Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
genuscreen 8.0
BSI-DSZ-CC-1194-2023
Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
CCEVS-VR-11186-2021
name genuscreen 8.0 Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
category Boundary Protection Devices and Systems Network and Network-Related Devices and Systems
scheme DE US
status active archived
not_valid_after 05.04.2028 28.12.2023
not_valid_before 06.04.2023 28.12.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1194c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11186-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1194a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11186-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1194b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11186-st.pdf
manufacturer genua GmbH Cisco Systems, Inc.
manufacturer_web https://www.genua.de https://www.cisco.com
security_level EAL4+, ALC_PAM.1, AVA_VAN.4, ASE_TSS.2, ALC_FLR.2 {}
dgst 700b0783f3fe80bb d64e23bf45735ebb
heuristics/cert_id BSI-DSZ-CC-1194-2023 CCEVS-VR-11186-2021
heuristics/cert_lab BSI US
heuristics/cpe_matches {} cpe:2.3:o:cisco:ios_xe:17.3:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-20056, CVE-2021-1382, CVE-2021-1625, CVE-2023-20097, CVE-2024-20271, CVE-2019-12660, CVE-2023-20198, CVE-2023-20076, CVE-2023-44487, CVE-2021-1616, CVE-2021-34729, CVE-2023-20273, CVE-2022-20920
heuristics/extracted_sars ADV_TDS.3, ALC_PAM.1, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ADV_TAT.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.4, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1 ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 8.0 17.3
heuristics/report_references/directly_referencing BSI-DSZ-CC-1142-2020 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1142-2020 {}
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11186/
  • categories: ['Network Device', ' Virtual Private Network']
  • category: Network Device
  • certification_date: 28.12.2021
  • evaluation_facility: Acumen Security
  • expiration_date: 28.12.2023
  • id: CCEVS-VR-VID11186
  • product: Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11186
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles {} 89f2a255423f4a20
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf
pdf_data/cert_filename 1194c_pdf.pdf st_vid11186-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1194-2023: 1
  • US:
    • CCEVS-VR-VID11186-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
    • ALC_PAM.1: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.4: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 4
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
  • /Subject: Common Criteria, Certification, Zertifizierung, BSI-DSZ-CC-1194-2023, firewall and VPN gateway, genuscreen 8.0, genua GmbH
  • /Title: Certificate BSI-DSZ-CC-1194-2023 for genuscreen 8.0 from genua GmbH
  • pdf_file_size_bytes: 325879
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20211229123705-05'00'
  • /ModDate: D:20211229123705-05'00'
  • pdf_file_size_bytes: 170352
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1194a_pdf.pdf st_vid11186-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 extended EAL 4 augmented by ALC_FLR.2, ASE_TSS.2, AVA_VAN.4 and ALC_PAM.1
    • cc_version: Product specific Security Target Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1194-2023
    • cert_item: genuscreen 8.0
    • cert_lab: BSI
    • developer: genua GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-11186-2021
    • cert_item: for the Cisco Aggregation Services Router 1000 Series (ASR1K), Cisco Cloud Services Router 1000V (CSR1000V), Cisco Integrated Services Router 1100 Series (ISR1100), Cisco Integrated Services Router 4200 Series (ISR4K) running IOS-XE 17.3
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1142-2020: 3
    • BSI-DSZ-CC-1194-2023: 15
  • US:
    • CCEVS-VR-11186-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 5
    • ALC_PAM.1: 5
  • ASE:
    • ASE_TSS.2: 5
  • AVA:
    • AVA_VAN.4: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 2
    • FCS_COP: 3
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.HANET: 2
    • A.INIT: 2
    • A.LOCAL: 2
    • A.NOEVIL: 2
    • A.PHYSEC: 3
    • A.REMOTE_AUTH: 2
    • A.REST: 2
    • A.SINGEN: 2
    • A.TIMESTMP: 2
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 2
    • A.VS_CORRECT_CONFIGURATION: 1
    • A.VS_ISOLATON: 1
    • A.VS_REGULAR_UPDATES: 1
    • A.VS_TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_MISUSE: 1
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 78
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/eval_facility
  • secuvera:
    • secuvera: 3
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 2
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 1
    • Key exchange: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 8
  • SSH:
    • SSH: 4
  • TLS:
    • TLS:
      • TLSv1.2: 1
      • TLSv1.3: 1
  • VPN:
    • VPN: 8
  • IKE:
    • IKE: 2
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 21
  • SSH:
    • SSH: 9
    • SSHv2: 4
  • VPN:
    • VPN: 33
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2021-1446: 2
    • CVE-2021-1621: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
    • AIS 46: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • X509:
    • X.509: 1
  • FIPS:
    • FIPS 186-4: 2
  • ISO:
    • ISO/IEC 18031:2011: 1
  • NIST:
    • SP 800-90: 1
  • PKCS:
    • PKCS#1: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for genuscreen 8.0 from genua GmbH, Version 3, Date: 30.03.2023, secuvera GmbH (confidential document) [8] Guidance documentation for the TOE, genuscreen Installations- und Konfigurationshandbuch: 1
  • OutOfScope:
    • L2TP VPN, MOBIKE VPN, Dynamic Routing, genucenter HA, Remote Maintenance, getimagesfromcpt) are out of scope of the evaluated configuration. 18 / 26 BSI-DSZ-CC-1194-2023 Certification Report All information: 1
    • components were installed on physical hardware, the installation of the TOE on virtual machines is out of scope of the evaluated configuration. For the operational configuration the genuscreens and the: 1
    • out of scope: 2
pdf_data/report_metadata
  • /CreationDate: D:20211229111542-05'00'
  • /ModDate: D:20211229111542-05'00'
  • pdf_file_size_bytes: 1286945
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename 1194b_pdf.pdf st_vid11186-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_INT: 2
    • ADV_SPM: 2
    • ADV_TAT.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_FLR: 1
    • ALC_FLR.2: 4
    • ALC_LCD: 1
    • ALC_LCD.1: 2
    • ALC_PAM: 30
    • ALC_PAM.1: 52
    • ALC_TAT: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 4
  • ADV:
    • ADV_FSP.1: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 17
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_SAR: 10
    • FAU_SAR.1: 3
    • FAU_SAR.3: 1
    • FAU_UPD: 1
  • FCS:
    • FCS_CKM: 87
    • FCS_CKM.1: 20
    • FCS_CKM.4: 23
    • FCS_COP: 70
    • FCS_COP.1: 22
    • FCS_RNG: 1
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_IFC: 43
    • FDP_IFC.1: 31
    • FDP_IFC.2: 2
    • FDP_IFF: 34
    • FDP_IFF.1: 37
    • FDP_ITC.1: 2
    • FDP_ITT: 21
    • FDP_ITT.1: 3
  • FIA:
    • FIA_ATD: 5
    • FIA_ATD.1: 1
    • FIA_SOS: 5
    • FIA_SOS.1: 1
    • FIA_UAU: 10
    • FIA_UAU.2: 1
    • FIA_UAU.6: 1
    • FIA_UID: 5
    • FIA_UID.1: 3
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MSA: 122
    • FMT_MSA.1: 24
    • FMT_MSA.2: 3
    • FMT_MSA.3: 18
    • FMT_SMF: 39
    • FMT_SMF.1: 22
    • FMT_SMR: 6
    • FMT_SMR.1: 25
  • FPT:
    • FPT_ITT: 8
    • FPT_ITT.1: 2
    • FPT_STM.1: 4
    • FPT_TEE: 7
    • FPT_TEE.1: 2
    • FPT_TRC: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_UPD: 31
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 3
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 23
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHS_EXT.1: 5
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 3
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 14
    • FMT_MOF.1: 1
    • FMT_MTD: 9
    • FMT_MTD.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 3
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT.1: 5
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.3: 2
    • FPT_TST_EXT.3.1: 2
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 6
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 11
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.HANET: 3
    • A.INIT: 3
    • A.LOCAL: 3
    • A.NOEVIL: 3
    • A.PHYSEC: 3
    • A.REMOTE_AUTH: 3
    • A.REST: 3
    • A.SINGEN: 4
    • A.TIMESTMP: 3
  • O:
    • O.AUDREC: 5
    • O.AUTH: 10
    • O.AVAIL: 7
    • O.CONFID: 13
    • O.INTEG: 11
    • O.MEDIAT: 4
    • O.NOREPLAY: 13
    • O.PATCH: 3
  • OE:
    • OE.ADMIN: 2
    • OE.CERTKEYS: 3
    • OE.HANET: 5
    • OE.INIT: 7
    • OE.LOCAL: 1
    • OE.NOEVIL: 3
    • OE.PHYSEC: 4
    • OE.REMOTE_AUTH: 2
    • OE.REST: 3
    • OE.SINGEN: 4
    • OE.TIMESTMP: 6
  • T:
    • T.MEDIAT: 3
    • T.MMODIFY: 3
    • T.MODIFY: 3
    • T.MSNIFF: 3
    • T.NOAUTH: 3
    • T.SELPRO: 3
    • T.SNIFF: 3
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.CONNECTIONS: 1
    • A.LIMITED_F: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
    • A.VS_CORRECT_CONFIGURATION: 1
    • A.VS_ISOLATON: 1
    • A.VS_REGULAR_UPDATES: 1
    • A.VS_TRUSTED_ADMINISTRATOR: 1
  • O:
    • O.ADDRESS_FILTERING: 1
    • O.AUTHENTICATION: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.FAIL_SECURE: 1
    • O.PORT_FILTERING: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
    • OE.VM_CONFIGURATION: 1
  • T:
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_ACCESS: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_MISUSE: 1
    • T.PASSWORD_CRACKING: 1
    • T.REPLAY_ATTACK: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 397
    • Cisco Systems, Inc: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 17
      • AES-: 2
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 9
      • HMAC-SHA-256: 4
      • HMAC-SHA-512: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 16
      • Diffie-Hellman: 8
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 3
      • SHA-512: 2
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 4
      • SHA-384: 3
      • SHA-512: 5
      • SHA512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 6
  • MAC:
    • MAC: 3
  • KA:
    • Key Agreement: 2
  • KEX:
    • Key Exchange: 3
    • Key exchange: 3
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 83
    • IKEv1: 10
    • IKEv2: 20
  • IPsec:
    • IPsec: 41
  • SSH:
    • SSH: 113
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 14
  • IKE:
    • IKE: 39
    • IKEv1: 14
    • IKEv2: 13
  • IPsec:
    • IPsec: 80
  • SSH:
    • SSH: 43
    • SSHv2: 15
  • TLS:
    • DTLS:
      • DTLS: 1
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 56
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 5
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 6
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 12
    • P-384: 12
pdf_data/st_keywords/crypto_library
  • LibreSSL:
    • LibreSSL: 1
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 2104: 1
    • RFC 2409: 1
    • RFC 2460: 1
    • RFC 3414: 1
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4301: 1
    • RFC 4306: 1
    • RFC 4307: 1
    • RFC 4344: 1
    • RFC 4418: 1
    • RFC 4754: 1
    • RFC 4868: 1
    • RFC 5114: 1
    • RFC 5280: 1
    • RFC 5590: 1
    • RFC 5639: 1
    • RFC 5656: 1
    • RFC 5903: 1
    • RFC 6040: 1
    • RFC 6151: 1
    • RFC 6239: 1
    • RFC 6353: 1
    • RFC 6668: 1
    • RFC 6818: 1
    • RFC 6960: 1
    • RFC 7296: 1
    • RFC 7427: 1
    • RFC 7617: 1
    • RFC2104: 4
    • RFC2409: 2
    • RFC2460: 1
    • RFC3414: 1
    • RFC3602: 4
    • RFC4253: 2
    • RFC4301: 1
    • RFC4307: 1
    • RFC4344: 1
    • RFC4418: 4
    • RFC4754: 2
    • RFC4868: 4
    • RFC5114: 2
    • RFC5280: 1
    • RFC5639: 3
    • RFC5903: 3
    • RFC6239: 3
    • RFC6353: 1
    • RFC6960: 1
    • RFC7296: 2
    • RFC8017: 2
  • X509:
    • X.509: 12
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 186-4: 2
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 11
    • FIPS PUB 198-1: 1
  • ISO:
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 9796-2: 2
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 800-90: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
    • PKCS12: 1
  • RFC:
    • RFC 2460: 2
    • RFC 2986: 1
    • RFC 3526: 5
    • RFC 3602: 7
    • RFC 4106: 6
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4868: 2
    • RFC 4945: 1
    • RFC 5077: 1
    • RFC 5114: 2
    • RFC 5280: 4
    • RFC 5282: 1
    • RFC 5759: 1
    • RFC 5996: 2
    • RFC 768: 2
    • RFC 791: 2
    • RFC 793: 2
  • X509:
    • X.509: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 10 No Remote Maintenance The remote maintenance feature using a rendezvous genuscreen appliance is out of scope. 1.4.11.11 No getimagesfromcpt The command line tool getimagesfromcpt must not be used to install: 1
    • a smartcard to perform cryptographic operations for IPsec usage. However, usage of the smartcard is out of scope for this TOE. The smartcard can however be used as an entropy source both for genuscreen and: 1
    • can, however, be used in certified configurations. If cryptographic functions are used, they are out of scope of the TOE. 1.4.10 Secure Initialisation of genuscreen (Firewall Component) To guarantee that all: 1
    • hardware has not been evaluated. Also, operating the genucenter software on a virtual machine is out of scope for this certification. If the virtual genucenter is used, the end user has to ensure that all: 1
    • out of scope: 4
pdf_data/st_metadata
  • /Author: Cisco CC TME
  • /CreationDate: D:20211228104535-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20211229110733-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: ST
  • pdf_file_size_bytes: 1437749
  • pdf_hyperlinks: http://www.cisco.com/cisco/software/navigator.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 107
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different