intCertNum |
2361 |
strVendorName |
Blue Coat Systems, Inc. |
strURL |
http://www.bluecoat.com |
strAddress1 |
420 N. Mary Avenue |
strAddress2 |
|
strAddress3 |
|
strCity |
Sunnyvale |
strStateProv |
CA |
strPostalCode |
94085 |
strCountry |
94085 |
strContact |
Diana Robinson |
strEmail |
diana.robinson@bluecoat.com |
strPhone |
845-454-6397 |
strFax |
|
strContact2 |
Nick Goble |
strEmail2 |
nick.goble@bluecoat.com |
strFax2 |
|
strPhone2 |
978-318-7544 |
intCertNum |
2361 |
strModuleName |
SSL Visibility Appliance |
strPartNumber |
Hardware Versions: SV3800; 090-03064 and 080-03563 with FIPS Kit: FIPS-LABELS-SV; Firmware Versions: 3.8.2F build 227 and 3.8.4FC |
memModuleNotes |
When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
04/23/2015;09/04/2015 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A |
strFIPSAlgorithms |
AES (Certs. #3195 and #3496); Triple-DES (Certs. #1821 and #1968); RSA (Certs. #1625, #1238 and #1794); SHS (Certs. #2642 and #2885); HMAC (Certs. #2013 and #2230); ECDSA (Certs. #584 and #711); DRBG (Certs. #669 and #866); PBKDF (vendor affirmed); CVL (Certs. #429 and #562) |
strOtherAlgorithms |
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); TRNG; NDRNG; MD5; RC4; HMAC-MD5; Camelia; DES; ChaCha20-Poly1305 |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to ""inspect"" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic. |
intModuleCount |
1 |
memAdditionalNotes |
09/04/15: Added FW 3.8.4FC, AES 3496, Triple-DES 1968, RSA 1794, SHS 2885, HMAC 2230, ECDSA 711, DRBG 866, CVL 562 and updated the security policy. |
strFirstValidtionDate |
04/23/15 00:00:00 |
strLabName |
CGI |
strValidationYear |
2015 |