2016 Symantec Corporation This document may be freely reproduced & distributed whole & intact including this copyright
notice.
32
SV3800, SV3800B, and SV3800B-20 Security Policy
Table 2
–11 Recom m ended Frequency of Physical Security Checks
Physical Security
Mechanism
Recommended Test
Frequency
Guidance
Tamper evident labels
Monthly
Examine the module for any sign of
removal, replacement or tampering
with the tamper evident labels. See
for
more details.
Integrity of module
enclosure
Monthly
Examine the module for any
evidence of new openings or
modifications that allow visibility
or access to the internal
components.
2.7 Non-Modifiable Operational Environment
The operational environment requirements in FIPS 140-2 do not apply to the
SV3800/SV3800B/SV3800B-20, as the module does not provide a general
purpose operating system, nor does it allow operators to load software that is
not cryptographically signed as being trusted. The SV3800/SV3800B/SV3800B-
20 uses a proprietary non-modifiable operation environment.
2.8 Cryptographic Key Management
The SV3800/SV3800B/SV3800B-20 implements the FIPS-Approved algorithms
. Non- FIPS-Approved algorithms are listed in
Table 2
–12 FIPS Approved Algorithms
Algorithm
SSL Visibility Appliance
Crypto Library Certificate
Numbers
NFP 3240-A2
Certificate
Number
Symmetric Key Algorithms
AES: CBC, , GCM modes for 128 and 256 bit
CFB128 mode for 128 bit
3195, 3496, and 4106
Not Implemented
Triple-DES: CBC mode keying option 1
1821, 1968, and 2244
Not Implemented
Asymmetric Key Algorithms
RSA (186-4) key generation - 2048 and 3072 bit
1625, 1794, and 2222
Not Implemented
RSA (186-4) signature generation
–
2048 and 3072
bit
1625, 1794, and 2222
Not Implemented
RSA (186-2 Legacy Testing) signature verification
–
1024, 1536, 2048, 3072, and 4096-bit
1625, 1794, and 2222
Not Implemented