name |
genuscreen 4.0 |
McAfee Network Security Platform M-series and NS-Series Sensors |
category |
Boundary Protection Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
CA |
status |
archived |
archived |
not_valid_after |
30.10.2019 |
03.05.2021 |
not_valid_before |
29.10.2014 |
03.05.2016 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-289%20new%20and%20improved%20cert%20signed.docx |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-network-security-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/mcafee-nsp-mns-sec-eng.pdf |
manufacturer |
GeNUA mbH |
Intel Corporation |
manufacturer_web |
https://www.genua.de/ |
https://www.intel.com |
security_level |
ASE_TSS.2, AVA_VAN.4, ALC_FLR.2, EAL4+ |
{} |
dgst |
4577a1ed977931d9 |
94e4140f25fff164 |
heuristics/cert_id |
BSI-DSZ-CC-0823-2014 |
383-4-289 |
heuristics/cert_lab |
BSI |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ADV_TAT.1, ASE_CCL.1, ADV_SPM.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
4.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0966-2015 |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0565-2009 |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0966-2015 |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0382-2007, BSI-DSZ-CC-0565-2009 |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
ac9abe3d5c5a31f0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/cert_filename |
|
383-4-289 new and improved cert signed.docx |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0823a_pdf.pdf |
mcafee-network-security-cert-eng.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0823-2014
- cert_item: genuscreen 4.0
- cert_lab: BSI
- developer: genua mbh
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
- CA:
|
- DE:
- CA:
- cert_id: 383-4-289-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0565-2009: 3
- BSI-DSZ-CC-0823: 1
- BSI-DSZ-CC-0823-2014: 18
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 17
- EAL 4 augmented: 3
- EAL 5: 9
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 6
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 7
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 7
- AVA_VAN.5: 1
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM_EXT.4: 1
- FCS_RBG_EXT.1: 1
- FCS_TLS_EXT.1: 1
- FIA:
- FIA_PMG_EXT.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UIA_EXT.1: 1
- FPT:
- FPT_APW_EXT.1: 1
- FPT_SKP_EXT.1: 1
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FTA:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.HANET: 3
- A.INIT: 3
- A.NOEVIL: 3
- A.PHYSEC: 4
- A.RANDOM: 4
- A.SINGEN: 3
- A.TIMESTMP: 2
- OE:
- OE.ADMIN: 1
- OE.HANET: 1
- OE.INIT: 1
- OE.NOEVIL: 1
- OE.PHYSEC: 1
- OE.RANDOM: 1
- OE.SINGEN: 1
- OE.TIMESTMP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
- OutOfScope:
- The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
- or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6: 1
- out of scope: 2
|
|
pdf_data/report_metadata |
|
- /Author: Garneau, Line M.
- /CR version: 1.0
- /Company: CSEC-CSTC
- /Conformance Claim: Conformance Claim (EAL number augmented?)
- /CreationDate: D:20160704082435-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Developer name: Intel Corporation
- /Document number: 383-4-289-CR
- /ETR title, version, date: Evaluation Technical Report for NDPP V1.1 Compliant CC Evaluation of McAfee Inc. McAfee Network Security Platform 8.1, version 1.3, 12 April 2016
- /Evaluation completion date: 3 May 2016
- /ModDate: D:20160704082509-04'00'
- /Producer: Adobe PDF Library 11.0
- /ST Title: McAfee Network Security Platform M-Series and NS-Series sensors Version 8.1 Security Target version 1.01, April 8, 2016
- /SourceModified: D:20160621174714
- /TOE name and version: McAfee Network Security Platform M-Series and NS-Series Sensors
- /TOE short name: McAfee NSP Sensors
- /Title: McAfee Network Security Platform M-Series and NS-Series Sensors
- pdf_file_size_bytes: 204123
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
0823b_pdf.pdf |
mcafee-nsp-mns-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 4
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_INT: 2
- ADV_SPM: 2
- ADV_TAT.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 3
- AGD_PRE: 1
- AGD_PRE.1: 3
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_FLR: 1
- ALC_FLR.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 2
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 2
- ATE_FUN: 1
- ATE_FUN.1: 4
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 20
- FAU_GEN.1: 5
- FAU_GEN.2: 1
- FAU_SAR: 12
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FCS:
- FCS_CKM: 143
- FCS_CKM.1: 29
- FCS_CKM.4: 31
- FCS_COP: 100
- FCS_COP.1: 29
- FDP:
- FDP_IFC: 53
- FDP_IFC.1: 33
- FDP_IFF: 43
- FDP_IFF.1: 37
- FDP_ITT: 32
- FDP_ITT.1: 4
- FIA:
- FIA_ATD: 6
- FIA_ATD.1: 1
- FIA_SOS: 6
- FIA_SOS.1: 1
- FIA_UAU: 12
- FIA_UAU.2: 1
- FIA_UAU.6: 1
- FIA_UID: 6
- FIA_UID.1: 3
- FIA_UID.2: 2
- FMT:
- FMT_IFC.2: 2
- FMT_MOF: 6
- FMT_MOF.1: 1
- FMT_MSA: 166
- FMT_MSA.1: 26
- FMT_MSA.2: 4
- FMT_MSA.3: 18
- FMT_SMF: 49
- FMT_SMF.1: 22
- FMT_SMR: 8
- FMT_SMR.1: 26
- FPT:
- FPT_ITT: 8
- FPT_ITT.1: 3
- FPT_STM.1: 3
- FPT_TEE: 8
- FPT_TEE.1: 2
- FPT_TRC: 6
- FPT_TRC.1: 1
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FTP:
|
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 4
- FAU_STG_EXT.1: 9
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.4: 8
- FCS_CKM_EXT.4: 13
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 21
- FCS_COP.1.1: 5
- FCS_RBG: 1
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSH: 1
- FCS_SSH_EXT: 2
- FCS_SSH_EXT.1: 8
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS: 3
- FCS_TLS_EXT.1: 9
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_PMG: 3
- FIA_PMG_EXT.1: 10
- FIA_PMG_EXT.1.1: 2
- FIA_UAU: 5
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.2: 10
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 2
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 13
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID: 1
- FIA_UID.1: 3
- FMT:
- FMT_MSA: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW: 2
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 8
- FPT_APW_EXT.1.1: 3
- FPT_APW_EXT.1.2: 2
- FPT_CKM.1: 1
- FPT_SKP: 2
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST: 4
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 3
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 10
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 4
- A.HANET: 5
- A.INIT: 4
- A.NOEVIL: 4
- A.PHYSEC: 4
- A.RANDOM: 4
- A.SINGEN: 5
- A.TIMESTMP: 4
- O:
- O.AUDREC: 5
- O.AUTH: 12
- O.AVAIL: 5
- O.CONFID: 13
- O.INTEG: 9
- O.MEDIAT: 4
- O.NOREPLAY: 13
- O.RS: 11
- OE:
- OE.ADMIN: 2
- OE.HANET: 5
- OE.INIT: 7
- OE.NOEVIL: 3
- OE.PHYSEC: 4
- OE.RANDOM: 3
- OE.SINGEN: 4
- OE.TIMESTMP: 5
- T:
- T.MEDIAT: 4
- T.MMODIFY: 4
- T.MODIFY: 4
- T.MSNIFF: 4
- T.NOAUTH: 4
- T.SELPRO: 4
- T.SNIFF: 4
|
- A:
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 2
- O:
- O.DISPLAY_BANNER: 4
- O.PROTECTED_: 1
- O.PROTECTED_COMMUNICATIONS: 5
- O.RESIDUAL_INFORMATIO: 1
- O.RESIDUAL_INFORMATION_CLEARING: 4
- O.SESSION_LOCK: 5
- O.SYSTEM_MONITORING: 5
- O.TOE_ADMINISTRATION: 4
- O.TSF_SELFTEST: 1
- O.TSF_SELF_TEST: 5
- O.VERIFIABLE: 2
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 2
- OE.TRUSTED_ADMIN: 3
- T:
- T.ADMIN_ERROR: 3
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDAT: 1
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- SSH:
- TLS:
- TLS:
- TLS: 28
- TLS 1.0: 2
- TLS 1.1: 1
- TLS 1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- PKCS:
- RFC:
- RFC2104: 7
- RFC2409: 9
- RFC2460: 2
- RFC2617: 1
- RFC2965: 1
- RFC3502: 1
- RFC3526: 5
- RFC3602: 1
- RFC4253: 6
- RFC4301: 1
- RFC4344: 1
- RFC4418: 7
- RFC4432: 1
- RFC5656: 7
|
- FIPS:
- FIPS 140: 4
- FIPS 186-4: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS140-2: 1
- FIPS186-4: 1
- NIST:
- NIST SP 800-38A: 1
- SP 800-56B: 1
- RFC:
- RFC 2246: 3
- RFC 4253: 2
- RFC 4346: 1
- RFC 5246: 1
- RFC4252: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware: 1
- out of scope: 4
- the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and: 1
- to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration: 1
- when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP: 1
|
|
pdf_data/st_metadata |
- /Author: Roland Meister
- /CreationDate: D:20141023133113+02'00'
- /Creator: Writer
- /Keywords: CC 3.1
- /Producer: LibreOffice 4.1
- /Subject: Common Criteria
- /Title: genucreen 4.0 Security Target
- pdf_file_size_bytes: 657632
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |