2016 Symantec Corporation This document may be freely reproduced & distributed whole & intact including this copyright
notice.
5
1. Introduction
1.1 Purpose
This document is a non-proprietary Cryptographic Module Security Policy for the
SSL Visibility Appliance models SV3800, SV3800B, and SV3800B-20. The SV3800
should be operated with the 3.8.2F, 3.8.4FC, or 3.10 firmware version. The
SV3800B and SV3800B-20 require the latest 3.10 firmware version to operate. This
policy was prepared as part of the Level 2 FIPS 140-2 validation of the module,
and may freely be reproduced and distributed in its entirety (without
modification).
Federal Information Processing Standards (FIPS) 140-2, Security Requirements for
Cryptographic Modules, specifies the U.S. and Canadian Governments’
requirements for cryptographic modules. The following pages describe how the
SSL Visibility Appliance meets these requirements and how to operate the device
in a mode compliant with FIPS 140-2.
More information about the FIPS 140-2 standard and validation program is
available on the National Institute of Standards and Technology (NIST)
Cryptographic Module Validation Program (CMVP) website at:
http://
csrc.nist.gov/groups/STM/cmvp/index.html
.
In this document, the SSL Visibility Appliance models SV3800, SV3800B, and
SV3800B-20 are referred to as the SV3800, SV3800B, and SV3800B-20, the
hardware module, the cryptographic module, or the module.
1.2 References
This document only deals with the operation and capabilities of the SV3800,
SV3800B, and SV3800B-20 within the technical terms of a FIPS 140-2
cryptographic module security policy. More information on the SV3800,
SV3800B, and SV3800B-20 is available from the following sources:
•
, contains information on
the full line of products from Blue Coat.
•
The Symantec customer website,
https://bto.bluecoat.com,
contains
product documentation, software downloads, and other information on
the full line of products from Blue Coat.
http://csrc.nist.gov/groups/STM/cmvp/index.html
contains contact information for answers to technical or sales-related questions
for the module.
1.3 Document Organization
This Security Policy is one document in the FIPS 140-2 Submission Package. In
addition to this document, the Submission Package contains:
•
Vendor Evidence
•
Finite State Machine
•
Other supporting documentation as additional references
•
Validation Submission Summary