Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapted (SPA), incluiding VLAN Separation

CSV information ?

Status archived
Valid from 31.05.2008
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level ALC_FLR.1, EAL4+
Maintenance updates Cisco IOS IPSEC on the Integrated Services Routers, VPN Services Module (VPNSM), and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation, with the following Cisco IOS releases: Cisco IOS 12.4(15)T10 and Cisco IOS 12.2(18)SXF16 (11.12.2009) Certification report

Heuristics summary ?

Certificate ID: CCEVS-VR-VID-10116-2008

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, MD5
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, TLS, IKE, VPN

Vendor
Cisco, Cisco Systems

Security level
EAL4, EAL 4, EAL 4 augmented
Claims
A.PSK
Security Assurance Requirements (SAR)
ALC_FLR.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1
Certificates
CCEVS-VR-VID10116-2008

Side-channel analysis
SPA

File metadata

Title Validation Report: Cisco IOS-IPSec
Author cisco
Creation date D:20080702065739-04'00'
Modification date D:20080703073130-04'00'
Pages 37
Creator Acrobat PDFMaker 7.0 for Word
Producer Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID CCEVS-VR-VID10116-2008
Certified item Cisco IOS-IPSEC on the Integrated Service Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN separation
Certification lab US NIAP

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, MD5
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, IKE, VPN

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL 4, EAL4, EAL 4 augmented
Claims
O.AUTHENTICITY, O.CONFIDENTIALITY, O.INTEGRITY, O.KEY-, O.NOREPLAY, O.SECURE-OPERATION, T.ATTACK, T.UNTRUSTED-PATH, A.PSK, A.PHYSEC, A.NOEVIL, A.TRAINING, A.TRUSTED-CA, OE.VPN
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ACM_CAP.4, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_IMP.1, ADV_RCR.1, ADV_SPM.1, ADV_HLD.2, ADV_LLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, AVA_MSU.2, AVA_VLA.2, AVA_SOF.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.1.2, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_IFF.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_UCT.1, FDP_UIT.1, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UAU, FIA_UID, FIA_GEN.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_STM.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_AMT.1, FPT_AMT.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_TSE.1, FTA_TSE.1.1, FTP_RTC.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_RTC.1.1, FTP_RTC.1.2, FTP_RTC.1.3, FTP_RVM.1, FTP_SEP.1, FTP_MTD.1

Side-channel analysis
SPA

Standards
FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 140-1, PKCS #1, PKCS #3, PKCS#1, PKCS#7, RFC 2404, RFC 2403

File metadata

Title IOSIPSEC-EAL4-ST-v1-0-0213008.fm
Author rick west
Creation date D:20080626110350-04'00'
Modification date D:20080703073143-04'00'
Pages 70
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 8.1.0 (Windows)

Heuristics ?

Certificate ID: CCEVS-VR-VID-10116-2008

Extracted SARs

ADV_FSP.2, ALC_TAT.1, ALC_DVS.1, AGD_ADM.1, AVA_MSU.2, ADV_HLD.2, ALC_FLR.1, ADV_RCR.1, ALC_LCD.1, ATE_COV.2, AVA_SOF.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.2, ATE_IND.2, ADV_IMP.1, ADV_SPM.1, AGD_USR.1, ADV_LLD.1

Scheme data ?

Product Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation
Id CCEVS-VR-VID10116
Url https://www.niap-ccevs.org/product/10116
Certification Date 2008-05-31T00:05:00Z
Expiration Date None
Category Network Switch, Router
Vendor Cisco Systems, Inc.
Evaluation Facility Arca CCTL
Scheme US

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5ab02bbf7bfc3bedd6749a09d726a01b6a9d3b3ef5eec8ec9461e070e9099c55', 'txt_hash': '1d37f7d9f006e3bcd8a30cbb1b3914d6c1dfd6a81cb2d43e3448095dbee9d8fc'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'edb164a38f2e8c30ab23811430f2f11fadaea82f0beea46dd6341cf555692c32', 'txt_hash': '241674152124846184234e8aa1bdaa8405a16e41c86e30ea71ea0460b49766bf'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 380308, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 37, '/CreationDate': "D:20080702065739-04'00'", '/Author': 'cisco', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ModDate': "D:20080703073130-04'00'", '/SourceModified': 'D:20080626164649', '/Title': 'Validation Report: Cisco IOS-IPSec', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/internet-drafts/draft-ietf-secsh-architecture-21.txt', 'http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_book09186a00801d4269.html', 'http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080087df1.html', 'http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/ffun_c/index.htm']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 410147, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 70, '/CreationDate': "D:20080626110350-04'00'", '/Author': 'rick west', '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20080703073143-04'00'", '/Title': 'IOSIPSEC-EAL4-ST-v1-0-0213008.fm', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'US': {'cert_id': 'CCEVS-VR-VID10116-2008', 'cert_item': 'Cisco IOS-IPSEC on the Integrated Service Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN separation', 'cert_lab': 'US NIAP'}}.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10116-2008': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL 4': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_SAR.1': 1}}, 'cc_claims': {'A': {'A.PSK': 1}}, 'vendor': {'Cisco': {'Cisco': 112, 'Cisco Systems': 13}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 3}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 6}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 28}, 'VPN': {'VPN': 39}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 25}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 4, 'EAL 4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_SCP.2': 3, 'ACM_CAP.4': 2}, 'ADO': {'ADO_DEL.2': 3, 'ADO_IGS.1': 2}, 'ADV': {'ADV_FSP.2': 5, 'ADV_IMP.1': 3, 'ADV_RCR.1': 5, 'ADV_SPM.1': 3, 'ADV_HLD.2': 2, 'ADV_LLD.1': 2}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.1': 6, 'ALC_DVS.1': 3, 'ALC_TAT.1': 3, 'ALC_LCD.1': 2}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 3, 'ATE_DPT.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.2': 3, 'AVA_VLA.2': 4, 'AVA_SOF.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1': 11, 'FAU_SAR.1.2': 1}, 'FCO': {'FCO_NRO.2': 11, 'FCO_NRO.2.1': 1, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 1}, 'FCS': {'FCS_CKM.1': 26, 'FCS_CKM.1.1': 2, 'FCS_CKM.4': 18, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 57, 'FCS_COP.1.1': 5}, 'FDP': {'FDP_IFF.1': 48, 'FDP_IFC.1': 46, 'FDP_IFC.1.1': 3, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_UCT.1': 13, 'FDP_UIT.1': 17, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_IFF.1.6': 3, 'FDP_UCT.1.1': 2, 'FDP_UIT.1.1': 2, 'FDP_UIT.1.2': 2, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UID.2': 20, 'FIA_UAU.2': 13, 'FIA_UAU.2.1': 1, 'FIA_UAU.5': 13, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1, 'FIA_UAU': 1, 'FIA_UID': 1, 'FIA_GEN.1': 1}, 'FMT': {'FMT_SMF.1': 17, 'FMT_SMR.1': 18, 'FMT_MOF.1': 12, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 40, 'FMT_MSA.1.1': 3, 'FMT_MSA.2': 32, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 32, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MTD.1': 22, 'FMT_MTD.1.1': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA': 2}, 'FPT': {'FPT_STM.1': 11, 'FPT_RVM.1': 9, 'FPT_RVM.1.1': 1, 'FPT_SEP.1': 9, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_AMT.1': 13, 'FPT_AMT.1.1': 1, 'FPT_TST.1': 12, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_TSE.1': 10, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_RTC.1': 12, 'FTP_ITC.1': 37, 'FTP_ITC.1.1': 3, 'FTP_ITC.1.2': 3, 'FTP_ITC.1.3': 3, 'FTP_RTC.1.1': 1, 'FTP_RTC.1.2': 1, 'FTP_RTC.1.3': 1, 'FTP_RVM.1': 1, 'FTP_SEP.1': 1, 'FTP_MTD.1': 1}}, 'cc_claims': {'O': {'O.AUTHENTICITY': 1, 'O.CONFIDENTIALITY': 1, 'O.INTEGRITY': 1, 'O.KEY-': 1, 'O.NOREPLAY': 1, 'O.SECURE-OPERATION': 2}, 'T': {'T.ATTACK': 1, 'T.UNTRUSTED-PATH': 1}, 'A': {'A.PSK': 3, 'A.PHYSEC': 1, 'A.NOEVIL': 1, 'A.TRAINING': 1, 'A.TRUSTED-CA': 1}, 'OE': {'OE.VPN': 6}}, 'vendor': {'Cisco': {'Cisco Systems, Inc': 5, 'Cisco': 95, 'Cisco Systems': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 10}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 10}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}}, 'MD': {'MD5': {'MD5': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 7}}, 'crypto_protocol': {'SSH': {'SSH': 15}, 'TLS': {'SSL': {'SSL': 2}}, 'IKE': {'IKE': 53}, 'VPN': {'VPN': 124}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 32}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 2, 'FIPS 197': 1, 'FIPS PUB 46-3': 3, 'FIPS PUB 140-1': 1}, 'PKCS': {'PKCS #1': 1, 'PKCS #3': 1, 'PKCS#1': 1, 'PKCS#7': 1}, 'RFC': {'RFC 2404': 1, 'RFC 2403': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to st_vid10116-vr.pdf.
    • The st_filename property was set to st_vid10116-st.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['US'].
    • The cert_id property was set to CCEVS-VR-VID-10116-2008.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-vr.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-st.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapted (SPA), incluiding VLAN Separation was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c2f780306682eb16",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10116-2008",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Network Switch, Router",
      "certification_date": "2008-05-31T00:05:00Z",
      "evaluation_facility": "Arca CCTL",
      "expiration_date": null,
      "id": "CCEVS-VR-VID10116",
      "product": "Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/product/10116",
      "vendor": "Cisco Systems, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2009-12-11",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Cisco IOS IPSEC on the Integrated Services Routers, VPN Services Module (VPNSM), and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation, with the following Cisco IOS releases: Cisco IOS 12.4(15)T10 and Cisco IOS 12.2(18)SXF16"
      }
    ]
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapted (SPA), incluiding VLAN Separation",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2008-05-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10116-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10116-2008",
        "cert_item": "Cisco IOS-IPSEC on the Integrated Service Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN separation",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10116-2008": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PSK": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_SAR.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 28
        },
        "SSH": {
          "SSH": 6
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 39
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "SPA": 25
        }
      },
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 112,
          "Cisco Systems": 13
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "cisco",
      "/CreationDate": "D:20080702065739-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/ModDate": "D:20080703073130-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20080626164649",
      "/Title": "Validation Report: Cisco IOS-IPSec",
      "pdf_file_size_bytes": 380308,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/ffun_c/index.htm",
          "http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_book09186a00801d4269.html",
          "http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080087df1.html",
          "http://www.ietf.org/internet-drafts/draft-ietf-secsh-architecture-21.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "st_vid10116-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 10
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NOEVIL": 1,
          "A.PHYSEC": 1,
          "A.PSK": 3,
          "A.TRAINING": 1,
          "A.TRUSTED-CA": 1
        },
        "O": {
          "O.AUTHENTICITY": 1,
          "O.CONFIDENTIALITY": 1,
          "O.INTEGRITY": 1,
          "O.KEY-": 1,
          "O.NOREPLAY": 1,
          "O.SECURE-OPERATION": 2
        },
        "OE": {
          "OE.VPN": 6
        },
        "T": {
          "T.ATTACK": 1,
          "T.UNTRUSTED-PATH": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 3,
          "ACM_CAP.4": 2,
          "ACM_SCP.2": 3
        },
        "ADO": {
          "ADO_DEL.2": 3,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.2": 5,
          "ADV_HLD.2": 2,
          "ADV_IMP.1": 3,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 5,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.1": 3,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.2": 3,
          "AVA_SOF.1": 2,
          "AVA_VLA.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 1,
          "EAL4": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 11,
          "FAU_SAR.1.2": 1
        },
        "FCO": {
          "FCO_NRO.2": 11,
          "FCO_NRO.2.1": 1,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 26,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 57,
          "FCS_COP.1.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_IFC.1": 46,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 48,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_IFF.1.6": 3,
          "FDP_UCT.1": 13,
          "FDP_UCT.1.1": 2,
          "FDP_UIT.1": 17,
          "FDP_UIT.1.1": 2,
          "FDP_UIT.1.2": 2
        },
        "FIA": {
          "FIA_GEN.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.2": 13,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 13,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.2": 20,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 2,
          "FMT_MSA.1": 40,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.2": 32,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 32,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 3,
          "FMT_MTD.1": 22,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 17,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 13,
          "FPT_AMT.1.1": 1,
          "FPT_RVM.1": 9,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 9,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_TSE.1": 10,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 37,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 3,
          "FTP_MTD.1": 1,
          "FTP_RTC.1": 12,
          "FTP_RTC.1.1": 1,
          "FTP_RTC.1.2": 1,
          "FTP_RTC.1.3": 1,
          "FTP_RVM.1": 1,
          "FTP_SEP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 53
        },
        "SSH": {
          "SSH": 15
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        },
        "VPN": {
          "VPN": 124
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 7
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 7
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "SPA": 32
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 46-3": 2,
          "FIPS PUB 140-1": 1,
          "FIPS PUB 46-3": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS #3": 1,
          "PKCS#1": 1,
          "PKCS#7": 1
        },
        "RFC": {
          "RFC 2403": 1,
          "RFC 2404": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "3DES": 10
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 95,
          "Cisco Systems": 4,
          "Cisco Systems, Inc": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "rick west",
      "/CreationDate": "D:20080626110350-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20080703073143-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "IOSIPSEC-EAL4-ST-v1-0-0213008.fm",
      "pdf_file_size_bytes": 410147,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 70
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5ab02bbf7bfc3bedd6749a09d726a01b6a9d3b3ef5eec8ec9461e070e9099c55",
      "txt_hash": "1d37f7d9f006e3bcd8a30cbb1b3914d6c1dfd6a81cb2d43e3448095dbee9d8fc"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "edb164a38f2e8c30ab23811430f2f11fadaea82f0beea46dd6341cf555692c32",
      "txt_hash": "241674152124846184234e8aa1bdaa8405a16e41c86e30ea71ea0460b49766bf"
    }
  },
  "status": "archived"
}