This page was not yet optimized for use on mobile devices.
Panorama 10.1 on Hardware Appliances
Certificate #4806
Webpage information ?
Security policy ?
Symmetric Algorithms
AES, CAST, DES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512, CMACAsymmetric Algorithms
RSA 2048, RSA 3072, RSA 4096, ECDH, ECDSA, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA2, MD5Schemes
Key ExchangeProtocols
SSH, TLS, TLS1.2, TLS v1.2, TLSv1.1, TLSv1.0, TLS 1.2, IKEv2Randomness
DRBG, RNGElliptic Curves
P-256, P-384, P-521Block cipher modes
ECB, CBC, CTR, CFB, GCM, CCMTLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384Security level
level 2, Level 2, Level 1Certification process
out of scope, in Section 11 will result in the module operating in a non-compliant state, which is considered out of scope of this validation. Zeroization The following procedure will zeroize the module and must beStandards
FIPS 140-3, FIPS 186-4, FIPS 198-1, FIPS 180-4, FIPS 186-2, SP 800-38A, SP 800-38D, SP 800-90B, SP 800-38F, SP 800-52, SP 800-63B, SP 800-140F, SP 800-56A, PKCS#1, RFC 3526, RFC 5288, RFC 5246, ISO/IEC 24759File metadata
Modification date | D:20240829155837--04'00 |
---|---|
Pages | 45 |
Producer | Skia/PDF m129 Google Docs Renderer |
References
OutgoingHeuristics ?
No heuristics are available for this certificate.
References ?
Updates ?
-
14.10.2024 The certificate data changed.
Certificate changed
The web extraction data was updated.
- The certificate_pdf_url property was set to
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2024_011024_0217.pdf
.
- The certificate_pdf_url property was set to
-
01.10.2024 The certificate was first processed.
New certificate
A new FIPS 140 certificate with the product name was processed.
Raw data
{
"_type": "sec_certs.sample.fips.FIPSCertificate",
"cert_id": 4806,
"dgst": "ec447ac59d239b8c",
"heuristics": {
"_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
"algorithms": {
"_type": "Set",
"elements": [
"AES-CTRA2137",
"Conditioning Component AES-CBC-MAC SP800-90BA2165",
"SHA2-224A2137",
"ECDSA KeyGen (FIPS186-4)A2137",
"ECDSA SigVer (FIPS186-4)A2137",
"RSA SigGen (FIPS186-4)A2137",
"SHA-1A2137",
"Safe Primes Key VerificationA2137",
"RSA KeyGen (FIPS186-4)A2137",
"KAS-FFC-SSC Sp800-56Ar3A2137",
"HMAC-SHA-1A2137",
"SHA2-256A2137",
"HMAC-SHA2-384A2137",
"AES-CFB128A2137",
"AES-CBCA2137",
"ECDSA SigGen (FIPS186-4)A2137",
"HMAC-SHA2-224A2137",
"KDF SSHA2137",
"KDF SNMPA2137",
"KDF TLSA2137",
"Safe Primes Key GenerationA2137",
"ECDSA KeyVer (FIPS186-4)A2137",
"AES-GCMA2137",
"HMAC-SHA2-512A2137",
"SHA2-384A2137",
"KAS-ECC-SSC Sp800-56Ar3A2137",
"HMAC-SHA2-256A2137",
"SHA2-512A2137",
"Counter DRBGA2137",
"RSA SigVer (FIPS186-4)A2137"
]
},
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"10.1",
"10.1.5"
]
},
"indirect_transitive_cves": null,
"module_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"module_prunned_references": {
"_type": "Set",
"elements": []
},
"policy_processed_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"129",
"130"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"129",
"130"
]
}
},
"policy_prunned_references": {
"_type": "Set",
"elements": [
"129",
"130"
]
},
"related_cves": null,
"verified_cpe_matches": null
},
"pdf_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
"keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 57
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA 2048": 10,
"RSA 3072": 2,
"RSA 4096": 2
}
},
"certification_process": {
"OutOfScope": {
"in Section 11 will result in the module operating in a non-compliant state, which is considered out of scope of this validation. Zeroization The following procedure will zeroize the module and must be": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"CCM": {
"CCM": 2
},
"CFB": {
"CFB": 1
},
"CTR": {
"CTR": 5
},
"ECB": {
"ECB": 2
},
"GCM": {
"GCM": 11
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKEv2": 1
},
"SSH": {
"SSH": 75
},
"TLS": {
"TLS": {
"TLS": 93,
"TLS 1.2": 1,
"TLS v1.2": 1,
"TLS1.2": 1,
"TLSv1.0": 3,
"TLSv1.1": 2
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 6
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 40,
"P-384": 30,
"P-521": 30
}
},
"eval_facility": {},
"fips_cert_id": {
"Cert": {
"#10": 1,
"#11": 2,
"#12": 2,
"#129": 1,
"#13": 1,
"#130": 1,
"#14": 1,
"#15": 1,
"#18": 1,
"#19": 1,
"#5": 1,
"#9": 1
}
},
"fips_certlike": {
"Certlike": {
"AES (128": 1,
"AES 128/192/256": 1,
"AES 256": 4,
"HMAC-SHA-1": 36,
"HMAC-SHA-256": 10,
"HMAC-SHA-384": 2,
"HMAC-SHA-512": 2,
"PKCS#1": 4,
"RSA 2048": 10,
"RSA 3072": 2,
"RSA 4096": 2,
"SHA-1": 6,
"SHA-256": 8,
"SHA-384": 1,
"SHA-512": 3,
"SHA2": 4,
"SHA2-224": 3,
"SHA2-256": 7,
"SHA2-384": 4,
"SHA2-512": 4
}
},
"fips_security_level": {
"Level": {
"Level 1": 1,
"Level 2": 3,
"level 2": 1
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 11
}
},
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 9,
"SHA-384": 2,
"SHA-512": 4,
"SHA2": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 54
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-3": 10,
"FIPS 180-4": 5,
"FIPS 186-2": 1,
"FIPS 186-4": 60,
"FIPS 198-1": 6
},
"ISO": {
"ISO/IEC 24759": 2
},
"NIST": {
"SP 800-140F": 1,
"SP 800-38A": 4,
"SP 800-38D": 2,
"SP 800-38F": 4,
"SP 800-52": 1,
"SP 800-56A": 12,
"SP 800-63B": 1,
"SP 800-90B": 9
},
"PKCS": {
"PKCS#1": 2
},
"RFC": {
"RFC 3526": 2,
"RFC 5246": 1,
"RFC 5288": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
},
"CAST": {
"CAST": 2
}
},
"DES": {
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 20,
"HMAC-SHA-256": 5,
"HMAC-SHA-384": 1,
"HMAC-SHA-512": 1
}
}
},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1
}
},
"vendor": {},
"vulnerability": {}
},
"policy_metadata": {
"/ModDate": "D:20240829155837--04\u002700",
"/Producer": "Skia/PDF m129 Google Docs Renderer",
"/Title": "",
"pdf_file_size_bytes": 4962423,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://docs.paloaltonetworks.com/panorama/10-1/panorama-admin.html",
"http://www.paloaltonetworks.com"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 45
}
},
"state": {
"_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
"module_download_ok": true,
"module_extract_ok": true,
"policy_convert_garbage": false,
"policy_convert_ok": true,
"policy_download_ok": true,
"policy_extract_ok": true,
"policy_pdf_hash": "d3d5da36a55d30a0c365cb0916a0502a407fd773295839ee5a16fdd78c4ed487",
"policy_txt_hash": "db77ab8b2326ed40f5da81630e2204f6910704f0a54c4d9c016a46f97a1941ce"
},
"web_data": {
"_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
"caveat": "When installed, initialized and configured as specified in Section 11 of the Security Policy. The tamper evident seals and Physical Kit installed as indicated in the Security Policy",
"certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/September 2024_011024_0217.pdf",
"date_sunset": "2029-09-22",
"description": "Panorama M-Series management appliances provide centralized management and visibility of Palo Alto Networks next generation firewalls. From a central location, you can gain insight into applications, users, and content traversing the firewalls. The knowledge of what is on the network, in conjunction with safe application enablement policies, maximizes protection and control while minimizing administrative effort. Your security team can centrally perform analysis, reporting, and forensics with the aggregated data over time, or on data stored on the local firewall.",
"embodiment": "Multi-Chip Stand Alone",
"exceptions": [
"Roles, services, and authentication: Level 3",
"Operational environment: N/A",
"Non-invasive security: N/A",
"Life-cycle assurance: Level 3",
"Mitigation of other attacks: N/A",
"Documentation requirements: N/A",
"Cryptographic module security policy: N/A"
],
"fw_versions": "10.1.5",
"historical_reason": null,
"hw_versions": "910-000176 with FIPS Kit 920-000208, 910-000073 with FIPS Kit 920-000145, 910-000175 with FIPS Kit 920-000209",
"level": 2,
"mentioned_certs": {},
"module_name": "Panorama 10.1 on Hardware Appliances",
"module_type": "Hardware",
"revoked_link": null,
"revoked_reason": null,
"standard": "FIPS 140-3",
"status": "active",
"sw_versions": null,
"tested_conf": null,
"validation_history": [
{
"_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
"date": "2024-09-23",
"lab": "LEIDOS CSTL",
"validation_type": "Initial"
}
],
"vendor": "Palo Alto Networks, Inc.",
"vendor_url": "http://www.paloaltonetworks.com"
}
}