name |
Cisco Adaptive Security Appliances (ASA) 5500-X, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.16 |
Cisco Adaptive Security Appliances (ASA) Firewall and Virtual Private Network (VPN) Platform, version 9.4(1) |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
AU |
status |
archived |
archived |
not_valid_after |
14.07.2024 |
11.10.2021 |
not_valid_before |
14.07.2022 |
21.07.2015 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11257-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11257-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR_Cisco_ASA_9.4(1)_v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11257-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Cisco_ASA_9.4(1).pdf |
manufacturer |
Cisco Systems, Inc. |
Cisco Systems, Inc. |
manufacturer_web |
https://www.cisco.com |
https://www.cisco.com |
security_level |
{} |
{} |
dgst |
59ed3af4bc6e00b4 |
29ad4a7a7df713b8 |
heuristics/cert_id |
CCEVS-VR-11257-2022 |
Certificate Number: 2015/93 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:isa_3000:-:*:*:*:*:*:*:*, cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2008-3815, CVE-2010-4354 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ALC_CMS.1, ADV_FSP.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMC.1 |
AGD_PRE.1, ALC_CMS.1, ADV_FSP.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ALC_CMC.1 |
heuristics/extracted_versions |
9.16 |
9.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Firewall, Virtual Private Network
- certification_date: 14.07.2022
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 14.07.2024
- id: CCEVS-VR-VID11257
- product: Cisco Adaptive Security Appliances (ASA) 5500-X, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) Version 9.16
- scheme: US
- url: https://www.niap-ccevs.org/product/11257
- vendor: Cisco Systems, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
st_vid11257-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11257-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220715115523-04'00'
- /ModDate: D:20220715115523-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181346
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11257-vr.pdf |
CR_Cisco_ASA_9.4(1)_v1.0.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11257-2022
- cert_item: Cisco Adaptive Security Appliances (ASA) 5500-X, Industrial Security Appliances (ISA) 3000 and Adaptive Security Appliances Virtual (ASAv) 9.16
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- AU:
- Certification Report 2015/93: 1
- FR:
- Certification Report 2015/93: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TRUSTED_ADMIN: 1
|
pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 25
- Cisco Systems, Inc: 3
|
- Cisco:
- Cisco: 33
- Cisco Systems: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: ACA
- /Company: Department of Defence
- /CreationDate: D:20150721134354+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /ModDate: D:20150721134357+10'00'
- /Objective-Classification: [Inherited - Restricted]
- /Objective-CreationStamp: D:20150716
- /Objective-Id: R22840688
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:20150721
- /Objective-Owner: Chan, Hin (Mr)(I&S ASD)
- /Objective-Parent: Certification
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T0083 Cisco ASA 9.4(1):Certification:
- /Objective-State: Being Edited
- /Objective-Title: Cisco _ASA_9.4(1)CR_V0.1
- /Objective-Version: 0.5
- /Objective-VersionNumber: 5
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /SourceModified: D:20150721034313
- /Title:
- pdf_file_size_bytes: 207919
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
st_vid11257-st.pdf |
ST_Cisco_ASA_9.4(1).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ATE:
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 9
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 23
- FCS_COP.1: 4
- FCS_NTP_EXT.1: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 3
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSS_EXT.1: 7
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 3
- FDP:
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 5
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF: 11
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS: 5
- FPT_FLS.1: 2
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.3: 5
- FPT_TST_EXT.3.1: 1
- FPT_TST_EXT.3.2: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTA_VCM_EXT.1: 5
- FTA_VCM_EXT.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 11
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 6
- FAU_STG_EXT.1.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 2
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FCS_IKE_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSH_EXT.1: 6
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_RIP.2: 6
- FDP_RIP.2.1: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_PSK_EXT.1.4: 1
- FIA_UAU.6: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.5: 1
- FIA_UIA_EXT.1: 6
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SFR.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.2: 5
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_PTD_EXT.1: 2
- FPT_RPL.1: 1
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 5
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FRU:
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 2
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 7
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_TSE.1: 5
- FTA_TSE.1.1: 1
- FTA_VCM_EXT.1: 5
- FTA_VCM_EXT.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_: 1
- A.CONNECTIONS: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- A.VS_CORRECT_CONFIGURATION: 1
- A.VS_ISOLATON: 1
- A.VS_REGULAR_UPDATES: 1
- A.VS_TRUSTED_ADMINISTRATOR: 1
- O:
- O.ADDRESS_FILTERING: 1
- O.AUTHENTICATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.FAIL_SECURE: 1
- O.PORT_FILTERING: 1
- O.RESIDUAL_INFORMATION: 1
- O.STATEFUL_TRAFFIC_FILTERING: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- OE:
- OE.ADMIN_CREDENTIALS_: 1
- OE.CONNECTIONS: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- OE.VM_CONFIGURATION: 1
- T:
- T.DATA_INTEGRITY: 1
- T.MALICIOUS_TRAFFIC: 1
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_MISUSE: 2
- T.PASSWORD_CRACKING: 1
- T.REPLAY_ATTACK: 1
- T.SECURITY_FUNCTIONALITY_: 2
- T.UNAUTHORIZED_: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATIONS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.CONNECTIONS: 1
- A.NO_GENERAL_PURPOSE: 4
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 4
- O:
- O.ADDRESS_: 1
- O.ADDRESS_FILTERING: 5
- O.ASSIGNED_PRIV: 1
- O.ASSIGNED_PRIVATE_ADDR: 2
- O.ASSIGNED_PRIVATE_ADDRESS: 1
- O.AUTHENTICATIO: 1
- O.AUTHENTICATION: 5
- O.CLIENT_ESTABLI: 1
- O.CLIENT_ESTABLISHMENT_: 2
- O.CLIENT_ESTABLISHMENT_CONSTRAINTS: 1
- O.CRYPTOGRAPHI: 1
- O.CRYPTOGRAPHIC_FUNCTI: 1
- O.CRYPTOGRAPHIC_FUNCTIO: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.DISPLAY_: 1
- O.DISPLAY_BANNER: 3
- O.FAIL_SECURE: 6
- O.PORT_FILTERING: 4
- O.PROTECTED_: 1
- O.PROTECTED_COMMUNICA: 1
- O.PROTECTED_COMMUNICAT: 1
- O.PROTECTED_COMMUNICATIONS: 3
- O.RELATED_: 1
- O.RELATED_CONNECTION_FI: 2
- O.RELATED_CONNECTION_FILTERING: 3
- O.REMOTE_SESSIO: 1
- O.REMOTE_SESSION_TERMIN: 2
- O.REMOTE_SESSION_TERMINATION: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION_: 2
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.RESOURCE_AVAILABILITY: 1
- O.SESSION_LOCK: 6
- O.STATEFUL_: 1
- O.STATEFUL_INSPECTION: 3
- O.SYSTEM_: 1
- O.SYSTEM_MONITORING: 5
- O.TOE_: 1
- O.TOE_ADMINISTRATION: 5
- O.TSF_SELF_TEST: 4
- O.VERIFIABLE_: 1
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.CONNECTIONS: 2
- OE.NO_GENERAL_: 1
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 3
- OE.TRUSTED_: 1
- OE.TRUSTED_ADMIN: 2
- T:
- T.ADMIN_ERROR: 4
- T.DATA_INTEGRITY: 2
- T.HIJACKED_SESSION: 2
- T.NETWORK_ACCESS: 1
- T.NETWORK_DISCLOSURE: 6
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 5
- T.REPLAY_ATTACK: 4
- T.TRANSMIT: 1
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_CONNECTI: 2
- T.UNAUTHORIZED_CONNECTION: 1
- T.UNAUTHORIZED_CONNECTIONS: 1
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 2
- T.UNPROTECTED_TRAFFIC: 4
- T.USER_DATA_REUSE: 4
|
pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 27
- Cisco Systems, Inc: 6
- Microsoft:
|
- Cisco:
- Cisco: 24
- Cisco Systems, Inc: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 7
- HMAC-SHA-384: 6
- HMAC-SHA-512: 6
- miscellaneous:
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 7
- SHA256: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 2
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 52
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- TLS1.1: 2
- TLS1.2: 2
- TLSv1.1: 1
- TLSv1.2: 11
- VPN:
|
- IKE:
- IKE: 33
- IKEv1: 1
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 22
- TLS 1.0: 1
- TLS 1.2: 1
- TLS v1.0: 1
- TLSv1.2: 1
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 14
- P-384: 14
- P-521: 14
- secp256r1: 3
- secp384r1: 4
- secp521r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 2
- FIPS PUB 186-3: 1
- FIPS PUB 186-4: 12
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 2460: 4
- RFC 2818: 1
- RFC 2986: 1
- RFC 3268: 4
- RFC 3447: 2
- RFC 3513: 2
- RFC 3526: 5
- RFC 3602: 3
- RFC 4106: 2
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4346: 5
- RFC 4443: 1
- RFC 4868: 1
- RFC 4945: 1
- RFC 5077: 1
- RFC 5114: 1
- RFC 5246: 9
- RFC 5280: 4
- RFC 5282: 1
- RFC 5289: 4
- RFC 5735: 2
- RFC 5759: 1
- RFC 5996: 2
- RFC 6125: 1
- RFC 6960: 1
- RFC 768: 4
- RFC 791: 4
- RFC 792: 1
- RFC 793: 4
- X509:
|
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 186-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 180-4: 2
- FIPS PUB 186-2: 3
- FIPS PUB 186-3: 10
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-56A: 3
- NIST SP 800-56B: 2
- SP 800-90: 1
- RFC:
- RFC 2246: 1
- RFC 2460: 5
- RFC 2560: 1
- RFC 2818: 1
- RFC 2986: 1
- RFC 3513: 2
- RFC 3602: 1
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4443: 3
- RFC 4945: 1
- RFC 5246: 1
- RFC 5280: 2
- RFC 5282: 1
- RFC 5735: 2
- RFC 5759: 1
- RFC 6379: 1
- RFC 768: 5
- RFC 791: 5
- RFC 792: 3
- RFC 793: 5
- RFC 959: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /ASDM _version: 7.1(3)
- /Author: Cisco Systems
- /Company: Cisco Systems, Inc.
- /CreationDate: D:20150721134959+10'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /FIPS_cert: TBD
- /ModDate: D:20150721135009+10'00'
- /Models: ASA 5500 (5505, 5510, 5520, 5540, 5550, 5580-20-40), ASA 5500-X Series (5512-X, 5515-X, 5525-X, 5545-X, 5555-X), ASA 5585-X (5585-10, 5585-20, 5585-40, 5585-60), ASA Services Module (ASA-SM)
- /NDPP_Version: 1.1
- /Objective-Caveats:
- /Objective-Classification: [Inherited - Restricted]
- /Objective-Comment:
- /Objective-CreationStamp: D:16170124
- /Objective-DatePublished:
- /Objective-Document Type [system]:
- /Objective-FileNumber:
- /Objective-Id: R22745603
- /Objective-IsApproved: 0
- /Objective-IsPublished: 0
- /Objective-ModificationStamp: D:16170124
- /Objective-Owner: Caulfield, Terence (MR)(ASD)
- /Objective-Parent: Security Target
- /Objective-Path: Objective Global Folder - PROD:Defence Business Units:Intelligence and Security Group:Defence Signals Directorate:DSD : Defence Signals Directorate (DSD):CISD:ASCS:CSPD:Evals:Australasn Certn Auth:Certification:Operations:AISEP Certification Records:EFC-T
- /Objective-State: Being Edited
- /Objective-Title: Cisco_ASA_9.4.x_Security_Target-ASA
- /Objective-Version: 0.2
- /Objective-VersionComment:
- /Objective-VersionNumber: 2
- /PP: U.S. Government Protection Profile for Security Requirements for Network Devices (NDPP) and Traffic Filter Firewall Extended Package (TFFWEP)
- /PP_2: NDPP and TFFWEP
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Subject: Copyright (C) Cisco 2015
- /TFFW_Version: 1.0
- /TOE: Adaptive Security Appliances
- /TOE_Software_Version: 9.1(2)
- /TOE_short: ASA
- /Title: Cisco ASA Security Target
- /_Date: August, 2013
- /_Version: 1.0
- pdf_file_size_bytes: 597247
- pdf_hyperlinks:
|