Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560
CSV information ?
Status | archived |
---|---|
Valid from | 13.04.2009 |
Valid until | 20.07.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Cisco Systems, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | ALC_FLR.1, EAL4+ |
Maintenance updates | Cisco Adaptive Security Appliances 5505, 5510, 5520, 5540 and 5550, ASA VPN Version 7.2(4), VPN Client 5.0.05.0290 (30.04.2009) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESHash functions
SHA-1, MD5Schemes
MACProtocols
SSH, SSL, TLS, VPNVendor
Cisco, Cisco SystemsSecurity level
EAL 4, EAL4+, EAL4, EAL 4 augmented, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.2Certificates
CCEVS-VR-10313-2009File metadata
Title | Microsoft Word - Cisco ASAVPN Validation Report v1.1-final.doc |
---|---|
Author | dmhale1 |
Creation date | D:20090511080118-04'00' |
Modification date | D:20090511080118-04'00' |
Pages | 23 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Frontpage
Certificate ID | CCEVS-VR-10313-2009 |
---|---|
Certified item | CISCO Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 Cisco Adaptive Security Appliances (ASA) 5505, 5510, 5520, 5540 and 5550 Virtual Private Network (VPN) Platform |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, HMACAsymmetric Algorithms
Diffie-HellmanHash functions
SHA-1, MD5Schemes
MAC, Key Exchange, Key agreementProtocols
SSH, SSL, SSL 3.0, TLS, TLS 1.0, IKE, IPsec, VPNBlock cipher modes
CBCVendor
Microsoft, Cisco Systems, Inc, Cisco, Cisco SystemsSecurity level
EAL4, EAL4 augmentedClaims
O.EAL, A.PSKSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_SCP.1, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_VLA.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCO_NRO.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.2, FDP_IFC.1, FDP_IFF.1, FDP_UCT.1, FDP_UIT.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_IFF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SEP.1.2, FPT_AMT.1, FPT_ITT.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_TST.1, FPT_AMT.1.1, FPT_ITT.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_SEP.1.2, FTA_TSE.1, FTA_TSE.1.1, FTP_ITC.1, FTP_RTC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_RTC.1.1, FTP_RTC.1.2, FTP_RTC.1.3, FTP_ITT.1, FTP_TRP.1Standards
FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 140-1, FIPS PUB 140-2, FIPS 140, PKCS #1, PKCS #3, PKCS#1, RFC 2404, RFC 2403, RFC 2246, CCMB-2005-08-001, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title | Cisco_ASA-VPN_EAL4_ST_v11.fm |
---|---|
Author | joe |
Creation date | D:20090223150815Z |
Modification date | D:20090608092540-04'00' |
Pages | 66 |
Creator | FrameMaker 7.2 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Similar certificates
Scheme data ?
Product | Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560 | |
---|---|---|
Id | CCEVS-VR-VID10313 | |
Url | https://www.niap-ccevs.org/product/10313 | |
Certification Date | 13.04.2009 | |
Expiration Date | None | |
Category | Virtual Private Network | |
Vendor | Cisco Systems, Inc. | |
Evaluation Facility | Leidos Common Criteria Testing Laboratory | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
16.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560', 'id': 'CCEVS-VR-VID10313', 'url': 'https://www.niap-ccevs.org/product/10313', 'certification_date': '2009-04-13', 'expiration_date': None, 'category': 'Virtual Private Network', 'vendor': 'Cisco Systems, Inc.', 'evaluation_facility': 'Leidos Common Criteria Testing Laboratory', 'scheme': 'US'}
.
- The scheme_data property was set to
-
09.12.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2009-04-13'}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b351651af72247d097521cf60060bebd4468331b5bae15990e068ac5102a07cb', 'txt_hash': '778e83e1e1ffc0764081430ce5988ac6aa5aa0f95ce2feeb6e783919d41a8db4'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a2496e0049f28550890fa26e8afadda50f34adb975e75a97dc443aa3ff19cbe', 'txt_hash': '8d2bd275ae3f351c2c56cc90704b11c8bcde565d436248fe945f56bf3b7b53b1'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 109608, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/CreationDate': "D:20090511080118-04'00'", '/Author': 'dmhale1', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20090511080118-04'00'", '/Title': 'Microsoft Word - Cisco ASAVPN Validation Report v1.1-final.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1111534, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/CreationDate': 'D:20090223150815Z', '/Author': 'joe', '/Creator': 'FrameMaker 7.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20090608092540-04'00'", '/Title': 'Cisco_ASA-VPN_EAL4_ST_v11.fm', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html']}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-10313-2009', 'cert_item': 'CISCO Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 Cisco Adaptive Security Appliances (ASA) 5505, 5510, 5520, 5540 and 5550 Virtual Private Network (VPN) Platform', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-10313-2009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 11, 'EAL4+': 3, 'EAL4': 2, 'EAL 4 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 4, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Cisco': {'Cisco': 58, 'Cisco Systems': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 11}, 'TLS': {'TLS': 3}}, 'VPN': {'VPN': 78}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 12, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 5, 'ACM_CAP.4': 5, 'ACM_SCP.2': 4, 'ACM_SCP.1': 1, 'ACM_CAP.3': 3}, 'ADO': {'ADO_DEL.2': 5, 'ADO_IGS.1': 6}, 'ADV': {'ADV_FSP.2': 5, 'ADV_HLD.2': 5, 'ADV_IMP.1': 6, 'ADV_LLD.1': 5, 'ADV_RCR.1': 5, 'ADV_SPM.1': 6, 'ADV_FSP.1': 9, 'ADV_HLD.1': 1}, 'AGD': {'AGD_ADM.1': 8, 'AGD_USR.1': 4}, 'ALC': {'ALC_FLR.1': 10, 'ALC_DVS.1': 5, 'ALC_LCD.1': 4, 'ALC_TAT.1': 5}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 4, 'ATE_FUN.1': 6, 'ATE_IND.2': 4}, 'AVA': {'AVA_MSU.2': 4, 'AVA_SOF.1': 4, 'AVA_VLA.2': 3, 'AVA_VLA.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_SAR.1': 9, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCO': {'FCO_NRO.2': 23, 'FCO_NRO.2.1': 3, 'FCO_NRO.2.2': 2, 'FCO_NRO.2.3': 2, 'FCO_NRO.1': 2}, 'FCS': {'FCS_CKM.1': 40, 'FCS_CKM.4': 21, 'FCS_COP.1': 65, 'FCS_CKM.1.1': 4, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 7, 'FCS_CKM.2': 4}, 'FDP': {'FDP_IFC.1': 44, 'FDP_IFF.1': 37, 'FDP_UCT.1': 18, 'FDP_UIT.1': 18, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_UCT.1.1': 2, 'FDP_UIT.1.1': 2, 'FDP_UIT.1.2': 2, 'FDP_IFF': 3, 'FDP_ITC.1': 9, 'FDP_ITC.2': 6, 'FDP_ACC.1': 8}, 'FIA': {'FIA_UAU.2': 13, 'FIA_UAU.5': 19, 'FIA_UID.2': 15, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 2, 'FIA_UAU.5.2': 2, 'FIA_UID.2.1': 2, 'FIA_UID.1': 5}, 'FMT': {'FMT_MOF.1': 18, 'FMT_MSA.1': 21, 'FMT_MSA.2': 32, 'FMT_MSA.3': 10, 'FMT_MTD.1': 27, 'FMT_SMF.1': 16, 'FMT_SMR.1': 20, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 2, 'FMT_MSA.2.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SEP.1.2': 1}, 'FPT': {'FPT_AMT.1': 10, 'FPT_ITT.1': 14, 'FPT_RVM.1': 14, 'FPT_SEP.1': 14, 'FPT_STM.1': 13, 'FPT_TST.1': 9, 'FPT_AMT.1.1': 1, 'FPT_ITT.1.1': 1, 'FPT_RVM.1.1': 2, 'FPT_SEP.1.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_SEP.1.2': 1}, 'FTA': {'FTA_TSE.1': 9, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_ITC.1': 23, 'FTP_RTC.1': 11, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_RTC.1.1': 1, 'FTP_RTC.1.2': 1, 'FTP_RTC.1.3': 1, 'FTP_ITT.1': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.EAL': 9}, 'A': {'A.PSK': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}, 'Cisco': {'Cisco Systems, Inc': 4, 'Cisco': 140, 'Cisco Systems': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 11}}, 'DES': {'DES': {'DES': 10}, '3DES': {'3DES': 3}}, 'constructions': {'MAC': {'HMAC': 4}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 10}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}}, 'MD': {'MD5': {'MD5': 6}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KEX': {'Key Exchange': 3}, 'KA': {'Key agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 9}, 'TLS': {'SSL': {'SSL': 135, 'SSL 3.0': 1}, 'TLS': {'TLS': 6, 'TLS 1.0': 1}}, 'IKE': {'IKE': 21}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 291}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 3, 'FIPS 197': 2, 'FIPS PUB 46-3': 2, 'FIPS PUB 197': 2, 'FIPS PUB 140-1': 1, 'FIPS PUB 140-2': 1, 'FIPS 140': 1}, 'PKCS': {'PKCS #1': 2, 'PKCS #3': 2, 'PKCS#1': 1}, 'RFC': {'RFC 2404': 1, 'RFC 2403': 1, 'RFC 2246': 2}, 'CC': {'CCMB-2005-08-001': 1, 'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
st_vid10313-vr.pdf
. - The st_filename property was set to
st_vid10313-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-10313-2009
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10313-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10313-st.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": null,
"dgst": "66b4337b71091ccf",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-10313-2009",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.2",
"5.0.03.0560"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Virtual Private Network",
"certification_date": "2009-04-13",
"evaluation_facility": "Leidos Common Criteria Testing Laboratory",
"expiration_date": null,
"id": "CCEVS-VR-VID10313",
"product": "Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10313",
"vendor": "Cisco Systems, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-04-30",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10313-add1.pdf",
"maintenance_st_link": null,
"maintenance_title": "Cisco Adaptive Security Appliances 5505, 5510, 5520, 5540 and 5550, ASA VPN Version 7.2(4), VPN Client 5.0.05.0290"
}
]
},
"manufacturer": "Cisco Systems, Inc.",
"manufacturer_web": "https://www.cisco.com",
"name": "Cisco ASA 5505, 5510, 5520, 5540, and 5550 (Release 7.2(4)), Cisco VPN Client Release 5.0.03.0560",
"not_valid_after": "2012-07-20",
"not_valid_before": "2009-04-13",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10313-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-10313-2009",
"cert_item": "CISCO Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 Cisco Adaptive Security Appliances (ASA) 5505, 5510, 5520, 5540 and 5550 Virtual Private Network (VPN) Platform",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-10313-2009": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 4,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 11,
"EAL 4 augmented": 2,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 3
},
"TLS": {
"SSL": {
"SSL": 11
},
"TLS": {
"TLS": 3
}
},
"VPN": {
"VPN": 78
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 1
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 58,
"Cisco Systems": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "dmhale1",
"/CreationDate": "D:20090511080118-04\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20090511080118-04\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Microsoft Word - Cisco ASAVPN Validation Report v1.1-final.doc",
"pdf_file_size_bytes": 109608,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 23
},
"st_filename": "st_vid10313-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 10
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PSK": 3
},
"O": {
"O.EAL": 9
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 5,
"ACM_CAP.3": 3,
"ACM_CAP.4": 5,
"ACM_SCP.1": 1,
"ACM_SCP.2": 4
},
"ADO": {
"ADO_DEL.2": 5,
"ADO_IGS.1": 6
},
"ADV": {
"ADV_FSP.1": 9,
"ADV_FSP.2": 5,
"ADV_HLD.1": 1,
"ADV_HLD.2": 5,
"ADV_IMP.1": 6,
"ADV_LLD.1": 5,
"ADV_RCR.1": 5,
"ADV_SPM.1": 6
},
"AGD": {
"AGD_ADM.1": 8,
"AGD_USR.1": 4
},
"ALC": {
"ALC_DVS.1": 5,
"ALC_FLR.1": 10,
"ALC_LCD.1": 4,
"ALC_TAT.1": 5
},
"ATE": {
"ATE_COV.2": 4,
"ATE_DPT.1": 4,
"ATE_FUN.1": 6,
"ATE_IND.2": 4
},
"AVA": {
"AVA_MSU.2": 4,
"AVA_SOF.1": 4,
"AVA_VLA.1": 1,
"AVA_VLA.2": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 12,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 9,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FCO": {
"FCO_NRO.1": 2,
"FCO_NRO.2": 23,
"FCO_NRO.2.1": 3,
"FCO_NRO.2.2": 2,
"FCO_NRO.2.3": 2
},
"FCS": {
"FCS_CKM.1": 40,
"FCS_CKM.1.1": 4,
"FCS_CKM.2": 4,
"FCS_CKM.4": 21,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 65,
"FCS_COP.1.1": 7
},
"FDP": {
"FDP_ACC.1": 8,
"FDP_IFC.1": 44,
"FDP_IFC.1.1": 2,
"FDP_IFF": 3,
"FDP_IFF.1": 37,
"FDP_IFF.1.1": 2,
"FDP_IFF.1.2": 2,
"FDP_IFF.1.3": 2,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 2,
"FDP_ITC.1": 9,
"FDP_ITC.2": 6,
"FDP_UCT.1": 18,
"FDP_UCT.1.1": 2,
"FDP_UIT.1": 18,
"FDP_UIT.1.1": 2,
"FDP_UIT.1.2": 2
},
"FIA": {
"FIA_UAU.2": 13,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 19,
"FIA_UAU.5.1": 2,
"FIA_UAU.5.2": 2,
"FIA_UID.1": 5,
"FIA_UID.2": 15,
"FIA_UID.2.1": 2
},
"FMT": {
"FMT_MOF.1": 18,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 21,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 32,
"FMT_MSA.2.1": 2,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 27,
"FMT_MTD.1.1": 3,
"FMT_SEP.1.2": 1,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_AMT.1": 10,
"FPT_AMT.1.1": 1,
"FPT_ITT.1": 14,
"FPT_ITT.1.1": 1,
"FPT_RVM.1": 14,
"FPT_RVM.1.1": 2,
"FPT_SEP.1": 14,
"FPT_SEP.1.1": 2,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 13,
"FPT_STM.1.1": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_TSE.1": 9,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 23,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_ITT.1": 1,
"FTP_RTC.1": 11,
"FTP_RTC.1.1": 1,
"FTP_RTC.1.2": 1,
"FTP_RTC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 21
},
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 9
},
"TLS": {
"SSL": {
"SSL": 135,
"SSL 3.0": 1
},
"TLS": {
"TLS": 6,
"TLS 1.0": 1
}
},
"VPN": {
"VPN": 291
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 6
}
},
"SHA": {
"SHA1": {
"SHA-1": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS 140": 1,
"FIPS 197": 2,
"FIPS 46-3": 3,
"FIPS PUB 140-1": 1,
"FIPS PUB 140-2": 1,
"FIPS PUB 197": 2,
"FIPS PUB 46-3": 2
},
"PKCS": {
"PKCS #1": 2,
"PKCS #3": 2,
"PKCS#1": 1
},
"RFC": {
"RFC 2246": 2,
"RFC 2403": 1,
"RFC 2404": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"DES": {
"3DES": {
"3DES": 3
},
"DES": {
"DES": 10
}
},
"constructions": {
"MAC": {
"HMAC": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Cisco": {
"Cisco": 140,
"Cisco Systems": 5,
"Cisco Systems, Inc": 4
},
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "joe",
"/CreationDate": "D:20090223150815Z",
"/Creator": "FrameMaker 7.2",
"/ModDate": "D:20090608092540-04\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "Cisco_ASA-VPN_EAL4_ST_v11.fm",
"pdf_file_size_bytes": 1111534,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 66
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10313-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10313-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b351651af72247d097521cf60060bebd4468331b5bae15990e068ac5102a07cb",
"txt_hash": "778e83e1e1ffc0764081430ce5988ac6aa5aa0f95ce2feeb6e783919d41a8db4"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4a2496e0049f28550890fa26e8afadda50f34adb975e75a97dc443aa3ff19cbe",
"txt_hash": "8d2bd275ae3f351c2c56cc90704b11c8bcde565d436248fe945f56bf3b7b53b1"
}
},
"status": "archived"
}