Certificate 2637 - PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 Firewalls
intCertNum 2637
strVendorName Palo Alto Networks
strURL http://www.paloaltonetworks.com
strAddress1 4401 Great America Parkway
strAddress2
strAddress3
strCity Santa Clara
strStateProv CA
strPostalCode 95054
strCountry 95054
strContact Richard Bishop
strEmail rbishop@paloaltonetworks.com
strPhone 408-753-4000
strFax
strContact2 Jake Bajic
strEmail2 jbajic@paloaltonetworks.com
strFax2
strPhone2 408-753-4000
intCertNum 2637
strModuleName PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 Firewalls
strPartNumber Hardware Versions: PA-200 P/N 910-000015-00E Rev. E [1], PA-500 P/N 910-000006-00O Rev. O [2], PA-500-2GB P/N 910-000094-00O Rev. O [2], PA-2020 P/N 910-000004-00Z Rev. Z [3], PA-2050 P/N 910-000003-00Z Rev. Z [3], PA-3020 P/N 910-000017-00J Rev. J [4], PA-3050 P/N 910-000016-00J Rev. J [4], PA-4020 P/N 910-000002-00AB Rev. AB [5], PA-4050 P/N 910-000001-00AB Rev. AB [5], PA-4060 P/N 910-000005-00S Rev. S [5], PA-5020 P/N 910-000010-00F Rev. F [6], PA-5050 P/N 910-000009-00F Rev. F [6], PA-5060 P/N 910-000008-00F Rev. F [6] and PA-7050 P/N 910-000102-00B Rev. B with 910-000028-00B or 910-000117-00A Rev. B [7];
FIPS Kit P/Ns: 920-000084-00A Rev. A [1], 920-000005-00A Rev. A [2], 920-000004-00A Rev. A [3], 920-000081-00A Rev. A [4], 920-000003-00A Rev. A [5], 920-000037-00A Rev. A [6], and 920-000112-00A Rev. A [7];
Firmware Versions: 7.0.1-h4 and 7.0.3
memModuleNotes When operated in FIPS mode and with the tamper evident seals and opacity shields installed as indicated in the Security Policy
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Hardware
strValidationDate 05/13/2016
intOverallLevel 2
memIndividualLevelNotes -Roles, Services, and Authentication: Level 3;-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A;-Operational Environment: N/A
strFIPSAlgorithms AES (Cert. #3475);
ECDSA (Cert. #713);
RSA (Cert. #1782);
HMAC (Cert. #2220);
SHS (Cert. #2870);
DRBG (Cert. #870);
CVL (Certs. #564, #565, #566 and #567)
strOtherAlgorithms EC Diffie-Hellman (CVL Cert. #567, key agreement: key establishment methodology provides 128 bits or 192 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
Diffie-Hellman (key agreement: key establishment methodology provides 112 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
AES (Cert. #3475, key wrapping;
key establishment methodology provides 128 or 256 bits of encryption strength);
RSA (key wrapping;
key establishment methodology provides 112 bits or 128 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
NDRNG;
MD5;
RIPEMD;
Camellia;
SEED;
Triple-DES (non-compliant);
Blowfish;
CAST;
RC4;
UMAC;
HMAC-MD5;
HMAC-RIPEMD;
DSA (non-compliant)
strConfiguration Multi-Chip Stand Alone
memModuleDescription The Palo Alto Networks PA-200, PA-500, PA-2000 Series, PA-3000 Series, PA-4000 Series, PA-5000 Series and PA-7050 firewalls are multi-chip standalone modules that provide network security by enabling enterprises to see and control applications, users, and content using three unique identification technologies: App-ID, User-ID, and Content-ID. These identification technologies enable enterprises to create business-relevant security polices - safely enabling organizations to adopt new applications.
intModuleCount 7
memAdditionalNotes
strFirstValidtionDate 05/13/16 00:00:00
strLabName InfoGard
strValidationYear 2016