This page was not yet optimized for use on mobile
devices.
Cisco 7606-S and 7609-S Routers with Supervisor SUP720-3B
Certificate #1621
Webpage information
Security policy
Symmetric Algorithms
AES, DES, Triple-DES, HMACAsymmetric Algorithms
DH, Diffie-HellmanHash functions
SHA-1, MD4, MD5Schemes
MACProtocols
SSH, SSHv2Randomness
DRBGVendor
Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
Level 2, Level 1, level 2, level 1Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 140, SP 800-90File metadata
| Title | Cisco 7606-S and 7609-S Routers with Supervisor SUP720-3B |
|---|---|
| Subject | FIPS 140-2 Security Policy |
| Author | Cisco Systems, Inc. |
| Creation date | D:20130809153545-04'00' |
| Modification date | D:20130809153657-04'00' |
| Pages | 22 |
| Creator | Acrobat PDFMaker 10.1 for Word |
| Producer | Adobe PDF Library 10.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 1621,
"dgst": "de690d1ae70d1008",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"SHS#1439",
"Triple-DES#1070",
"AES#1634",
"DRBG#88",
"RSA#808",
"HMAC#961"
]
},
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:cisco:7609-s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:7606-s:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"15.1"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"policy_prunned_references": {
"_type": "Set",
"elements": []
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 10,
"Diffie-Hellman": 4
}
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 22,
"SSHv2": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"fips_cert_id": {},
"fips_certlike": {
"Certlike": {
"AES 1634": 1,
"DRBG 88": 1,
"HMAC 961": 2,
"HMAC- SHA-1": 1,
"HMAC-SHA-1": 2,
"RSA 808": 1,
"SHA-1": 1,
"SHS 1439": 1
}
},
"fips_security_level": {
"Level": {
"Level 1": 2,
"Level 2": 4,
"level 1": 1,
"level 2": 2
}
},
"hash_function": {
"MD": {
"MD4": {
"MD4": 1
},
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 9
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 2,
"FIPS 140-2": 17,
"FIPS PUB 140-2": 1
},
"NIST": {
"SP 800-90": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"Triple-DES": 3
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 17,
"Cisco Systems": 4,
"Cisco Systems, Inc": 22
}
},
"vulnerability": {}
},
"policy_metadata": {
"/Author": "Cisco Systems, Inc.",
"/Category": "FIPS 140-2 Submission Documentation",
"/Company": "Orion Security Solutions",
"/CreationDate": "D:20130809153545-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/ModDate": "D:20130809153657-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20130809193533",
"/Subject": "FIPS 140-2 Security Policy",
"/Title": "Cisco 7606-S and 7609-S Routers with Supervisor SUP720-3B",
"pdf_file_size_bytes": 527535,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://csrc.nist.gov/groups/STM/cmvp/validation.html",
"http://www.cisco.com/",
"http://www.cisco.com/en/US/prod/collateral/routers/ps368/ps371/product_data_sheet0900aecd8057f3c8.html",
"http://csrc.nist.gov/groups/STM/index.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 22
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_json_hash": null,
"policy_pdf_hash": "b82b220dc595d5ba9eb84847ae652708874ad2a2980b4e914e0eed6d34c24406",
"policy_txt_hash": "52b26b56586cbe87c36568ac0d4e6f172269d21726a0cbd1800dc294a1f10276"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When operated in FIPS mode with the tamper evident labels and opacity shields installed as indicated in the Security Policy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertList0010.pdf",
"date_sunset": null,
"description": "The Cisco 7606-S and 7609-S routers are designed for deployment at the network edge, where robust performance and IP/Multiprotocol Label Switching services are necessary to meet the requirements of both enterprises and service providers. It enables Carrier Ethernet service providers to deploy an advanced network infrastructure that supports a range of IP video and triple-play (voice, video, and data) system applications in both the residential and business services markets. They also deliver WAN and metropolitan-area network networking solutions at the enterprise edge.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, Services, and Authentication: Level 3"
],
"fw_versions": "15.1(3)S5",
"historical_reason": "Moved to historical list due to sunsetting",
"hw_versions": "7606-S and 7609-S with SUP720-3B",
"level": 2,
"mentioned_certs": {},
"module_name": "Cisco 7606-S and 7609-S Routers with Supervisor SUP720-3B",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-2",
"status": "historical",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2011-10-28",
"lab": "SAIC-VA",
"validation_type": "Initial"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2012-02-09",
"lab": "SAIC-VA",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2012-02-23",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2012-07-09",
"lab": "",
"validation_type": "Update"
},
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2013-08-16",
"lab": "Leidos Accredited Testing \u0026 Evaluation (AT\u0026E) Lab",
"validation_type": "Update"
}
],
"vendor": "Cisco Systems, Inc.",
"vendor_url": "http://www.cisco.com"
}
}