Garcinia Firewall Router v21.1.0
CSV information ?
Status | active |
---|---|
Valid from | 29.06.2021 |
Valid until | 29.06.2026 |
Scheme | 🇲🇾 MY |
Manufacturer | Sigma Rectrix Systems (M) Sdn Bhd |
Category | Network and Network-Related Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL2File metadata
Title | SISCB Print21070211330 |
---|---|
Creation date | D:20210702113323+08'00' |
Modification date | D:20210702114719+08'00' |
Pages | 1 |
Creator | ISCB Printer |
Producer | KONICA MINOLTA bizhub C360i |
Certification report ?
Extracted keywords
Protocols
SSL, TLS v1.2, TLS v1.3, TLSSecurity level
EAL2, EAL 2Claims
A.NOEVIL, A.PHYSEC, A.SINGENSecurity Functional Requirements (SFR)
FAU_GEN.1, FDP_ACC.1, FIA_UAU.2, FIA_ATD.1, FIA_AFL.1, FMT_SMF.1, FMT_MTD.1, FMT_MOF.1, FPT_STM.1, FTP_TRP.1Certificates
ISCB-5-RPT-C122-CR-v1Standards
ISO/IEC15408, ISO/IEC 18045File metadata
Creation date | D:20210629084536Z00'00' |
---|---|
Modification date | D:20210629084536Z00'00' |
Pages | 33 |
Creator | Word |
Producer | macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext |
Security target ?
Extracted keywords
Protocols
SSH, TLS v1.2, TLS v1.3, VPNVendor
STM, MicrosoftSecurity level
EAL2Claims
O.ACCOUN, O.AUDREC, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECSTA, O.TOECOM, O.DATA_FLOW, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.SELPRO, T.TOECOM, T.TUSAGE, T.MISUSE, A.NOEVIL, A.PHYSEC, A.SINGEN, OE.ADMTRA, OE.GUIDAN, OE.PHYSEC, OE.SINGENSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UID.2, FIA_SOS.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3File metadata
Title | Garcinia Security Target |
---|---|
Author | Securelytics |
Creation date | D:20210620173631+00'00' |
Modification date | D:20210620173631+00'00' |
Pages | 42 |
Creator | Microsoft Word |
Heuristics ?
Extracted SARs
ALC_CMS.2, ATE_FUN.1, ASE_ECD.1, ATE_COV.1, ADV_ARC.1, ADV_TDS.1, AGD_PRE.1, ASE_TSS.1, ALC_DEL.1, ADV_FSP.2, ASE_OBJ.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_IND.2, ASE_SPD.1, ALC_CMC.2, AVA_VAN.2, ASE_REQ.2Scheme data ?
Cert No | 2016-002-C068 | |
---|---|---|
Developer | Sigma Rectrix Systems (M) Sdn. Bhd. | |
Level | EAL2 | |
Product | Garcinia Firewall Router v21.1.0 | |
Certification Date | 29-06-2021 | |
Expiration Date | 29-06-2026 | |
Recognition | CCRA | |
Url | https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105 | |
Enhanced | ||
Cert Id | C068 | |
Product | Garcinia Firewall Router v21.1.0 | |
Developer | Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor Phone: +60383186696Email: [email protected]: https://sigmarectrix.com | |
Category | Network and Network-Related Devices and Systems | |
Type | Network and Network-Related Devices and Systems | |
Scope | The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware. The TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks. Firewall are indeed important and everyone who is online must strive to have a firewall protection before it’s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability & Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server & DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup & Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more. | |
Assurance Level | EAL2 | |
Certification Date | 29-06-2021 | |
Expiration Date | 29-06-2026 | |
Mutual Recognition | CCRA | |
Target Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf | |
Report Link | https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf | |
Status | Valid |
References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed', 'txt_hash': '5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993', 'txt_hash': '031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 971230, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Title': 'Garcinia Security Target', '/Author': 'Securelytics', '/Creator': 'Microsoft Word', '/CreationDate': "D:20210620173631+00'00'", '/ModDate': "D:20210620173631+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commonriteriaportal.org/']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 83646, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20210702113323+08'00'", '/Creator': 'ISCB Printer', '/ModDate': "D:20210702114719+08'00'", '/Producer': 'KONICA MINOLTA bizhub C360i', '/Title': 'SISCB Print21070211330', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_TSS.1': 4, 'ASE_ECD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SAR.1': 6, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 7, 'FDP_IFF': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_AFL.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 6, 'FIA_SOS.1': 5, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 5, 'FIA_UID.2.1': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 11, 'FMT_MTD.1': 8, 'FMT_MOF.1': 7, 'FMT_SMF.1': 10, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP.1': 6, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCOUN': 4, 'O.AUDREC': 3, 'O.IDAUTH': 4, 'O.MEDIAT': 3, 'O.SECFUN': 4, 'O.SECSTA': 3, 'O.TOECOM': 4, 'O.DATA_FLOW': 3}, 'T': {'T.AUDACC': 4, 'T.AUDFUL': 2, 'T.MEDIAT': 3, 'T.NOAUTH': 2, 'T.OLDINF': 3, 'T.SELPRO': 3, 'T.TOECOM': 3, 'T.TUSAGE': 3, 'T.MISUSE': 2}, 'A': {'A.NOEVIL': 3, 'A.PHYSEC': 2, 'A.SINGEN': 3}, 'OE': {'OE.ADMTRA': 3, 'OE.GUIDAN': 3, 'OE.PHYSEC': 2, 'OE.SINGEN': 3}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS v1.2': 3, 'TLS v1.3': 3}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
Garcinia Security Target v1.0.pdf
. - The cert_filename property was set to
ISCB-5-CERT-C122-CERTIFICATE-v1.pdf
.
The computed heuristics were updated.
- The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]}
.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209', 'txt_hash': '2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 909626, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 33, '/Producer': 'macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20210629084536Z00'00'", '/ModDate': "D:20210629084536Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'MY': {'ISCB-5-RPT-C122-CR-v1': 32}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FDP': {'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.2': 1, 'FIA_ATD.1': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_SMF.1': 1, 'FMT_MTD.1': 1, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.PHYSEC': 1, 'A.SINGEN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS v1.2': 2, 'TLS v1.3': 2, 'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ISCB-5-RPT-C122-CR-v1.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ISCB-5-RPT-C122-CR-v1
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Garcinia%20Security%20Target%20v1.0.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Garcinia Firewall Router v21.1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
"dgst": "9557a2a073366fd5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ISCB-5-RPT-C122-CR-v1",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"21.1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_no": "2016-002-C068",
"certification_date": "29-06-2021",
"developer": "Sigma Rectrix Systems (M) Sdn. Bhd.",
"enhanced": {
"assurance_level": "EAL2",
"category": "Network and Network-Related Devices and Systems",
"cert_id": "C068",
"certification_date": "29-06-2021",
"developer": "Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor\nPhone: +60383186696Email: [email protected]: https://sigmarectrix.com",
"expiration_date": "29-06-2026",
"mutual_recognition": "CCRA",
"product": "Garcinia Firewall Router v21.1.0",
"report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf",
"scope": "The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware.\nThe TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks.\nFirewall are indeed important and everyone who is online must strive to have a firewall protection before it\u2019s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability \u0026 Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server \u0026 DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup \u0026 Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.",
"status": "Valid",
"target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf",
"type": "Network and Network-Related Devices and Systems"
},
"expiration_date": "29-06-2026",
"level": "EAL2",
"product": "Garcinia Firewall Router v21.1.0",
"recognition": "CCRA",
"url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sigma Rectrix Systems (M) Sdn Bhd",
"manufacturer_web": "https://sigmarectrix.com/",
"name": "Garcinia Firewall Router v21.1.0",
"not_valid_after": "2026-06-29",
"not_valid_before": "2021-06-29",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20210702113323+08\u002700\u0027",
"/Creator": "ISCB Printer",
"/ModDate": "D:20210702114719+08\u002700\u0027",
"/Producer": "KONICA MINOLTA bizhub C360i",
"/Title": "SISCB Print21070211330",
"pdf_file_size_bytes": 83646,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "ISCB-5-RPT-C122-CR-v1.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"MY": {
"ISCB-5-RPT-C122-CR-v1": 32
}
},
"cc_claims": {
"A": {
"A.NOEVIL": 1,
"A.PHYSEC": 1,
"A.SINGEN": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 5,
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1
},
"FDP": {
"FDP_ACC.1": 1
},
"FIA": {
"FIA_AFL.1": 1,
"FIA_ATD.1": 1,
"FIA_UAU.2": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MTD.1": 1,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_STM.1": 1
},
"FTP": {
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1,
"TLS v1.2": 2,
"TLS v1.3": 2
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 18045": 2,
"ISO/IEC15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210629084536Z00\u002700\u0027",
"/Creator": "Word",
"/ModDate": "D:20210629084536Z00\u002700\u0027",
"/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
"pdf_file_size_bytes": 909626,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 33
},
"st_filename": "Garcinia Security Target v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NOEVIL": 3,
"A.PHYSEC": 2,
"A.SINGEN": 3
},
"O": {
"O.ACCOUN": 4,
"O.AUDREC": 3,
"O.DATA_FLOW": 3,
"O.IDAUTH": 4,
"O.MEDIAT": 3,
"O.SECFUN": 4,
"O.SECSTA": 3,
"O.TOECOM": 4
},
"OE": {
"OE.ADMTRA": 3,
"OE.GUIDAN": 3,
"OE.PHYSEC": 2,
"OE.SINGEN": 3
},
"T": {
"T.AUDACC": 4,
"T.AUDFUL": 2,
"T.MEDIAT": 3,
"T.MISUSE": 2,
"T.NOAUTH": 2,
"T.OLDINF": 3,
"T.SELPRO": 3,
"T.TOECOM": 3,
"T.TUSAGE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 4,
"ASE_ECD.1": 1,
"ASE_INT.1": 4,
"ASE_OBJ.2": 4,
"ASE_REQ.2": 4,
"ASE_SPD.1": 4,
"ASE_TSS.1": 4
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 8,
"FAU_GEN.1.1": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 1,
"FDP_IFF": 2
},
"FIA": {
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 7,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 5,
"FIA_UID.2": 6,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 11,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 15,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 7,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_TRP.1": 6,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
},
"TLS": {
"TLS": {
"TLS v1.2": 3,
"TLS v1.3": 3
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
},
"STMicroelectronics": {
"STM": 2
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Securelytics",
"/CreationDate": "D:20210620173631+00\u002700\u0027",
"/Creator": "Microsoft Word",
"/ModDate": "D:20210620173631+00\u002700\u0027",
"/Title": "Garcinia Security Target",
"pdf_file_size_bytes": 971230,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commonriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf",
"scheme": "MY",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Garcinia%20Security%20Target%20v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993",
"txt_hash": "031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209",
"txt_hash": "2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed",
"txt_hash": "5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094"
}
},
"status": "active"
}