Garcinia Firewall Router v21.1.0

CSV information ?

Status active
Valid from 29.06.2021
Valid until 29.06.2026
Scheme 🇲🇾 MY
Manufacturer Sigma Rectrix Systems (M) Sdn Bhd
Category Network and Network-Related Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: ISCB-5-RPT-C122-CR-v1

Certificate ?

Extracted keywords

Security level
EAL2

File metadata

Title SISCB Print21070211330
Creation date D:20210702113323+08'00'
Modification date D:20210702114719+08'00'
Pages 1
Creator ISCB Printer
Producer KONICA MINOLTA bizhub C360i

Certification report ?

Extracted keywords

Protocols
SSL, TLS v1.2, TLS v1.3, TLS

Security level
EAL2, EAL 2
Claims
A.NOEVIL, A.PHYSEC, A.SINGEN
Security Functional Requirements (SFR)
FAU_GEN.1, FDP_ACC.1, FIA_UAU.2, FIA_ATD.1, FIA_AFL.1, FMT_SMF.1, FMT_MTD.1, FMT_MOF.1, FPT_STM.1, FTP_TRP.1
Certificates
ISCB-5-RPT-C122-CR-v1

Standards
ISO/IEC15408, ISO/IEC 18045

File metadata

Creation date D:20210629084536Z00'00'
Modification date D:20210629084536Z00'00'
Pages 33
Creator Word
Producer macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext

Security target ?

Extracted keywords

Protocols
SSH, TLS v1.2, TLS v1.3, VPN

Vendor
STM, Microsoft

Security level
EAL2
Claims
O.ACCOUN, O.AUDREC, O.IDAUTH, O.MEDIAT, O.SECFUN, O.SECSTA, O.TOECOM, O.DATA_FLOW, T.AUDACC, T.AUDFUL, T.MEDIAT, T.NOAUTH, T.OLDINF, T.SELPRO, T.TOECOM, T.TUSAGE, T.MISUSE, A.NOEVIL, A.PHYSEC, A.SINGEN, OE.ADMTRA, OE.GUIDAN, OE.PHYSEC, OE.SINGEN
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_FUN.1, ATE_COV.1, AVA_VAN.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1, ASE_ECD.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN, FAU_GEN.1.1, FAU_SAR.1.1, FAU_SAR.1.2, FDP_ACC.1, FDP_ACF.1, FDP_IFF, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_AFL.1, FIA_UAU.2, FIA_UID.2, FIA_SOS.1, FIA_ATD.1.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_UAU.2.1, FIA_UID.1, FIA_UID.2.1, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MOF.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MOF.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_STM.1.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

File metadata

Title Garcinia Security Target
Author Securelytics
Creation date D:20210620173631+00'00'
Modification date D:20210620173631+00'00'
Pages 42
Creator Microsoft Word

Heuristics ?

Certificate ID: ISCB-5-RPT-C122-CR-v1

Extracted SARs

ALC_CMS.2, ATE_FUN.1, ASE_ECD.1, ATE_COV.1, ADV_ARC.1, ADV_TDS.1, AGD_PRE.1, ASE_TSS.1, ALC_DEL.1, ADV_FSP.2, ASE_OBJ.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_IND.2, ASE_SPD.1, ALC_CMC.2, AVA_VAN.2, ASE_REQ.2

Scheme data ?

Cert No 2016-002-C068
Developer Sigma Rectrix Systems (M) Sdn. Bhd.
Level EAL2
Product Garcinia Firewall Router v21.1.0
Certification Date 29-06-2021
Expiration Date 29-06-2026
Recognition CCRA
Url https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105
Enhanced
Cert Id C068
Product Garcinia Firewall Router v21.1.0
Developer Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor Phone: +60383186696Email: [email protected]: https://sigmarectrix.com
Category Network and Network-Related Devices and Systems
Type Network and Network-Related Devices and Systems
Scope The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware. The TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks. Firewall are indeed important and everyone who is online must strive to have a firewall protection before it’s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability & Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server & DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup & Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.
Assurance Level EAL2
Certification Date 29-06-2021
Expiration Date 29-06-2026
Mutual Recognition CCRA
Target Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf
Report Link https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf
Status Valid

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed', 'txt_hash': '5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993', 'txt_hash': '031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 971230, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Title': 'Garcinia Security Target', '/Author': 'Securelytics', '/Creator': 'Microsoft Word', '/CreationDate': "D:20210620173631+00'00'", '/ModDate': "D:20210620173631+00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commonriteriaportal.org/']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 83646, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20210702113323+08'00'", '/Creator': 'ISCB Printer', '/ModDate': "D:20210702114719+08'00'", '/Producer': 'KONICA MINOLTA bizhub C360i', '/Title': 'SISCB Print21070211330', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMS.2': 1, 'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_IND.2': 1, 'ATE_FUN.1': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_INT.1': 4, 'ASE_CCL.1': 4, 'ASE_SPD.1': 4, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_TSS.1': 4, 'ASE_ECD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SAR.1': 6, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 7, 'FDP_IFF': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_ATD.1': 7, 'FIA_AFL.1': 6, 'FIA_UAU.2': 7, 'FIA_UID.2': 6, 'FIA_SOS.1': 5, 'FIA_ATD.1.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 5, 'FIA_UID.2.1': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 10, 'FMT_MSA.3': 11, 'FMT_MTD.1': 8, 'FMT_MOF.1': 7, 'FMT_SMF.1': 10, 'FMT_SMR.1': 15, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_TRP.1': 6, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.ACCOUN': 4, 'O.AUDREC': 3, 'O.IDAUTH': 4, 'O.MEDIAT': 3, 'O.SECFUN': 4, 'O.SECSTA': 3, 'O.TOECOM': 4, 'O.DATA_FLOW': 3}, 'T': {'T.AUDACC': 4, 'T.AUDFUL': 2, 'T.MEDIAT': 3, 'T.NOAUTH': 2, 'T.OLDINF': 3, 'T.SELPRO': 3, 'T.TOECOM': 3, 'T.TUSAGE': 3, 'T.MISUSE': 2}, 'A': {'A.NOEVIL': 3, 'A.PHYSEC': 2, 'A.SINGEN': 3}, 'OE': {'OE.ADMTRA': 3, 'OE.GUIDAN': 3, 'OE.PHYSEC': 2, 'OE.SINGEN': 3}}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS v1.2': 3, 'TLS v1.3': 3}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Garcinia Security Target v1.0.pdf.
    • The cert_filename property was set to ISCB-5-CERT-C122-CERTIFICATE-v1.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]}.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209', 'txt_hash': '2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 909626, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 33, '/Producer': 'macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20210629084536Z00'00'", '/ModDate': "D:20210629084536Z00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'MY': {'ISCB-5-RPT-C122-CR-v1': 32}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL 2': 5}}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1}, 'FDP': {'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.2': 1, 'FIA_ATD.1': 1, 'FIA_AFL.1': 1}, 'FMT': {'FMT_SMF.1': 1, 'FMT_MTD.1': 1, 'FMT_MOF.1': 1}, 'FPT': {'FPT_STM.1': 1}, 'FTP': {'FTP_TRP.1': 1}}, 'cc_claims': {'A': {'A.NOEVIL': 1, 'A.PHYSEC': 1, 'A.SINGEN': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS v1.2': 2, 'TLS v1.3': 2, 'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ISCB-5-RPT-C122-CR-v1.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ISCB-5-RPT-C122-CR-v1.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Garcinia%20Security%20Target%20v1.0.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Garcinia Firewall Router v21.1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
  "dgst": "9557a2a073366fd5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ISCB-5-RPT-C122-CR-v1",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "21.1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_no": "2016-002-C068",
      "certification_date": "29-06-2021",
      "developer": "Sigma Rectrix Systems (M) Sdn. Bhd.",
      "enhanced": {
        "assurance_level": "EAL2",
        "category": "Network and Network-Related Devices and Systems",
        "cert_id": "C068",
        "certification_date": "29-06-2021",
        "developer": "Suite 3-05, 4805 CBD Perdana 2Jalan Perdana Cyber 1263000 Cyberjaya Selangor\nPhone: +60383186696Email: [email protected]: https://sigmarectrix.com",
        "expiration_date": "29-06-2026",
        "mutual_recognition": "CCRA",
        "product": "Garcinia Firewall Router v21.1.0",
        "report_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/ISCB-5-RPT-C122-CR-v1.pdf",
        "scope": "The TOE is a firewall and routing platform which is a self-contained appliance consisting of hardware and firmware.\nThe TOE is a product that manages the network from any congestion and harm. The TOE analyse the incoming and outgoing network traffic, loss and manipulation of data, business secrets and confidential of data leaks.\nFirewall are indeed important and everyone who is online must strive to have a firewall protection before it\u2019s vulnerable to external and internal. The TOE core features include Traffic Shaper, Captive portal, Forward Caching Proxy, Virtual Private Network, High Availability \u0026 Hardware Failover, Intrusion Detection and Inline Prevention, Build-in reporting and monitoring tools, Support for plugins, DNS Server \u0026 DNS Forwarder, DHCP Server and Relay, Dynamic DNS, Backup \u0026 Restore, Stateful inspection firewall, Granular control over state table, 802.1Q VLAN support and many more.",
        "status": "Valid",
        "target_link": "https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C122/Garcinia_Security_Target_v10.pdf",
        "type": "Network and Network-Related Devices and Systems"
      },
      "expiration_date": "29-06-2026",
      "level": "EAL2",
      "product": "Garcinia Firewall Router v21.1.0",
      "recognition": "CCRA",
      "url": "https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/105"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sigma Rectrix Systems (M) Sdn Bhd",
  "manufacturer_web": "https://sigmarectrix.com/",
  "name": "Garcinia Firewall Router v21.1.0",
  "not_valid_after": "2026-06-29",
  "not_valid_before": "2021-06-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ISCB-5-CERT-C122-CERTIFICATE-v1.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20210702113323+08\u002700\u0027",
      "/Creator": "ISCB Printer",
      "/ModDate": "D:20210702114719+08\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C360i",
      "/Title": "SISCB Print21070211330",
      "pdf_file_size_bytes": 83646,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "ISCB-5-RPT-C122-CR-v1.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "MY": {
          "ISCB-5-RPT-C122-CR-v1": 32
        }
      },
      "cc_claims": {
        "A": {
          "A.NOEVIL": 1,
          "A.PHYSEC": 1,
          "A.SINGEN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 5,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 1,
          "FIA_ATD.1": 1,
          "FIA_UAU.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_STM.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1,
            "TLS v1.2": 2,
            "TLS v1.3": 2
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 18045": 2,
          "ISO/IEC15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20210629084536Z00\u002700\u0027",
      "/Creator": "Word",
      "/ModDate": "D:20210629084536Z00\u002700\u0027",
      "/Producer": "macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext",
      "pdf_file_size_bytes": 909626,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 33
    },
    "st_filename": "Garcinia Security Target v1.0.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NOEVIL": 3,
          "A.PHYSEC": 2,
          "A.SINGEN": 3
        },
        "O": {
          "O.ACCOUN": 4,
          "O.AUDREC": 3,
          "O.DATA_FLOW": 3,
          "O.IDAUTH": 4,
          "O.MEDIAT": 3,
          "O.SECFUN": 4,
          "O.SECSTA": 3,
          "O.TOECOM": 4
        },
        "OE": {
          "OE.ADMTRA": 3,
          "OE.GUIDAN": 3,
          "OE.PHYSEC": 2,
          "OE.SINGEN": 3
        },
        "T": {
          "T.AUDACC": 4,
          "T.AUDFUL": 2,
          "T.MEDIAT": 3,
          "T.MISUSE": 2,
          "T.NOAUTH": 2,
          "T.OLDINF": 3,
          "T.SELPRO": 3,
          "T.TOECOM": 3,
          "T.TUSAGE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 4,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 4,
          "ASE_REQ.2": 4,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 4
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 7
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 8,
          "FAU_GEN.1.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 1,
          "FDP_IFF": 2
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 5,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 5,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 15,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 6,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS v1.2": 3,
            "TLS v1.3": 3
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        },
        "STMicroelectronics": {
          "STM": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Securelytics",
      "/CreationDate": "D:20210620173631+00\u002700\u0027",
      "/Creator": "Microsoft Word",
      "/ModDate": "D:20210620173631+00\u002700\u0027",
      "/Title": "Garcinia Security Target",
      "pdf_file_size_bytes": 971230,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commonriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C122-CR-v1.pdf",
  "scheme": "MY",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Garcinia%20Security%20Target%20v1.0.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d25e4fbcd79ebddd0e58b7d7c330063739082765771db197237c3f751bdb4993",
      "txt_hash": "031e6f720822be0a49e86b536a07e443e1cb19be9e592ca90436b2525997d791"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "78035505e5f8130b5824e6653081158a8b93eed277f303e9c8875b29a07a4209",
      "txt_hash": "2d126b1ceee81fb85faeb10e4a2a4e796c579c6d40344f9c67bd90cfa7e36106"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4a6944a16081259d071280c6a612aadf274edb77e7e1756bf6ce375a30e5a4ed",
      "txt_hash": "5774a883851ddfc27594086a69c6e679f65b31ffa9911ead363b497b50af1094"
    }
  },
  "status": "active"
}