Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
genuscreen 4.0
BSI-DSZ-CC-0823-2014
RSA® Access Manager v6.1
383-4-106
name genuscreen 4.0 RSA® Access Manager v6.1
category Boundary Protection Devices and Systems Access Control Devices and Systems
scheme DE CA
not_valid_after 30.10.2019 28.09.2015
not_valid_before 29.10.2014 16.11.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rsa-access-v61-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0823b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rsa-access-v61-sec-eng.pdf
manufacturer GeNUA mbH RSA, The Security Division of EMC
manufacturer_web https://www.genua.de/ https://www.rsa.com/
security_level ASE_TSS.2, AVA_VAN.4, ALC_FLR.2, EAL4+ EAL3+
dgst 4577a1ed977931d9 eb1470677c74fc3b
heuristics/cert_id BSI-DSZ-CC-0823-2014 383-4-106
heuristics/cert_lab BSI []
heuristics/cpe_matches {} cpe:2.3:a:rsa:access_manager_server:6.1:sp2:*:*:*:*:*:*, cpe:2.3:a:rsa:access_manager_server:6.1:*:*:*:*:*:*:*, cpe:2.3:a:rsa:access_manager_server:6.1:sp1:*:*:*:*:*:*, cpe:2.3:a:rsa:access_manager_server:6.1:sp3:*:*:*:*:*:*
heuristics/related_cves {} CVE-2010-3018, CVE-2012-2281, CVE-2011-0322
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, AVA_VAN.4, ADV_TAT.1, ASE_CCL.1, ADV_SPM.1 ALC_DVS.1, ATE_COV.2, ATE_FUN.1, ADV_TDS.2, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_FSP.3, AVA_VAN.2, ALC_CMC.3, AGD_OPE.1, ATE_DPT.1, ALC_CMS.3, ALC_FLR.2, AGD_PRE.1
heuristics/extracted_versions 4.0 6.1
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0966-2015 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-0565-2009 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0966-2015 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0382-2007, BSI-DSZ-CC-0565-2009 {}
heuristics/protection_profiles {} a7429dd1db4c89cc
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AUTHSRV_BR_v1.1.pdf
pdf_data/report_filename 0823a_pdf.pdf rsa-access-v61-cert-eng.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 SOGIS Recognition Agreement for components up to EAL 4
    • cc_version: Product specific Security Target Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0823-2014
    • cert_item: genuscreen 4.0
    • cert_lab: BSI
    • developer: genua mbh
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • CA:
  • DE:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0565-2009: 3
    • BSI-DSZ-CC-0823: 1
    • BSI-DSZ-CC-0823-2014: 18
  • CA:
    • 383-4-106-CR: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 7
    • EAL 2: 4
    • EAL 3: 4
    • EAL 4: 17
    • EAL 4 augmented: 3
    • EAL 5: 9
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 3: 5
    • EAL 3 augmented: 2
    • EAL 3+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 6
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 7
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 7
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.HANET: 3
    • A.INIT: 3
    • A.NOEVIL: 3
    • A.PHYSEC: 4
    • A.RANDOM: 4
    • A.SINGEN: 3
    • A.TIMESTMP: 2
  • OE:
    • OE.ADMIN: 1
    • OE.HANET: 1
    • OE.INIT: 1
    • OE.NOEVIL: 1
    • OE.PHYSEC: 1
    • OE.RANDOM: 1
    • OE.SINGEN: 1
    • OE.TIMESTMP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • secuvera:
    • secuvera: 3
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
    • SHA2:
      • SHA256: 2
      • SHA512: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 10
  • SSH:
    • SSH: 15
  • VPN:
    • VPN: 6
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Evaluation Technical Report BSI-DSZ-CC-0823 for genuscreen 4.0 from genua mbH of secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genucenter Installations- und Konfigurationshandbuch: 1
  • OutOfScope:
    • The genucenter must be operated on real hardware. Running the genucenter in a virtual machine is out of scope for this TOE. The Security Target [6] is the basis for this certification. It is not based on a: 1
    • or Mobile Clients, L2TP VPN, LDAP Authentication, Dynamic Routing, and virtual genucenter are out of scope of the evaluated configuration. In general, all information contained in the Security Target [6: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: User
  • /CCEF: EWA-Canada
  • /CR date: 4 November 2009
  • /CR version: 0.1
  • /Certificate date: 4 November 2009
  • /Comments: Nov. 2009
  • /CreationDate: D:20091117095341-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Developer name: RSA, The Security Division of EMC
  • /Document number: 383-4-106-CR
  • /ETR title, version, date: Evaluation Technical Report for EAL 3+ Common Criteria Evaluation of RSA, The Security Division of EMC RSA® Access Manager v6.1
  • /Evaluation completion date: 4 November 2009
  • /ModDate: D:20091221105845-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /ST Title: RSA, The Security Division of EMC RSA® Access Manager v6.1 Security Target
  • /ST date: 5 November 2009
  • /ST version: 0.8
  • /SourceModified: D:20091117145301
  • /Sponsor: Sponsor
  • /Subject: EAL 3 PCR Template
  • /TOE Version: 6.1
  • /TOE name and version: RSA® Access Manager v6.1
  • /TOE short name: Access Manager
  • /Title: EAL 3 Evaluation of <TOE name and version>
  • pdf_file_size_bytes: 95145
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename 0823b_pdf.pdf rsa-access-v61-sec-eng.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 1
  • EAL:
    • EAL3+: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_INT: 2
    • ADV_SPM: 2
    • ADV_TAT.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_FLR: 1
    • ALC_FLR.2: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 5
    • ALC_LCD.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 20
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR: 12
    • FAU_SAR.1: 3
    • FAU_SAR.3: 1
  • FCS:
    • FCS_CKM: 143
    • FCS_CKM.1: 29
    • FCS_CKM.4: 31
    • FCS_COP: 100
    • FCS_COP.1: 29
  • FDP:
    • FDP_IFC: 53
    • FDP_IFC.1: 33
    • FDP_IFF: 43
    • FDP_IFF.1: 37
    • FDP_ITT: 32
    • FDP_ITT.1: 4
  • FIA:
    • FIA_ATD: 6
    • FIA_ATD.1: 1
    • FIA_SOS: 6
    • FIA_SOS.1: 1
    • FIA_UAU: 12
    • FIA_UAU.2: 1
    • FIA_UAU.6: 1
    • FIA_UID: 6
    • FIA_UID.1: 3
    • FIA_UID.2: 2
  • FMT:
    • FMT_IFC.2: 2
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 166
    • FMT_MSA.1: 26
    • FMT_MSA.2: 4
    • FMT_MSA.3: 18
    • FMT_SMF: 49
    • FMT_SMF.1: 22
    • FMT_SMR: 8
    • FMT_SMR.1: 26
  • FPT:
    • FPT_ITT: 8
    • FPT_ITT.1: 3
    • FPT_STM.1: 3
    • FPT_TEE: 8
    • FPT_TEE.1: 2
    • FPT_TRC: 6
    • FPT_TRC.1: 1
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTP:
    • FTP_STM.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_UAU.2: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 4
    • FDP_IFC.1: 3
    • FDP_RIP.1: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_AFL.2: 1
    • FIA_ATD.1: 26
    • FIA_ATD.1.1: 3
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 12
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 29
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 33
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 14
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TST: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.1: 1
  • FTA:
    • FTA_TAB.1: 9
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 4
    • A.HANET: 5
    • A.INIT: 4
    • A.NOEVIL: 4
    • A.PHYSEC: 4
    • A.RANDOM: 4
    • A.SINGEN: 5
    • A.TIMESTMP: 4
  • O:
    • O.AUDREC: 5
    • O.AUTH: 12
    • O.AVAIL: 5
    • O.CONFID: 13
    • O.INTEG: 9
    • O.MEDIAT: 4
    • O.NOREPLAY: 13
    • O.RS: 11
  • OE:
    • OE.ADMIN: 2
    • OE.HANET: 5
    • OE.INIT: 7
    • OE.NOEVIL: 3
    • OE.PHYSEC: 4
    • OE.RANDOM: 3
    • OE.SINGEN: 4
    • OE.TIMESTMP: 5
  • T:
    • T.MEDIAT: 4
    • T.MMODIFY: 4
    • T.MODIFY: 4
    • T.MSNIFF: 4
    • T.NOAUTH: 4
    • T.SELPRO: 4
    • T.SNIFF: 4
  • A:
    • A.IT_ACCESS: 4
    • A.LOWEXP: 3
    • A.MANAGE: 3
    • A.NO_EVIL: 5
    • A.NO_TOE_BYPASS: 3
    • A.PHYSICAL: 4
    • A.SCALABLE: 4
  • O:
    • O.ADMIN_GUIDANCE: 11
    • O.AUDIT_GENERATION: 6
    • O.CORRECT_TSF_OPERATION: 6
    • O.DISPLAY_BANNER: 8
    • O.MANAGE: 6
    • O.MEDIATE: 10
    • O.PARTIAL_SELF_PROTECTION: 7
    • O.RESIDUAL_INFORMATION: 11
    • O.TOE_ACCESS: 10
  • OE:
    • OE.AUDIT_PROTECTION: 7
    • OE.CAPP_OS: 10
    • OE.COMMS: 8
    • OE.CRYPTOGRAPHY: 5
    • OE.DISPLAY_BANNER: 7
    • OE.FAULT_TOLERANCE: 3
    • OE.IT_ACCESS: 8
    • OE.LOWEXP: 3
    • OE.MANAGE: 7
    • OE.NO_EVIL: 5
    • OE.NO_GENERAL_PURPOSE: 8
    • OE.NO_TOE_BYPASS: 3
    • OE.PHYSICAL: 8
    • OE.PRIORITY: 9
    • OE.RESIDUAL_INFORMATION: 3
    • OE.SCALABLE: 8
    • OE.TOE_ENVIRONMENT_ACCESS: 6
    • OE.WEB_BROWSER_PP: 2
  • T:
    • T.ACCIDENTAL_ADMIN_ERROR: 3
    • T.ACCIDENTAL_AUDIT_COMPR: 2
    • T.ACCIDENTAL_AUDIT_COMPROMISE: 1
    • T.ACCIDENTAL_CRYPTO_COM: 2
    • T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
    • T.LOW_PRIORITY: 3
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-256: 1
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 90
    • IKEv1: 3
  • IPsec:
    • IPsec: 34
  • SSH:
    • SSH: 136
  • VPN:
    • VPN: 17
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp256r1: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 4
    • AIS31: 4
  • FIPS:
    • FIPS180-4: 2
  • PKCS:
    • PKCS #1: 7
    • PKCS#1: 6
  • RFC:
    • RFC2104: 7
    • RFC2409: 9
    • RFC2460: 2
    • RFC2617: 1
    • RFC2965: 1
    • RFC3502: 1
    • RFC3526: 5
    • RFC3602: 1
    • RFC4253: 6
    • RFC4301: 1
    • RFC4344: 1
    • RFC4418: 7
    • RFC4432: 1
    • RFC5656: 7
  • FIPS:
    • FIPS 140-2: 8
  • X509:
    • X.509: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1.4.8.7 Dynamic Routing The dynamic routing feature which uses OSPF only works with IPv4 and is out of scope for this TOE. 1.4.8.8 No virtual genucenter The genucenter must be operated on real hardware: 1
    • out of scope: 4
    • the genucenter in a virtual machine is out of scope for this TOE. 1.4.9 Physical Scope The physical scope of TOE consists only of software and: 1
    • to perform cryptographic operations for IPsec operations. However, usage of the cryptocard is out of scope for this TOE. 1.4.8.2 No USB update The management system genucenter can write configuration: 1
    • when the USB stick is plug into the firewall component. However, usage of the USB update is out of scope for this TOE. 1.4.8.3 No FTP and SIP Relays The product allows the configuration of FTP and SIP: 1
pdf_data/st_metadata
  • /Author: Roland Meister
  • /CreationDate: D:20141023133113+02'00'
  • /Creator: Writer
  • /Keywords: CC 3.1
  • /Producer: LibreOffice 4.1
  • /Subject: Common Criteria
  • /Title: genucreen 4.0 Security Target
  • pdf_file_size_bytes: 657632
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
  • /Author: anicewick
  • /CreationDate: D:20091105095412-05'00'
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20091119114639-05'00'
  • /Producer: GPL Ghostscript 8.54
  • /Subject:
  • /Title: RSA Access Manager ST v0.8
  • pdf_file_size_bytes: 926970
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 81
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different