Certificate 2361 - SSL Visibility Appliance
intCertNum 2361
strVendorName Blue Coat Systems, Inc.
strURL http://www.bluecoat.com
strAddress1 420 N. Mary Avenue
strAddress2
strAddress3
strCity Sunnyvale
strStateProv CA
strPostalCode 94085
strCountry 94085
strContact Diana Robinson
strEmail diana.robinson@bluecoat.com
strPhone 845-454-6397
strFax
strContact2 Nick Goble
strEmail2 nick.goble@bluecoat.com
strFax2
strPhone2 978-318-7544
intCertNum 2361
strModuleName SSL Visibility Appliance
strPartNumber Hardware Versions: SV3800;
090-03064 and 080-03563 with FIPS Kit: FIPS-LABELS-SV;
Firmware Versions: 3.8.2F build 227 and 3.8.4FC
memModuleNotes When operated in FIPS mode with the tamper evident seals installed as indicated in the Security Policy
str140Version 140-2
_sp_ Security Policy   [pdf][html][txt]
_cert_ Certificate   [pdf]
strPURL
strModuleType Hardware
strValidationDate 04/23/2015;09/04/2015
intOverallLevel 2
memIndividualLevelNotes -Design Assurance: Level 3;-Mitigation of Other Attacks: N/A
strFIPSAlgorithms AES (Certs. #3195 and #3496);
Triple-DES (Certs. #1821 and #1968);
RSA (Certs. #1625, #1238 and #1794);
SHS (Certs. #2642 and #2885);
HMAC (Certs. #2013 and #2230);
ECDSA (Certs. #584 and #711);
DRBG (Certs. #669 and #866);
PBKDF (vendor affirmed);
CVL (Certs. #429 and #562)
strOtherAlgorithms RSA (key wrapping;
key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
EC Diffie-Hellman (key agreement: key establishment methodology provides between 112 and 256 bits of encryption strength;
non-compliant less than 112 bits of encryption strength);
TRNG;
NDRNG;
MD5;
RC4;
HMAC-MD5;
Camelia;
DES;
ChaCha20-Poly1305
strConfiguration Multi-chip standalone
memModuleDescription The SSL Visibility Appliance is designed to detect SSL traffic and then under policy control to ""inspect"" the traffic. Inspection involves decrypting and re-encrypting the traffic to gain access to the clear text then passing this data to one or more associated security appliance(s) that need to see decrypted traffic.
intModuleCount 1
memAdditionalNotes 09/04/15: Added FW 3.8.4FC, AES 3496, Triple-DES 1968, RSA 1794, SHS 2885, HMAC 2230, ECDSA 711, DRBG 866, CVL 562 and updated the security policy.
strFirstValidtionDate 04/23/15 00:00:00
strLabName CGI
strValidationYear 2015