name |
Logiciel Mistral Gateway IPSec version 9.0.7.2 |
Tactical Network-layer Gateway (2E2 IA): a GD Canada MESHnet Gateway product |
category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
FR |
CA |
status |
active |
archived |
not_valid_after |
28.06.2026 |
29.09.2015 |
not_valid_before |
28.06.2021 |
10.02.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_32.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_32fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/gdc-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_32en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/gdc-sec-eng.pdf |
manufacturer |
Thalès Communications |
General Dynamics Canada |
manufacturer_web |
https://www.thalescomminc.com/ |
https://www.gdcanada.com/ |
security_level |
AVA_VAN.3, ALC_FLR.3, EAL3+ |
EAL2+, ALC_FLR.1 |
dgst |
7bd6afa58e49bd4d |
87f1232d490d5d00 |
heuristics/cert_id |
ANSSI-CC-2021/32 |
383-4-67 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.1, ALC_CMC.3, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, AVA_VAN.3, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ALC_FLR.3, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
AGD_ADM.1, ADV_FSP.1, ADV_HLD.1, AVA_VLA.1, ATE_COV.1, AGD_USR.1, ATE_IND.2, ADV_SPM.1, ADV_RCR.1, ALC_FLR.1, ATE_FUN.1, AVA_SOF.1 |
heuristics/extracted_versions |
9.0.7.2 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
certificat-2021_32.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate: D:20210720171317+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210720171317+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 299643
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
anssi-cc-2021_32fr.pdf |
gdc-cert-eng.pdf |
pdf_data/report_frontpage |
|
- FR:
- CA:
- cert_id: 383-4-67-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
|
- CA:
- 383-4-67: 1
- 383-4-67-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL2: 3
- EAL3: 2
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 3
- EAL 2+: 2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
- FIPS:
- FIPS 140-2: 3
- FIPS 180-2: 1
- FIPS 197: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20210720171215+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210720171215+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 188301
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_AMCPP_Date: [AM_AMCPP_Date]
- /AM_AMCPP_Doc#: [AM_AMCPP_Doc#]
- /AM_AMCPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [AM_IAR_Date]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [AM_ST Date]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: mgauvreau
- /CC Version: 2.3
- /CC date: August 2005
- /CEM Version: 2.3
- /CEM date: August 2005
- /CR_Date: 22 December 2008
- /CR_Version: 0.3
- /Client City: Calgary
- /Client Country: Canada
- /Client Full Name: General Dynamics Canada
- /Client Postal Code: T2E 8P2
- /Client Short Name: GDC
- /Client State: Alberta
- /Client Street: 1020 - 68th Avenue NE
- /Comments: PCR Template
Version 1.8-EWA-C
- /CreationDate: D:20090304140623-05'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: General Dynamics Canada (GDC)
- /Developer Short Name: GDC
- /EAL Level: 2+
- /EAL Level Base: 2
- /EAL Level Text: 2 augmented
- /EAL Long: EAL 2+
- /EAL Short: EAL 2+
- /ETPRoc_Date: day month yyyy
- /ETPlan_Doc#: 1531-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.0]
- /ETPlan_date: day month yyyy
- /ETProcRes_Date: day month yyyy
- /ETProcRes_Doc#: 1531-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.0]
- /ETProc_Doc#: 1531-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.0]
- /ETReport_Date: 19 December 2008
- /ETReport_Doc#: 1531-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: 2.3
- /EWP_Date: 15 October 2007
- /EWP_Doc#: 1531-000-D001
- /EWP_Title: Evaluation Work Plan for Common Criteria EAL 2+ Evaluation of General Dynamics Canada Ltd Tactical Network-layer Gateway (TNG) Release 1, Rev A
- /EWP_Version: 0.6
- /Eval number: 383-4-67
- /Eval_End_Date: 18 December 2008
- /Eval_Start_Date: dd month yyyy
- /ModDate: D:20090304140704-05'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectNumber: 1531
- /ST_Date: 10 December 2008
- /ST_Title: Security Target for the Tactical Network-layer Gateway v1.0: a GD Canada MESHnet G2 Gateway product
- /ST_Version: 0.39
- /SVR_Date: [day month yyyy]
- /SVR_Doc#: 1531-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.0]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & GDC Proprietary
- /SourceModified: D:20090304181701
- /Sponsor: General Dynamics Canada
- /Sponsor City: Calgary
- /Sponsor Country: Canada
- /Sponsor Postal Code: T2E 8P2
- /Sponsor State: Alberta
- /Sponsor Street: 1020 - 68th Avenue NE
- /TOE: Tactical Network-layer Gateway (TNG)
- /TOE Line1: [TOE Line1 - enter later for PCR or web page]
- /TOE Line2: [TOE Line2 - enter later for PCR or web page]
- /TOE Line3: [TOE Line3 - enter later for PCR or web page]
- /TOE Line4: [TOE Line4 - enter later for PCR or web page]
- /TOE Line5: [TOE Line5 - enter later for PCR or web page]
- /TOE Short: TNG 2E2 IA
- /TOE Short with version: TNG Release 1 Revision A
- /TOE Short-NoTM: [TOE Short, no version, no trademarks]
- /TOE Version: Release 1, Rev A
- /TOE with version: Tactical Network-layer Gateway (TNG) Release 1, Rev A
- /TOE-NoTM: [TOE Name, no version, no trademarks]
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: -1098653131
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: Post request ... rick
- pdf_file_size_bytes: 126808
- pdf_hyperlinks: http://www.cse-cst.gc.ca/its-sti/services/cc/cp-pc-eng.html, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
anssi-cible-cc-2021_32en.pdf |
gdc-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
- NL:
- CC-01: 1
- CC-02: 2
- CC-03: 2
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 1
- EAL3+: 4
|
- EAL:
- EAL 4: 1
- EAL2: 2
- EAL2+: 4
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.3: 9
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 3
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 10
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.3: 2
- ALC_CMS.1: 1
- ALC_CMS.3: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 3
- ALC_FLR.3: 6
- ALC_LCD.1: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 4
- ASE_TSS.1: 2
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 4
- ATE_DPT.1: 3
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 10
- ADV_HLD.1: 3
- ADV_RCR.1: 5
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.1: 4
- ATE_FUN.1: 5
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 16
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG: 6
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG_EXT: 13
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 2
- FAU_STG_EXT.4: 3
- FCO:
- FCO_CPC_EXT: 2
- FCO_CPC_EXT.1: 12
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 3
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 48
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 23
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 13
- FCS_CKM_EXT.5: 17
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.5.3: 1
- FCS_COP: 101
- FCS_COP.1: 18
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 21
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_TLSC_EXT: 4
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 10
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 2
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 2
- FCS_TLSS_EXT: 4
- FCS_TLSS_EXT.2: 6
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 2
- FCS_TLSS_EXT.2.3: 2
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FCS_TLSS_EXT.2.6: 2
- FDP:
- FDP_ACC.1: 5
- FDP_ETC: 2
- FDP_ETC.2: 8
- FDP_IFC: 19
- FDP_IFC.1: 9
- FDP_IFF: 16
- FDP_IFF.1: 14
- FDP_ITC: 13
- FDP_ITC.1: 16
- FDP_ITC.2: 26
- FDP_RIP.2: 5
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 2
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 10
- FIA_UAU_EXT.2.1: 2
- FIA_UIA: 1
- FIA_UIA_EXT: 4
- FIA_UIA_EXT.1: 14
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 5
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 10
- FMT_MOF.1: 2
- FMT_MSA.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 10
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_PTD: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RCV.2: 5
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_SDP_EXT: 3
- FPT_SDP_EXT.2: 10
- FPT_SDP_EXT.2.1: 2
- FPT_SDP_EXT.2.2: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 3
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TDC: 11
- FPT_TDC.1: 7
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 10
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 11
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 9
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 8
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA.1: 10
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 3
- FDP_ITT.1: 7
- FDP_ITT.1.1: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 2
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.2: 22
- FIA_UAU.2.1: 2
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 24
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 20
- FMT_MOF.1.1: 3
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 17
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.2: 7
- FPT_ITT.2.1: 1
- FPT_RVM.1: 11
- FPT_RVM.1.1: 2
- FPT_SEP.1: 12
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 2
- FPT_STM.1: 14
- FPT_STM.1.1: 2
- FTP:
- FTP_ITT.2.2: 1
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS_CONTROL_MANAGEMENT_DE: 1
- A.ACCESS_CONTROL_MANAGEMENT_DEVICES: 1
- A.ADMINISTRATION_NETWORK: 1
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.ALARM: 2
- A.AUDIT: 2
- A.DATA_TRANSPORTATION: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.NO_TRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- A.PHYSICAL_ENV_MANAGEMENT_DEVICES: 1
- A.PHYSICAL_PROTECTION: 1
- A.POLICIES_CONTINUITY: 1
- A.REGULAR_UPDATES: 2
- A.SECURED_MANAGEMENT_DEVICES: 1
- A.SS_MMC_TO_TOE: 1
- A.TOE_ERASURE: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.AUDIT: 14
- O.AUDIT_PROTECTION: 5
- O.AUTHENTICATION_FAILURE: 9
- O.BOOT_CONTROL: 5
- O.CERTIFICATE_INJECTION: 4
- O.CRYPTO_PERIOD: 8
- O.CRYPTO_REGULATION: 7
- O.DATA_ERASURE: 8
- O.DISPLAY_BANNER: 6
- O.LOCAL_DATA_PROTECTION: 14
- O.MANAGEMENT: 7
- O.POL_DEFAULT: 12
- O.POL_FILTERING: 8
- O.PROTECTED_COMMUNICATI: 1
- O.PROTECTED_COMMUNICATION: 2
- O.PROTECTED_COMMUNICATIONS: 12
- O.RESIDUAL_INFORMATION_C: 1
- O.RESIDUAL_INFORMATION_CLEAR: 4
- O.ROLES: 10
- O.SELF_TEST: 11
- O.SESSION_LOCK: 4
- O.SOFTWARE_UPDATES: 8
- O.SUPERVISION: 6
- O.SUPERVISION_IMPACT: 8
- O.TIME_BASE: 4
- O.VIEW_RULES: 11
- OE:
- OE.ACCESS_CONTROL_MANA: 1
- OE.ACCESS_CONTROL_MANAGEMENT_D: 1
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICE: 2
- OE.ACCESS_CONTROL_MANAGEMENT_DEVICES: 2
- OE.ADMIN_CREDENTIALS_SEC: 1
- OE.ADMIN_CREDENTIALS_SECURE: 3
- OE.ALARM: 3
- OE.AUDIT: 2
- OE.AUDIT_RECORD: 3
- OE.DATA_TRANSPORTATION: 4
- OE.LMGT_CONNECTION: 5
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 2
- OE.PHYSICAL_ENV_MANAGEM: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVIC: 1
- OE.PHYSICAL_ENV_MANAGEMENT_DEVICES: 3
- OE.POLICIES_CONTINUITY: 2
- OE.SECURED_MANAGEMENT_: 1
- OE.SECURED_MANAGEMENT_DEVICES: 4
- OE.SS_MMC_TO_TOE: 5
- OE.TIME_TOE: 3
- OE.TOE_ERASURE: 5
- OE.TOE_INTEGRITY: 7
- OE.TOE_PRODUCTION: 3
- OE.TRUSTED_ADMIN: 3
- OE.UPDATES: 4
- T:
- T.MISUSE: 5
- T.PASSWORD_CRACKING: 5
- T.RESIDUAL_DATA: 5
- T.SECURITY_FUNCTIONALITY: 2
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 3
- T.SECURITY_FUNCTIONALITY_FAILURE: 3
- T.TIME_BASE: 3
- T.TOE_CAPTURE: 5
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 5
- T.UNTRUSTED_COMMUNICATI: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 3
- T.UPDATE_COMPROMISE: 5
- T.USER_DATA_REUSE: 3
- T.WEAK_AUTHENTICATION_EN: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 3
- T.WEAK_CRYPTOGRAPHY: 3
|
- A:
- A.AVAILABILITY: 2
- A.CONNECT: 2
- A.GOOD_ADMIN: 2
- A.NO_BYPASS: 2
- A.NO_GEN_PURPOSE: 2
- A.NO_MAINT_PORT: 2
- A.PHYSICAL: 2
- O:
- O.ADMIN_GUIDANCE: 6
- O.ADMIN_ROLE: 7
- O.AUDIT_DATA: 6
- O.AUDIT_PROTECT: 8
- O.AUDIT_REVIEW: 6
- O.GOOD_TESTING: 3
- O.MANAGE: 8
- O.MANAGE_CHANGE: 5
- O.MEDIATE_INFO: 4
- O.PEER_AUTH: 6
- O.SELF_PROTECT: 8
- O.SOUND_DESIGN: 4
- O.SOUND_TOE: 4
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 5
- O.TRUSTED_PATH: 8
- O.USER_GUIDANCE: 5
- O.VULN_ANAL_TEST: 6
- OE:
- OE.AVAILABILITY: 2
- OE.CONNECT: 1
- OE.GOOD_ADMIN: 2
- OE.NO_BYPASS: 1
- OE.NO_GEN_PURPOSE: 2
- OE.NO_MAINT_PORT: 1
- OE.PHYSICAL: 2
- T:
- T.ADMIN_ERROR: 4
- T.ADMIN_ROGUE: 3
- T.AUDIT_COMP: 3
- T.CRYPTO_COMP: 3
- T.FLAWED_DESIGN: 3
- T.FLAWED_TOE: 3
- T.MALICIOUS_USER: 3
- T.MASQUERADE: 3
- T.MISSED_ACTIONS: 3
- T.POOR_TEST: 3
- T.SPOOFING: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTH_ACCESS: 3
- T.UNAUTH_PEER: 3
- T.UNKNOWN_STATE: 3
- T.USER_ERROR: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA256: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 23
- IKEv1: 5
- IKEv2: 21
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 2
- SSL2.0: 1
- TLS:
- TLS: 53
- TLS 1.0: 2
- TLS 1.1: 4
- TLS 1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 1
- curve P-256: 1
- secp256r1: 8
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 2
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 2
- RFC 4304: 1
- RFC 4346: 2
- RFC 4868: 3
- RFC 4945: 2
- RFC 5246: 4
- RFC 5280: 5
- RFC 5282: 2
- RFC 5759: 2
- RFC 6125: 2
- RFC 6960: 1
- RFC 7296: 3
- RFC5289: 2
- X509:
|
- CC:
- CCMB-2005-02-002: 1
- CCMB-2005-02-003: 1
- CCMB-2005-08-001: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Out of scope: 1
- System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY: 1
- of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: T0159776
- /CreationDate: D:20210607172705+02'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210607172705+02'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: CDS_Mistral IPVS9.0_63535113-306_-Llite
- pdf_file_size_bytes: 981294
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 119
|
- /Author: ggibbs
- /CreationDate: D:20090105074649-05'00'
- /Creator: PDFCreator Version 0.9.5
- /Keywords:
- /ModDate: D:20090304140542-05'00'
- /Producer: GPL Ghostscript 8.61
- /Subject:
- /Title: TNG-Security-Target_v0.41_5Jan09
- pdf_file_size_bytes: 413865
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |