Nokia VPN Appliance

Certificate #1074

Webpage information

Status historical
Historical reason RNG SP800-131A Revision 1 Transition
Validation dates 24.12.2008 , 28.05.2009
Standard FIPS 140-2
Security level 2
Type Hardware
Embodiment Multi-Chip Stand Alone
Caveat When operated in FIPS mode
Description The Nokia VPN Applicances are full-featured enterprise systems designed for small to medium enterprises, with Service Provider flexibility and rapid serviceability option in a single rack space. When combined with Check Point VPN-1 these platforms provide reliable, easy to manage distributed security and access.
Version (Hardware) IP390 and IP560
Version (Firmware) IPSO v4.1 and Check Point VPN-1 NGX (R60) [HFA-03]
Vendor Check Point Software Technologies Ltd.
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, Twofish, CAST, DES, Triple-DES, TDES, Blowfish, HMAC
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, SHA1, MD5
Schemes
MAC, Key Exchange, Key agreement, Key Agreement
Protocols
SSHv2, SSH, SSHv1, SSL, TLS, TLS v1.0, IKE, IPsec, VPN
Randomness
PRNG, RNG
Block cipher modes
CBC

Vendor
Microsoft

Security level
Level 2

Standards
FIPS 140-2, FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 198, FIPS PUB 180-1, FIPS PUB 186-2, PKCS #1, RFC 2104, RFC 2404, RFC 2246

File metadata

Title Microsoft Word - 1B- Nokia VPN Appliance_1.2 _IP390_IP560__Nov2008_JS_edit.…
Author josmith7
Creation date D:20081106154545-05'00'
Modification date D:20081107150117-05'00'
Pages 43
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 7.0.5 (Windows)

References

Outgoing
  • 314 - historical - Model 330J with JCCOS Applet

Heuristics

No heuristics are available for this certificate.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 1074,
  "dgst": "fde3f2e7127f6810",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "HMAC#207",
        "HMAC#251",
        "SHS#564",
        "RSA#215",
        "Triple-DES#510",
        "DSA#204",
        "RNG#229",
        "RSA#213",
        "SHS#417",
        "RNG#230",
        "SHS#509",
        "AES#397",
        "HMAC#248",
        "RSA#167",
        "DSA#202",
        "SHS#508",
        "Triple-DES#435",
        "HMAC#176",
        "Triple-DES#507",
        "Triple-DES#466",
        "AES#442",
        "RNG#275",
        "RSA#211",
        "RNG#277",
        "SHS#567",
        "HMAC#208",
        "HMAC#146",
        "Triple-DES#465",
        "SHS#469",
        "AES#497",
        "Triple-DES#406",
        "AES#342"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.1"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "314"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "314"
        ]
      }
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": [
        "314"
      ]
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 24
          },
          "DSA": {
            "DSA": 23
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 38
        },
        "IPsec": {
          "IPsec": 2
        },
        "SSH": {
          "SSH": 28,
          "SSHv1": 1,
          "SSHv2": 26
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 28,
            "TLS v1.0": 1
          }
        },
        "VPN": {
          "VPN": 38
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 6
        },
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1,
          "#146": 1,
          "#167": 1,
          "#202": 1,
          "#204": 1,
          "#207": 1,
          "#208": 1,
          "#211": 1,
          "#215": 1,
          "#229": 1,
          "#230": 1,
          "#248": 1,
          "#275": 1,
          "#314": 1,
          "#397": 1,
          "#406": 1,
          "#417": 1,
          "#465": 1,
          "#466": 1,
          "#497": 1,
          "#507": 1,
          "#508": 1,
          "#509": 1,
          "#564": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "#146 SHS": 1,
          "#406 HMAC": 1,
          "DES (40": 2,
          "DES1": 1,
          "DSA #202": 1,
          "Diffie-Hellman (160": 1,
          "Diffie-Hellman (320": 1,
          "Diffie-Hellman 1024": 2,
          "HMAC #248": 2,
          "HMAC SHA- 1": 1,
          "HMAC SHA-1": 7,
          "HMAC-SHA-1": 1,
          "HMAC-SHA-1 (20": 1,
          "HMAC-SHA-1-96": 2,
          "PKCS #1": 2,
          "RSA #211": 1,
          "SHA- 1": 1,
          "SHA-1": 13,
          "SHA1": 1,
          "SHS #564": 1
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 2": 6
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 13,
            "SHA1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 14
        },
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 29,
          "FIPS PUB 180-1": 1,
          "FIPS PUB 186-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198": 1,
          "FIPS PUB 46-3": 3
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 2246": 1,
          "RFC 2404": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 11
          },
          "CAST": {
            "CAST": 2
          },
          "Twofish": {
            "Twofish": 2
          }
        },
        "DES": {
          "3DES": {
            "TDES": 2,
            "Triple-DES": 13
          },
          "DES": {
            "DES": 23
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 12
          }
        },
        "miscellaneous": {
          "Blowfish": {
            "Blowfish": 2
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/Author": "josmith7",
      "/CreationDate": "D:20081106154545-05\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20081107150117-05\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/RevInfo": "{\u0027/Label\u0027: b\u0027eg\\x1e\\x89\\xab\\xadn\\xd8(?\\xa4\\x9fm\\\\b\\xa7Kim Edit\u0027}",
      "/Title": "Microsoft Word - 1B- Nokia VPN Appliance_1.2 _IP390_IP560__Nov2008_JS_edit.\u2026",
      "pdf_file_size_bytes": 890533,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 43
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "b0605591c7b4ca16f98329ac7d857b19772811d34acfccb950f42a75cfd03396",
    "policy_txt_hash": "b5b5d95e6ecb93d39bfec7b051f1ae61830a86db6e2b68ec771a0dbdc4427d34"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "When operated in FIPS mode",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/140crt1074.pdf",
    "date_sunset": null,
    "description": "The Nokia VPN Applicances are full-featured enterprise systems designed for small to medium enterprises, with Service Provider flexibility and rapid serviceability option in a single rack space. When combined with Check Point VPN-1 these platforms provide reliable, easy to manage distributed security and access.",
    "embodiment": "Multi-Chip Stand Alone",
    "exceptions": null,
    "fw_versions": "IPSO v4.1 and Check Point VPN-1 NGX (R60) [HFA-03]",
    "historical_reason": "RNG SP800-131A Revision 1 Transition",
    "hw_versions": "IP390 and IP560",
    "level": 2,
    "mentioned_certs": {},
    "module_name": "Nokia VPN Appliance",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2008-12-24",
        "lab": "CYGNACOM SOLUTIONS INC",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2009-05-28",
        "lab": "",
        "validation_type": "Update"
      }
    ],
    "vendor": "Check Point Software Technologies Ltd.",
    "vendor_url": "http://www.checkpoint.com"
  }
}