",
        "SHS#2769",
        "CVL#488",
        "Triple-DES#1904",
        "HMAC#2125",
        "DRBG#776"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.41"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 2
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 8
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "SSH": {
          "SSH": 45
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 45,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES GCM IV 96": 1,
          "AES GCM33": 1,
          "AES29": 1,
          "DRBG 48": 1,
          "Diffie-Hellman 24": 1,
          "HMAC SHA-1": 3,
          "HMAC SHA-256": 2,
          "HMAC SHA-384": 1,
          "HMAC SHA-512": 1,
          "HMAC39": 2,
          "PKCS37": 2,
          "RSA24": 1,
          "SHA-1": 4,
          "SHA-256": 4,
          "SHA-384": 3,
          "SHA-512": 3,
          "SHA-512 2125": 1,
          "SHA-512 2769": 1,
          "SHA38": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 4
        }
      },
      "hash_function": {
        "PBKDF": {
          "PBKDF": 2,
          "PBKDF2": 14
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 33
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 25,
          "FIPS 186-4": 2
        },
        "NIST": {
          "NIST SP 800-132": 1,
          "NIST SP 800-38D": 1,
          "SP 800-132": 1,
          "SP 800-90A": 12
        },
        "PKCS": {
          "PKCS37": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 3
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 9
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Broadcom": {
          "Broadcom": 1
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Manoj Maskara",
      "/CreationDate": "D:20151208150211-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20151208150211-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2013",
      "/Subject": "HP BladeSystem c-Class Virtual Connect Module",
      "/Title": "Security Policy",
      "pdf_file_size_bytes": 1183154,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm",
          "http://h20195.www2.hp.com/V2/GetDocument.aspx?docname=4AA4-8174ENW\u0026cc=us\u0026lc=en",
          "http://www.corsec.com/",
          "http://csrc.nist.gov/groups/STM/cmvp",
          "mailto:[email protected]",
          "http://www.hpe.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "416933dc8d870390cd67558550a9470f57568d3c7503ea8baf860c4dc35c5912",
    "policy_txt_hash": "36da91096fc5ddafcde6548ded2cd6d3ab609c3d8903ad6d77cdf4ffecf4d5d6"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section 3.1 of the Security Policy",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertDec2015.pdf",
    "date_sunset": null,
    "description": "Virtual Connect implements server edge virtualization between the server and data center infrastructure allowing networks to communicate with individual servers or pools of HP BladeSystem server blades. Virtual Connect simplifies the setup and administration of server LAN and SAN connections.",
    "embodiment": "Multi-Chip Embedded",
    "exceptions": [
      "Roles, Services, and Authentication: Level 2",
      "Mitigation of Other Attacks: N/A"
    ],
    "fw_versions": "4.41",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": null,
    "level": 1,
    "mentioned_certs": {},
    "module_name": "HP BladeSystem c-Class Virtual Connect Module",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": [
      "HP Virtual Connect Flex-10 10Gb Ethernet Blade",
      "HP Virtual Connect Flex-10/10D Blade",
      "HP Virtual Connect FlexFabric 10Gb/24-Port Blade",
      "HP Virtual Connect FlexFabric 20/40 F8 Blade"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2015-12-18",
        "lab": "CGI Information Systems \u0026 Management Consultants Inc",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Hewlett Packard Enterprise Development LP",
    "vendor_url": "http://www.hpe.com"
  }
}