intCertNum |
2194 |
strVendorName |
Blue Coat Systems, Inc. |
strURL |
http://www.bluecoat.com |
strAddress1 |
420 N. Mary Avenue |
strAddress2 |
|
strAddress3 |
|
strCity |
Sunnyvale |
strStateProv |
CA |
strPostalCode |
94085 |
strCountry |
94085 |
strContact |
Diana Robinson |
strEmail |
diana.robinson@bluecoat.com |
strPhone |
845-454-6397 |
strFax |
|
strContact2 |
Tammy Green |
strEmail2 |
tammy.green@bluecoat.com |
strFax2 |
|
strPhone2 |
801-999-2973 |
intCertNum |
2194 |
strModuleName |
Blue Coat Systems SSL Visibility Appliance |
strPartNumber |
Hardware Versions: Model: SV2800; 090-03063 and 080-03562 with FIPS Label Kit: FIPS-LABELS-SV; Firmware Version: 3.5.2 build 961 |
memModuleNotes |
When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy |
str140Version |
140-2 |
_sp_ |
Security Policy [pdf][html][txt] |
_cert_ |
Certificate [pdf] |
strPURL |
|
strModuleType |
Hardware |
strValidationDate |
06/27/2014 |
intOverallLevel |
2 |
memIndividualLevelNotes |
-Design Assurance: Level 3;-Mitigation of Other Attacks: N/A |
strFIPSAlgorithms |
AES (Cert. #2642); Triple-DES (Cert. #1585); RSA (Certs. #1238 and #1352); SHS (Cert. #2215); HMAC (Cert. #1634); RNG (Cert. #1246); PBKDF (vendor affirmed); CVL (Cert. #123) |
strOtherAlgorithms |
RSA (key wrapping; key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less than 112 bits of encryption strength); EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength; non-compliant less then 112 bits of encryption strength); TRNG; NDRNG; MD5; RC4; HMAC-MD5; Camelia; DES |
strConfiguration |
Multi-chip standalone |
memModuleDescription |
The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to ""inspect"" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic. |
intModuleCount |
1 |
memAdditionalNotes |
|
strFirstValidtionDate |
06/27/14 00:00:00 |
strLabName |
CGI |
strValidationYear |
2014 |