Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Networks Security Appliances (Netscreen Models ISG 1000, ISG 2000, 5200, and 5400 with Firmware Version 6.2.0r3a; Secure Services Gateway Models SSG5, SSG20, SSG140, SSG320M, SSG350M; SSG520M, and SSG550M with Firmware Version 6.2.0r3)
CCEVS-VR-VID-10301-2010
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name Juniper Networks Security Appliances (Netscreen Models ISG 1000, ISG 2000, 5200, and 5400 with Firmware Version 6.2.0r3a; Secure Services Gateway Models SSG5, SSG20, SSG140, SSG320M, SSG350M; SSG520M, and SSG550M with Firmware Version 6.2.0r3) - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category Boundary Protection Devices and Systems Data Protection
scheme US DE
not_valid_after 01.11.2014 08.11.2019
not_valid_before 26.03.2010 07.11.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10301-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10301-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
manufacturer Juniper Networks, Inc. Kanguru Solutions
manufacturer_web https://www.juniper.net/ https://www.kanguru.com
security_level EAL4+, ALC_FLR.2 ALC_FLR.1, EAL2+
dgst 948a45d468bc9d88 eda06ca3c208ebd0
heuristics/cert_id CCEVS-VR-VID-10301-2010 BSI-DSZ-CC-0772-2014
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_TDS.4, AGD_OPE.1, ALC_DVS.1, ALC_LCD.1, ALC_DEL.1, ADV_INT.3, ADV_FSP.5, AVA_VAN.4, AGD_PRE.1, ATE_COV.2, ATE_IND.2, ATE_FUN.1, ALC_TAT.1, ADV_ARC.1, ALC_CMC.4, ALC_FLR.2, ATE_DPT.3, ALC_CMS.4, ADV_IMP.1 AGD_OPE.1, ASE_REQ.2, ALC_CMS.2, ALC_DEL.1, ADV_INT.3, ASE_ECD.1, ASE_SPD.1, ALC_CMC.2, APE_SPD.1, ASE_TSS.1, ASE_OBJ.2, APE_INT.1, APE_OBJ.2, AVA_VAN.2, APE_ECD.1, ALC_TAT.3, AGD_PRE.1, APE_REQ.2, ALC_FLR.1, ASE_INT.1, ADV_SPM.1, ATE_IND.2, ATE_FUN.1, ADV_ARC.1, ATE_COV.1, ATE_DPT.4, ASE_CCL.1, ADV_TDS.1, ALC_LCD.2, APE_CCL.1, ADV_FSP.2, ALC_DVS.2, ADV_IMP.2
heuristics/extracted_versions 6.2.0 02.03.10, 2.0.0.0, 3.2.0.3, 1.2.1.8, 5.0.2.6
heuristics/scheme_data
  • category: Firewall, Virtual Private Network
  • certification_date: 2010-03-26
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 2014-11-01
  • id: CCEVS-VR-VID10301
  • product: Juniper Networks Security Appliances (Netscreen Models ISG 1000, ISG 2000, NS5200, and NS5400 with Firmware Version 6.2.0r3a; Secure Services Gateway Models SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M, and SSG550M with Firmware Version 6.2.0r3).
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10301
  • vendor: Juniper Networks, Inc.
maintenance_updates
protection_profiles
pdf_data/report_filename st_vid10301-vr.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10301-2010
    • cert_item: Juniper Networks Security Appliances
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • cert_lab: BSI
    • developer: Kanguru Solutions
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10301-2010: 1
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL4: 2
  • EAL:
    • EAL 1: 7
    • EAL 2: 8
    • EAL 2 augmented: 3
    • EAL 3: 4
    • EAL 4: 7
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL2: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 4
    • ADV_IMP.1: 1
    • ADV_INT: 1
    • ADV_INT.3: 3
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 4
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_SOS.1: 1
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_UID.2: 4
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.NO_TOE_BYPASS: 1
    • A.PHYSICAL: 1
  • T:
    • T.ADDRESS_MASQUERADE: 1
    • T.ADMIN_ERROR: 1
    • T.ADMIN_ROGUE: 1
    • T.AUDIT_COMPROMISE: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.FLAWED_DESIGN: 1
    • T.FLAWED_IMPLEMENTATION: 1
    • T.MALICIOUS_TSF_COMPROMISE: 1
    • T.MASQUERADE: 1
    • T.POOR_TEST: 1
    • T.REPLAY: 1
    • T.RESIDUAL_DATA: 1
    • T.RESOURCE_EXHAUSTION: 1
    • T.SPOOFING: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_PEER: 1
    • T.UNIDENTIFIED_ACTIONS: 1
    • T.UNKNOWN_STATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 9
  • VPN:
    • VPN: 6
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7138: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
pdf_data/report_metadata
  • /Author: Anthony Apted
  • /Comments:
  • /Company:
  • /CreationDate: D:20100329111936-04'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Keywords:
  • /ModDate: D:20100329111939-04'00'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20100329151920
  • /Subject: Validation Report
  • /Title: Juniper Networks
  • /_NewReviewCycle:
  • pdf_file_size_bytes: 119278
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_file_size_bytes: 1643286
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename st_vid10301-st.pdf 0772b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0025: 13
    • BSI-PP-0025: 6
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL2: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.5: 16
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_INT: 1
    • ADV_INT.3: 9
    • ADV_TDS: 1
    • ADV_TDS.4: 17
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 15
    • ALC_CMS: 1
    • ALC_CMS.4: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_DVS: 1
    • ALC_DVS.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 15
    • ALC_LCD: 1
    • ALC_LCD.1: 6
    • ALC_TAT: 1
    • ALC_TAT.1: 7
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 5
    • ATE_DPT: 1
    • ATE_DPT.3: 8
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.3: 7
    • AVA_VAN.4: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 2
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP: 8
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN: 19
    • FAU_GEN.1: 4
    • FAU_SAA: 11
    • FAU_SAR: 9
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL: 11
    • FAU_SEL.1: 1
    • FAU_STG: 18
    • FAU_STG.1: 2
    • FAU_STG.3: 4
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM: 5
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 4
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 24
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 40
    • FDP_IFC.1.1: 5
    • FDP_IFF.1: 34
    • FDP_IFF.1.1: 14
    • FDP_IFF.1.2: 7
    • FDP_IFF.1.3: 5
    • FDP_IFF.1.4: 5
    • FDP_IFF.1.5: 5
    • FDP_IFF.1.6: 5
    • FDP_RIP: 2
    • FDP_RIP.2: 4
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 2
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 4
    • FIA_UAU.2.1: 1
    • FIA_UAU_EXP.2: 1
    • FIA_UID: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
    • FIA_USB: 2
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 42
    • FMT_MOF.1.1: 7
    • FMT_MSA: 4
    • FMT_MSA.1: 4
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 24
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 12
    • FMT_MTD.2.1: 2
    • FMT_MTD.2.2: 2
    • FMT_REV: 2
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_RCV: 2
    • FPT_RCV.1: 4
    • FPT_RCV.1.1: 1
    • FPT_RPL: 2
    • FPT_RPL.1: 4
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 20
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FRU:
    • FRU_RSA: 3
    • FRU_RSA.1: 13
    • FRU_RSA.1.1: 2
  • FTA:
    • FTA_SSL: 6
    • FTA_SSL.1: 4
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 4
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
    • FTA_TSE: 2
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 4
    • FTP_TRP.1.3: 2
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_RNG: 2
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 1
    • FMT_MTD: 12
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF: 20
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 2
    • A.NO_TOE_BYPASS: 2
    • A.PHYSICAL: 2
  • O:
    • O.ADMIN_ROLE: 2
    • O.AUDIT_GENERATION: 2
    • O.AUDIT_PROTECTION: 2
    • O.AUDIT_REVIEW: 2
    • O.CHANGE_MANAGEMENT: 2
    • O.CORRECT_TSF_OPERATION: 2
    • O.CRYPTOGRAPHIC_FUNCTIONS: 2
    • O.CRYPTOGRAPHY_VALIDATED: 2
    • O.DISPLAY_BANNER: 2
    • O.DOCUMENT_KEY_LEAKAGE: 2
    • O.INTEGRITY: 2
    • O.MAINT_MODE: 2
    • O.MANAGE: 2
    • O.MEDIATE: 2
    • O.PEER_AUTHENTICTION: 2
    • O.REPLAY_DETECTION: 2
    • O.RESIDUAL_INFORMATION: 2
    • O.RESOURCE_SHARING: 2
    • O.ROBUST_ADMIN_GUIDANCE: 2
    • O.ROBUST_TOE_ACCESS: 2
    • O.SELF_PROTECTION: 2
    • O.SOUND_DESIGN: 2
    • O.SOUND_IMPLEMENTATION: 2
    • O.THOROUGH_FUNCTIONAL_TESTING: 2
    • O.TIME_STAMPS: 2
    • O.TRUSTED_PATH: 2
    • O.VULNERABILITY_ANALYSIS: 1
    • O.VULNERABILITY_ANALYSIS_TEST: 1
  • OE:
    • OE.CRYPTANALYTIC: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 2
  • T:
    • T.ADDRESS_MASQUERADE: 2
    • T.ADMIN_ERROR: 2
    • T.ADMIN_ROGUE: 2
    • T.AUDIT_COMPROMISE: 2
    • T.CRYPTO_COMPROMISE: 2
    • T.FLAWED_DESIGN: 2
    • T.FLAWED_IMPLEMENTATION: 2
    • T.MALICIOUS_TSF_COMPROMISE: 2
    • T.MASQUERADE: 2
    • T.POOR_TEST: 2
    • T.REPLAY: 2
    • T.RESIDUAL_DATA: 2
    • T.RESOURCE_EXHAUSTION: 2
    • T.SPOOFING: 2
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNAUTHORIZED_PEER: 3
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.UNKNOWN_STATE: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 4
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 3
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-256: 5
      • SHA-384: 2
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 9
    • IKEv1: 1
  • IPsec:
    • IPsec: 4
  • SSH:
    • SSH: 23
  • VPN:
    • VPN: 182
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 9
  • RNG:
    • RNG: 14
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • secp256r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 14
    • FIPS 180-2: 1
    • FIPS PUB 140-2: 6
    • FIPS PUB 171: 1
  • NIST:
    • NIST SP 800-57: 5
    • SP 800-57: 1
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 2404: 2
    • RFC 2406: 4
    • RFC 2409: 7
  • X509:
    • X.509: 4
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • Out of scope: 2
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_metadata
  • /Author: Neal
  • /CreationDate: D:20100329151617
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20100329151617
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Security Appliances Security Target
  • pdf_file_size_bytes: 1230792
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 96
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different