BIG-IP Tenant Cryptographic Module

Certificate #4945

Webpage information ?

Status active
Validation dates 17.01.2025
Sunset date 16-01-2027
Standard FIPS 140-3
Security level 2
Type Firmware
Embodiment Multi-Chip Stand Alone
Caveat Interim validation. When operated in approved mode. When installed, initialized, and configured as specified in Section 11 of the Security Policy. The tamper evident labels contained in F5-ADD-BIG-FIPS140 kit and panel fillers installed as indicated in the Security Policy section 7.
Exceptions
  • Operational environment: N/A
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
Description BIG-IP Tenant Cryptographic Module, Application Delivery Controller and Firewall software running on running on F5 hardware and the underlying platform layer.
Version (Firmware) 17.1.0.1
Tested configurations
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r10900 with Intel® Xeon® Gold 6312U Ice Lake
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r10920-DF with Intel® Xeon® Gold 6312U Ice Lake
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r4800 with Intel® Atom® P5342 Snow Ridge
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r5900 with Intel® Xeon® 4314 Silver Ice Lake
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r5920-DF with Intel® Xeon® 4314 Silver Ice Lake
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.7.0 running on r12900-DS with Intel® Xeon® Platinum 8351N Ice Lake
  • BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-C 1.6.0 running on VELOS CX410 BX110 with Intel® Xeon® D-2177NT Skylake
Vendor F5, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES, AES-128, AES-256, AES-, CAST, RC4, DES, Triple-DES, TDES, Camellia, SM4, SEED, HMAC, HMAC-SHA-384, CMAC
Asymmetric Algorithms
ECDSA, EdDSA, ECC, Diffie-Hellman, DSA
Hash functions
SHA-1, SHA3-256, MD5
Schemes
MAC, Key exchange, Key Exchange, Key Agreement
Protocols
SSH, SSL, TLS, TLS v1.2, TLS1.2, IKEv1, IKEv2, IKE, IPsec
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-384, Ed25519
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM, XTS

JavaCard API constants
SM2
Trusted Execution Environments
PSP, SSC

Security level
Level 2, Level 1

Standards
FIPS 140-3, FIPS PUB 140-3, FIPS 197, FIPS 186-4, FIPS180-4, FIPS 198-1, FIPS140-3, FIPS186-4, FIPS197, FIPS198-1, NIST SP 800-140B, SP 800-38F, PKCS#1, PKCS #1, RFC7627, RFC 5288, RFC 7627, ISO/IEC 24759, ISO/IEC 19790

File metadata

Title 140-3-SecurityPolicy_F5_Tenant17
Author Marylene Palard
Creation date D:20250109234730Z00'00'
Modification date D:20250109234730Z00'00'
Pages 51
Creator Word
Producer macOS Version 14.6 (Build 23G80) Quartz PDFContext

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 24.02.2025 The certificate data changed.
    Certificate changed

    The web extraction data was updated.

    • The exceptions property was updated.
  • 27.01.2025 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name BIG-IP Tenant Cryptographic Module was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4945,
  "dgst": "dcc29e4daf71d69e",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "Safe Primes Key VerificationA3730",
        "TLS v1.2 KDF RFC7627A3730",
        "KDF SSHA3729",
        "SHA2-512A3730",
        "ECDSA SigVer (FIPS186-4)A3730",
        "ECDSA KeyGen (FIPS186-4)A3730",
        "Safe Primes Key GenerationA3730",
        "HMAC-SHA2-384A3730",
        "HMAC-SHA-1A3730",
        "AES-CBCA3730",
        "AES-CTRA3729",
        "AES-GMACA3730",
        "KAS-ECC-SSC Sp800-56Ar3A3730",
        "AES-GCMA3730",
        "SHA-1A3730",
        "KAS-FFC-SSC Sp800-56Ar3A3730",
        "RSA SigGen (FIPS186-4)A3730",
        "HMAC-SHA2-512A3730",
        "Counter DRBGA3730",
        "AES-CCMA3730",
        "AES-ECBA3729",
        "HMAC-SHA2-256A3730",
        "SHA2-256A3730",
        "SHA2-384A3730",
        "RSA SigVer (FIPS186-4)A3730",
        "RSA KeyGen (FIPS186-4)A3729",
        "ECDSA KeyVer (FIPS186-4)A3730",
        "ECDSA SigGen (FIPS186-4)A3730"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "17.1.0.1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 42
          },
          "EdDSA": {
            "EdDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 28
          },
          "DSA": {
            "DSA": 5
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "CCM": {
          "CCM": 5
        },
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 12
        },
        "OFB": {
          "OFB": 2
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 1,
          "IKEv1": 1,
          "IKEv2": 1
        },
        "IPsec": {
          "IPsec": 3
        },
        "SSH": {
          "SSH": 82
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 97,
            "TLS v1.2": 1,
            "TLS1.2": 2
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5
        },
        "KEX": {
          "Key Exchange": 1,
          "Key exchange": 2
        },
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Edwards": {
          "Ed25519": 1
        },
        "NIST": {
          "P-256": 58,
          "P-384": 52
        }
      },
      "eval_facility": {
        "atsec": {
          "atsec": 52
        }
      },
      "fips_cert_id": {
        "Cert": {
          "#1": 3
        }
      },
      "fips_certlike": {
        "Certlike": {
          "# A3729": 1,
          "# A3730": 2,
          "AES 256": 3,
          "AES-128": 1,
          "AES-256": 2,
          "HMAC-SHA- 1": 2,
          "HMAC-SHA-1": 12,
          "HMAC-SHA-384": 4,
          "HMAC-SHA384": 2,
          "PKCS #1": 2,
          "PKCS#1": 8,
          "RSA PKCS#1": 4,
          "SHA-1": 7,
          "SHA2- 224": 1,
          "SHA2- 256": 1,
          "SHA2- 512": 2,
          "SHA2-224": 4,
          "SHA2-256": 14,
          "SHA2-384": 8,
          "SHA2-512": 7,
          "SHA3-256": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 2": 3
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA3": {
            "SHA3-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "SM2": 1
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 28
        },
        "RNG": {
          "RBG": 2,
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 60,
          "FIPS 186-4": 6,
          "FIPS 197": 5,
          "FIPS 198-1": 1,
          "FIPS PUB 140-3": 2,
          "FIPS140-3": 2,
          "FIPS180-4": 2,
          "FIPS186-4": 3,
          "FIPS197": 1,
          "FIPS198-1": 1
        },
        "ISO": {
          "ISO/IEC 19790": 2,
          "ISO/IEC 24759": 2
        },
        "NIST": {
          "NIST SP 800-140B": 1,
          "SP 800-38F": 5
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 6
        },
        "RFC": {
          "RFC 5288": 2,
          "RFC 7627": 1,
          "RFC7627": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 45,
            "AES-": 1,
            "AES-128": 1,
            "AES-256": 2
          },
          "CAST": {
            "CAST": 31
          },
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 26,
            "HMAC-SHA-384": 2
          }
        },
        "miscellaneous": {
          "Camellia": {
            "Camellia": 1
          },
          "SEED": {
            "SEED": 1
          },
          "SM4": {
            "SM4": 1
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 6
        },
        "IBM": {
          "SSC": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Marylene Palard",
      "/CreationDate": "D:20250109234730Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20250109234730Z00\u002700\u0027",
      "/Producer": "macOS Version 14.6 (Build 23G80) Quartz PDFContext",
      "/Title": "140-3-SecurityPolicy_F5_Tenant17",
      "pdf_file_size_bytes": 3113748,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "37ae9836b288a554870d71fa2bf7eb0259b8e53eeff3b31ce98971c0056280ce",
    "policy_txt_hash": "34aea5eada24fd5a7c356bb508e95984cc7b6b67f6dedb7545d070aa26d53791"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "Interim validation. When operated in approved mode. When installed, initialized, and configured as specified in Section 11 of the Security Policy. The tamper evident labels contained in F5-ADD-BIG-FIPS140 kit and panel fillers installed as indicated in the Security Policy section 7.",
    "certificate_pdf_url": null,
    "date_sunset": "2027-01-16",
    "description": "BIG-IP Tenant Cryptographic Module, Application Delivery Controller and Firewall software running on running on F5 hardware and the underlying platform layer.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Operational environment: N/A",
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A"
    ],
    "fw_versions": "17.1.0.1",
    "historical_reason": null,
    "hw_versions": null,
    "level": 2,
    "mentioned_certs": {},
    "module_name": "BIG-IP Tenant Cryptographic Module",
    "module_type": "Firmware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": [
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r10900 with Intel\u00ae Xeon\u00ae Gold 6312U Ice Lake",
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r10920-DF with Intel\u00ae Xeon\u00ae Gold 6312U Ice Lake",
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r4800 with Intel\u00ae Atom\u00ae P5342 Snow Ridge",
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r5900 with Intel\u00ae Xeon\u00ae 4314 Silver Ice Lake",
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.5.1 running on r5920-DF with Intel\u00ae Xeon\u00ae 4314 Silver Ice Lake",
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-A 1.7.0 running on r12900-DS with Intel\u00ae Xeon\u00ae Platinum 8351N Ice Lake",
      "BIG-IP 17.1.0.1 Tenant Cryptographic Module on F5OS-C 1.6.0 running on VELOS CX410 BX110 with Intel\u00ae Xeon\u00ae D-2177NT Skylake"
    ],
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-01-17",
        "lab": "ATSEC INFORMATION SECURITY CORP",
        "validation_type": "Initial"
      }
    ],
    "vendor": "F5, Inc.",
    "vendor_url": "f5.com"
  }
}