name |
Cisco ACE XML Gateway and Manager Version 5.0.3
|
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
|
category |
Network and Network-Related Devices and Systems
|
Data Protection
|
not_valid_before |
2008-08-12
|
2014-11-07
|
not_valid_after |
2012-07-20
|
2019-11-08
|
scheme |
US
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10076-st.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
Cisco Systems, Inc.
|
Kanguru Solutions
|
manufacturer_web |
https://www.cisco.com
|
https://www.kanguru.com
|
security_level |
ALC_FLR.2, EAL3+ |
ALC_FLR.1, EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10076-vr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) |
maintenance_updates |
|
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) |
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
27c0a5b4d4c59d03cab34a1acc7e3e0fd6656e6c5c3e658926d904d2aaf7d3af
|
16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
|
state/report/txt_hash |
634d0cd56a5a7313237ed25428a09e09e9371426bfb2617c1faca9c96cc1d69b
|
8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
8bcaec0259ac8eb8694bad3b886ca2cca831bd910b0a74f7056755b305e06fe4
|
077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
|
state/st/txt_hash |
0caf62b0ae9157eed95fe451beee22083c0fb78c8c23748f791b3dae2e05b90e
|
74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
CCEVS-VR-VID-10076-2008
|
BSI-DSZ-CC-0772-2014
|
heuristics/cert_lab |
None
|
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
5.0.3 |
2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- product:
Cisco ACE XML Gateway and Manager Version 5.0.3
- id:
CCEVS-VR-VID10076
- url:
https://www.niap-ccevs.org/product/10076
- certification_date:
2008-08-12T00:08:00Z
- expiration_date:
None
- category:
Firewall
- vendor:
Cisco Systems, Inc.
- evaluation_facility:
Leidos Common Criteria Testing Laboratory
- scheme:
US
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
st_vid10076-vr.pdf
|
0772a_pdf.pdf
|
pdf_data/report_frontpage |
|
- DE:
- match_rules:
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
- cert_id:
BSI-DSZ-CC-0772-2014
- cert_item:
Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
- developer:
Kanguru Solutions
- cert_lab:
BSI
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10076-2008:
1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
2
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ALC |
|
- ALC_FLR.1: 5
- ALC_FLR:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR.2:
1
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.2 |
6
|
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3:
11
- EAL 4:
1
- EAL3:
1
- EAL 3 augmented:
10
- EAL3 augmented:
1
|
- EAL:
- EAL 2:
8
- EAL 1:
7
- EAL 4:
7
- EAL2:
2
- EAL 3:
4
- EAL 5:
6
- EAL 6:
3
- EAL 7:
4
- EAL 2 augmented:
3
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 3:
11
- EAL 4:
1
- EAL3: 1
- EAL 3 augmented: 10
- EAL3 augmented: 1
|
- EAL 2: 8
- EAL 1: 7
- EAL 4:
7
- EAL2: 2
- EAL 3:
4
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL 2 augmented: 3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 3 |
11
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
1
|
7
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_COP.1:
1
- FCS_CKM.1:
1
- FCS_RNG.1:
1
- FDP:
- FDP_ACC.1:
2
- FDP_ACF.1:
2
- FIA:
- FIA_UID.2:
4
- FIA_UAU.2:
4
- FIA_UAU.6:
1
- FIA_SOS.1:
1
- FMT:
- FMT_MTD:
2
- FMT_SMF:
2
- FMT_SMF.1:
1
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User:
1
- KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- ISO:
- ISO/IEC 17065:
2
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102:
1
- BSI 7138:
2
- BSI 7125:
2
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco Systems:
21
- Cisco:
11
- Cisco Systems, Inc:
5
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
252534
- pdf_is_encrypted:
False
- pdf_number_of_pages:
22
- /CreationDate:
D:20080821081424-04'00'
- /Subject:
Validator Report
- /Author:
EvaluationTeam
- /Creator:
Acrobat PDFMaker 7.0 for Word
- /Keywords:
VR
- /Producer:
Acrobat Distiller 7.0 (Windows)
- /ModDate:
D:20080825123129-04'00'
- /Company: SAIC
- /Manager: RZ
- /SourceModified: D:20080821121340
- /Category: Final ETR Package
- /Title:
Validation Report for Cisco Systems ACE AXML Gateway and Manager
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1643286
- pdf_is_encrypted:
False
- pdf_number_of_pages:
42
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20141121083051+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
- /ModDate:
D:20141121113713+01'00'
- /Producer:
LibreOffice 4.2
- /Subject:
Common Criteria Certification
- /Title:
Certification Report BSI-DSZ-CC-0772-2014
- pdf_hyperlinks:
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
|
pdf_data/report_metadata//Author |
EvaluationTeam
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20080821081424-04'00'
|
D:20141121083051+01'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 7.0 for Word
|
Writer
|
pdf_data/report_metadata//Keywords |
VR
|
"Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
|
pdf_data/report_metadata//ModDate |
D:20080825123129-04'00'
|
D:20141121113713+01'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 7.0 (Windows)
|
LibreOffice 4.2
|
pdf_data/report_metadata//Subject |
Validator Report
|
Common Criteria Certification
|
pdf_data/report_metadata//Title |
Validation Report for Cisco Systems ACE AXML Gateway and Manager
|
Certification Report BSI-DSZ-CC-0772-2014
|
pdf_data/report_metadata/pdf_file_size_bytes |
252534
|
1643286
|
pdf_data/report_metadata/pdf_hyperlinks |
|
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
22
|
42
|
pdf_data/st_filename |
st_vid10076-st.pdf
|
0772b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.ACCOUN:
4
- O.AUDREC:
2
- O.IDAUTH:
4
- O.SECFUN:
2
- O.SELPRO:
4
- O.LIMEXT:
2
- O.TIME:
4
- T:
- A:
- A.ACCESS:
3
- A.ASCOPE:
3
- A.DYNMIC:
3
- A.SINGEN:
3
- A.LOCATE:
3
- A.PROTCT:
3
- A.MANAGE:
3
- A.NOEVIL:
3
- OE:
- OE.ENCRYP:
3
- OE.INSTAL:
3
- OE.PHYCAL:
4
- OE.CREDEN:
3
- OE.PERSON:
3
- OE.INTROP:
5
- OE.SINGEN:
2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0025:
6
- BSI-PP- 0025:
13
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP:
1
- ACM_SCP.1:
7
- ACM_CAP.3:
18
- ADO:
- ADO_DEL:
1
- ADO_IGS:
1
- ADO_DEL.1:
7
- ADO_IGS.1:
9
- ADV:
- ADV_FSP:
1
- ADV_HLD:
1
- ADV_RCR:
1
- ADV_FSP.1:
24
- ADV_HLD.2:
13
- ADV_RCR.1:
8
- ADV_HLD.1:
7
- AGD:
- AGD_ADM:
1
- AGD_USR:
1
- AGD_ADM.1:
21
- AGD_USR.1:
19
- ALC:
- ALC_FLR.2:
29
- ALC_FLR:
1
- ALC_DVS:
1
- ALC_DVS.1:
9
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- ATE_COV.2:
6
- ATE_DPT.1:
6
- ATE_FUN.1:
16
- ATE_IND.2:
8
- ATE_COV.1:
1
- AVA:
- AVA_SOF:
1
- AVA_VLA:
1
- AVA_MSU.1:
12
- AVA_SOF.1:
8
- AVA_VLA.1:
10
|
- ADV:
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP:
1
- ADV_HLD:
1
- ADV_RCR:
1
- ADV_FSP.1:
24
- ADV_HLD.2:
13
- ADV_RCR.1:
8
- ADV_HLD.1:
7
|
- ADV_SPM.1:
2
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM:
1
- AGD_USR:
1
- AGD_ADM.1:
21
- AGD_USR.1:
19
|
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.2:
29
- ALC_FLR:
1
- ALC_DVS:
1
- ALC_DVS.1:
9
|
- ALC_FLR.1:
5
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- ATE_COV.2: 6
- ATE_DPT.1: 6
- ATE_FUN.1:
16
- ATE_IND.2:
8
- ATE_COV.1:
1
|
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
16
|
1
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
8
|
1
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_SOF:
1
- AVA_VLA:
1
- AVA_MSU.1:
12
- AVA_SOF.1:
8
- AVA_VLA.1:
10
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL 3:
14
- EAL 3 augmented:
13
|
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN:
3
- FAU_SAR.1: 9
- FAU_STG: 4
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_SAR: 2
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
3
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM: 2
- FCS_COP: 2
- FCS_CKM.1:
8
- FCS_CKM.1.1:
1
- FCS_COP.1:
7
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
- FCS_CKM.4:
6
|
- FCS_RNG.1: 15
- FCS_CKM.1:
9
- FCS_CKM.4:
9
- FCS_COP.1:
9
- FCS_RNG: 2
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FCS_CKM.1.1:
1
- FCS_CKM.4.1: 1
- FCS_COP.1.1:
1
- FCS_CKM.2:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
8
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
6
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
7
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC: 2
- FDP_ACC.1:
2
- FDP_IFC: 4
- FDP_IFF: 4
- FDP_IFC.1:
8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1:
2
|
- FDP_ACC.1:
14
- FDP_ACF.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1:
2
- FDP_ITC.2: 2
- FDP_IFC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
2
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
8
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL: 3
- FIA_ATD: 4
- FIA_UAU: 3
- FIA_UID: 4
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU.2:
5
- FIA_UAU.2.1:
1
- FIA_UID.2:
4
- FIA_UID.2.1:
1
- FIA_UID.1:
1
|
- FIA_UAU.1: 7
- FIA_UAU.6: 8
- FIA_SOS.1: 8
- FIA_UAU.2:
9
- FIA_UID.2:
10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6.1: 1
- FIA_SOS.1.1: 1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 |
5
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
4
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF: 5
- FMT_MSA.1:
9
- FMT_MSA: 6
- FMT_MTD.1:
9
- FMT_REV: 3
- FMT_SMF:
3
- FMT_SMR: 3
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.3:
5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_REV.1: 3
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1:
9
- FMT_SMF.1.1:
1
- FMT_SMR.1:
11
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD:
3
- FMT_MSA.2: 4
|
- FMT_MSA.1:
8
- FMT_MTD:
12
- FMT_SMF:
20
- FMT_SMR.1:
12
- FMT_SMF.1:
6
- FMT_MTD.1:
3
- FMT_MSA.1.1: 1
- FMT_MTD.1.1: 2
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.3:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
9
|
8
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
5
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
3
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
9
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
3
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
9
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
11
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_ITT:
4
- FPT_RVM:
3
- FPT_STM:
4
- FPT_ITT.1:
4
- FPT_ITT.1.1:
1
- FPT_RVM.1:
4
- FPT_RVM.1.1:
1
- FPT_STM.1:
5
- FPT_STM.1.1:
1
|
- FPT_FLS.1:
9
- FPT_RCV.4:
8
- FPT_PHP.1:
8
- FPT_RCV.4.1:
2
- FPT_FLS.1.1:
1
- FPT_PHP.1.1:
1
- FPT_PHP.1.2:
1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Out of scope:
2
- 11 1.5.4.3 Out of scope :
1
- 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5:
1
- from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186:
1
- FIPS PUB 140-2:
5
- FIPS 197:
2
- FIPS PUB 186-2:
2
- FIPS PUB 180-1:
2
- FIPS 140-2:
2
- PKCS:
- RFC:
- RFC 1979:
1
- RFC 986:
1
- RFC 2246:
1
- RFC 2617:
1
- RFC 2616:
1
- RFC 2459:
1
- RFC 1867:
1
- X509:
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco Systems, Inc:
8
- Cisco Systems:
35
- Cisco:
6
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
601384
- pdf_is_encrypted:
False
- pdf_number_of_pages:
58
- /CreationDate:
D:20080821093507-04'00'
- /Subject:
Security Target
- /Author:
SAIC CCTL
- /Creator:
Acrobat PDFMaker 7.0 for Word
- /Producer:
Acrobat Distiller 7.0 (Windows)
- /ModDate:
D:20080825123120-04'00'
- /Company: Cisco Systems, Inc.
- /Manager: Julie Taylor (SAIC) / Konstantin Goldin (Cisco)
- /SourceModified: D:20080807175800
- /Title:
Cisco Systems, Inc. ACE XML Gateway and Manager Version 5.0.3 Security Target
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
704587
- pdf_is_encrypted:
False
- pdf_number_of_pages:
41
- /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
- /Subject:
- /Title:
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
- /Creator:
Unknown
- /Author:
Andreas Siegert (generated by CCTool version 2.8)
- /Producer:
XEP 4.23
- /application: CCTool version x.y
- /Trapped: /False
- /CreationDate:
D:20141006150157Z
- /ModDate:
D:20141006150157Z
- pdf_hyperlinks:
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
|
pdf_data/st_metadata//Author |
SAIC CCTL
|
Andreas Siegert (generated by CCTool version 2.8)
|
pdf_data/st_metadata//CreationDate |
D:20080821093507-04'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Creator |
Acrobat PDFMaker 7.0 for Word
|
Unknown
|
pdf_data/st_metadata//ModDate |
D:20080825123120-04'00'
|
D:20141006150157Z
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 7.0 (Windows)
|
XEP 4.23
|
pdf_data/st_metadata//Subject |
Security Target
|
|
pdf_data/st_metadata//Title |
Cisco Systems, Inc. ACE XML Gateway and Manager Version 5.0.3 Security Target
|
Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
|
pdf_data/st_metadata/pdf_file_size_bytes |
601384
|
704587
|
pdf_data/st_metadata/pdf_hyperlinks |
|
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
58
|
41
|
dgst |
398b56cc4fb9c98f
|
eda06ca3c208ebd0
|