Cisco Secure Firewall Threat Defense Cryptographic Module (FPR 3100 Series)

Certificate #4979

Webpage information ?

Status active
Validation dates 28.02.2025
Sunset date 27-02-2030
Standard FIPS 140-3
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When installed, initialized and configured as specified in Section Life-Cycle Assurance of the Security Policy. The tamper evident seals installed as indicated in the Security Policy
Exceptions
  • Roles, services, and authentication: Level 3
  • Operational environment: N/A
  • Non-invasive security: N/A
  • Mitigation of other attacks: N/A
Description Cisco Firepower Threat Defense (FTD) is a unified software image, which includes the Cisco ASA features and FirePower Services. This unified software is capable of offering the functions of ASA and FirePower deployed on various Cisco appliances.
Vendor Cisco Systems, Inc.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy ?

Symmetric Algorithms
AES-128, AES-192, AES-256, AES, AES-, CAST, HMAC
Asymmetric Algorithms
RSA 2048, ECDH, ECDHE, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1
Schemes
MAC, Key Agreement
Protocols
SSH, TLS v1.2, TLSv1.2, TLS, IKEv2, IKE, IPsec, VPN
Randomness
DRBG, RBG
Elliptic Curves
P-256, P-384, P-521
Block cipher modes
CTR, GCM

Trusted Execution Environments
PSP, SSC
Vendor
Cisco Systems, Inc, Cisco

Security level
Level 2, Level 1

Standards
FIPS 140-3, FIPS186-4, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS140-3, SP 800-140, SP 800-38A, SP 800-38D, SP 800-90A, SP 800-56A, SP 800-135, SP 800-52, NIST SP 800-90A, PKCS 1, RFC7627, RFC 5288, RFC 7296, ISO/IEC 19790

File metadata

Author Hawes, David J. (Fed)
Creation date D:20250219121856-05'00'
Modification date D:20250219121856-05'00'
Pages 66
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Heuristics ?

No heuristics are available for this certificate.

References ?

No references are available for this certificate.

Updates ?

  • 03.03.2025 The certificate was first processed.
    New certificate

    A new FIPS 140 certificate with the product name Cisco Secure Firewall Threat Defense Cryptographic Module (FPR 3100 Series) was processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 4979,
  "dgst": "e3687e2a32b9939f",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": []
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3100"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDH": {
            "ECDH": 103,
            "ECDHE": 1
          },
          "ECDSA": {
            "ECDSA": 96
          }
        },
        "FF": {
          "DH": {
            "DH": 100,
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA 2048": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CTR": {
          "CTR": 1
        },
        "GCM": {
          "GCM": 22
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 5,
          "IKEv2": 120
        },
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 138
        },
        "TLS": {
          "TLS": {
            "TLS": 154,
            "TLS v1.2": 8,
            "TLSv1.2": 134
          }
        },
        "VPN": {
          "VPN": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 6
        },
        "MAC": {
          "MAC": 21
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 34,
          "P-384": 8,
          "P-521": 12
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 3,
          "#2": 3,
          "#3": 3,
          "#9": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES-128": 5,
          "AES-192": 2,
          "AES-256": 2,
          "DRBG 384": 1,
          "HMAC- SHA-1": 2,
          "HMAC-SHA-1": 24,
          "PKCS 1": 4,
          "RSA 2048": 3,
          "SHA-1": 17,
          "SHA2- 256": 2,
          "SHA2-224": 3,
          "SHA2-256": 16,
          "SHA2-384": 10,
          "SHA2-512": 18,
          "SHA3- 256": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 1": 1,
          "Level 2": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 17
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 114
        },
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-3": 6,
          "FIPS 180-4": 9,
          "FIPS 186-4": 7,
          "FIPS 198-1": 9,
          "FIPS140-3": 6,
          "FIPS186-4": 22
        },
        "ISO": {
          "ISO/IEC 19790": 2
        },
        "NIST": {
          "NIST SP 800-90A": 2,
          "SP 800-135": 4,
          "SP 800-140": 1,
          "SP 800-38A": 2,
          "SP 800-38D": 2,
          "SP 800-52": 1,
          "SP 800-56A": 3,
          "SP 800-90A": 2
        },
        "PKCS": {
          "PKCS 1": 2
        },
        "RFC": {
          "RFC 5288": 1,
          "RFC 7296": 1,
          "RFC7627": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 25,
            "AES-": 6,
            "AES-128": 5,
            "AES-192": 2,
            "AES-256": 2
          },
          "CAST": {
            "CAST": 68
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 23
          }
        }
      },
      "tee_name": {
        "AMD": {
          "PSP": 18
        },
        "IBM": {
          "SSC": 4
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 5,
          "Cisco Systems, Inc": 70
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "Hawes, David J. (Fed)",
      "/CreationDate": "D:20250219121856-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20250219121856-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 1292642,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/740/management-center-admin-74.html",
          "https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/hardware/3100/fw-3100-install.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_garbage": false,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_pdf_hash": "eb89a3ffd31354a4bd36c810af279d4dc5035894f26b4412e9f9911a6ad12210",
    "policy_txt_hash": "1e960061bac50c790843b844d859c181f7daeb6fa8efb4635f980071c4a3a02f"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When installed, initialized and configured as specified in Section Life-Cycle Assurance of the Security Policy. The tamper evident seals installed as indicated in the Security Policy",
    "certificate_pdf_url": null,
    "date_sunset": "2030-02-27",
    "description": "Cisco Firepower Threat Defense (FTD) is a unified software image, which includes the Cisco ASA features and FirePower Services. This unified software is capable of offering the functions of ASA and FirePower deployed on various Cisco appliances.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": [
      "Roles, services, and authentication: Level 3",
      "Operational environment: N/A",
      "Non-invasive security: N/A",
      "Mitigation of other attacks: N/A"
    ],
    "fw_versions": null,
    "historical_reason": null,
    "hw_versions": null,
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Cisco Secure Firewall Threat Defense Cryptographic Module (FPR 3100 Series)",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-3",
    "status": "active",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2025-02-28",
        "lab": "GOSSAMER SECURITY SOLUTIONS INC",
        "validation_type": "Initial"
      }
    ],
    "vendor": "Cisco Systems, Inc.",
    "vendor_url": "http://www.cisco.com"
  }
}