| name |
NC2.VPN+ v2.1.9 |
FireEye EX Series Hardware and Virtual Appliances: EX3500, EX5500, EX8500 |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
MY |
US |
| status |
active |
archived |
| not_valid_after |
13.09.2026 |
30.01.2020 |
| not_valid_before |
13.09.2021 |
30.01.2018 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C121-CERTIFICATE-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10834-ci.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10834-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10834-st.pdf |
| manufacturer |
System Consultancy Services Sdn. Bhd. |
FireEye Incorporated |
| manufacturer_web |
https://www.scs.my/ |
https://www.FireEye.com |
| security_level |
EAL2 |
{} |
| dgst |
b25e9c1d52bcd897 |
be816906b544b355 |
| heuristics/cert_id |
ISCB-5-RPT-C121-CR-v1 |
CCEVS-VR-10834-2017 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
2.1.9 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2021-008-C121
- certification_date: 13.09.2021
- developer: System Consultancy Services Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C121
- certification_date: 13.09.2021
- developer: No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my
- expiration_date: 13.09.2026
- mutual_recognition: CCRA
- product: NC2.vpn+ v2.1.9
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf
- scope: The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection & prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf
- type: Network and Network-Related Devices and Systems
- expiration_date: 13.09.2026
- level: EAL2
- product: NC2.vpn+ v2.1.9
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10834/
- categories: ['Network Device']
- category: Network Device
- certification_date: 30.01.2018
- evaluation_facility: Acumen Security
- expiration_date: 30.01.2020
- id: CCEVS-VR-VID10834
- product: FireEye EX Series Hardware and Virtual Appliances: EX3500, EX5500, EX8500
- scheme: US
- url: https://www.niap-ccevs.org/products/10834
- vendor: FireEye, Inc.
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
c7cf611c6bb1e4b0 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C121-CERTIFICATE-v1.pdf |
st_vid10834-ci.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10834-2018: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210917005316Z00'00'
- /Creator: Word
- /ModDate: D:20210917005316Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext
- pdf_file_size_bytes: 704807
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
- /CreationDate: D:20180202131758-05'00'
- /ModDate: D:20180202131758-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 177291
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ISCB-5-RPT-C121-CR-v1.pdf |
st_vid10834-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10834-2017
- cert_item: for the FireEye Ex Series Appliance, Version 1.0
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C121-CR-v1: 34
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 2
- FCS_COP.1: 3
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL: 1
- A.SINGLE_CONNECTION: 1
- A.TRUSTED_ADMIN: 1
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 2
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- IPsec:
- TLS:
- TLS:
- TLS: 1
- TLS v1.2: 1
- TLS v1.3: 1
- VPN:
|
- SSH:
- TLS:
- TLS:
- TLS: 10
- TLS 1.1: 3
- TLS 1.2: 2
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 1
- FIPS 186-4: 3
- FIPS140-2: 1
- NIST:
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 2
- SP 800-90A: 1
- X509:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210918094333Z00'00'
- /Creator: Word
- /ModDate: D:20210918094333Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext
- pdf_file_size_bytes: 809947
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /CreationDate: D:20180201160436-05'00'
- /ModDate: D:20180201160436-05'00'
- pdf_file_size_bytes: 565507
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
| pdf_data/st_filename |
SCS NC2.vpn Security Target v1.0.pdf |
st_vid10834-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 3
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.2: 7
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP.1: 18
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSS_EXT.1: 10
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 3
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 1
- FCS_TLSS_EXT.2.5: 2
- FCS_TLSS_EXT.2.6: 1
- FIA:
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR.2: 2
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 2
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL: 3
- A.SINGLE_CONNECTION: 2
- A.TRUSTED_ADMIN: 3
- O:
- O.DATA_FLOW_CONTROL: 4
- O.ENCRYPT: 3
- O.LOGGING: 3
- O.PROTECTED_MANAGEMENT: 4
- O.TOECOM: 4
- OE:
- OE.PHYSICAL: 4
- OE.SINGLE_CONNECTION: 2
- OE.TRUSTED_ADMIN: 5
- T:
- T.READ_MODIFY_DATA: 2
- T.TOECOM: 3
- T.UNAUTHORIZED_ACCESS: 3
- T.UNAUTHORIZED_DATA: 3
- T.UNDETECTED_ACTIONS: 2
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 2
- A.LIMITED_FUNCTIONALITY: 2
- A.NO_THRU_TRAFFIC_PROTECTION: 3
- A.PHYSICAL_PROTECTION: 2
- A.REGULAR_UPDATES: 2
- A.TRUSTED_ADMINISTRATOR: 2
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.NO_THRU_TRAFFIC_PROTECTION: 2
- OE.PHYSICAL: 2
- OE.TRUSTED_ADMIN: 2
- OE.UPDATES: 2
- T:
- T.PASSWORD_CRACKING: 2
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.SECURITY_FUNCTIONALITY_FAILURE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 2
- T.UNDETECTED_ACTIVITY: 2
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_COMPROMISE: 2
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 2
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- STMicroelectronics:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 3
- HMAC-SHA-384: 3
- HMAC-SHA-512: 3
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 2
- DHE: 2
- Diffie-Hellman: 2
- DSA:
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 3
- SHA-384: 2
- SHA-512: 4
- SHA256: 15
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 5
- TLS v1.2: 3
- TLS v1.3: 3
- VPN:
|
- IKE:
- IPsec:
- SSH:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 3
- SSL 3.0: 3
- TLS:
- TLS: 72
- TLS 1.0: 3
- TLS 1.1: 6
- TLS 1.2: 5
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 6
- P-384: 4
- P-521: 4
- secp256r1: 3
- secp384r1: 1
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 5
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 5
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 5
- TLS_RSA_WITH_AES_128_CBC_SHA: 6
- TLS_RSA_WITH_AES_128_CBC_SHA256: 5
- TLS_RSA_WITH_AES_256_CBC_SHA: 5
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-004-001: 1
- CCMB-2017-004-002: 1
- CCMB-2017-004-003: 1
- CCMB-2017-004-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 3
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 7
- FIPS PUB 198-1: 2
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56B: 1
- SP 800-56A: 1
- SP 800-56B: 1
- SP 800-90: 3
- SP 800-90A: 1
- SP 900-90A: 1
- PKCS:
- RFC:
- RFC 2818: 7
- RFC 2986: 2
- RFC 3268: 14
- RFC 3526: 1
- RFC 4251: 1
- RFC 4252: 1
- RFC 4253: 2
- RFC 4254: 1
- RFC 4346: 4
- RFC 5246: 16
- RFC 5280: 4
- RFC 5289: 17
- RFC 5647: 1
- RFC 5759: 1
- RFC 6125: 2
- RFC 6668: 1
- RFC 6960: 1
- RFC2818: 1
- RFC2986: 1
- RFC3268: 1
- RFC3526: 2
- RFC4251: 1
- RFC4252: 1
- RFC4253: 1
- RFC4254: 1
- RFC4346: 1
- RFC5246: 1
- RFC5280: 1
- RFC5289: 1
- RFC5647: 1
- RFC6125: 1
- RFC6668: 1
- RFC6960: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Securelytics
- /CreationDate: D:20210730035619+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20210730035619+00'00'
- /Subject: SCS Sdn Bhd
- /Title: SCS NC2.vpn+ Security Target
- pdf_file_size_bytes: 844757
- pdf_hyperlinks: http://www.commonriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
- /Author: FireEye, Inc.
- /CreationDate: D:20190820105341-04'00'
- /Creator: Microsoft® Word for Office 365
- /ModDate: D:20190820105341-04'00'
- /Producer: Microsoft® Word for Office 365
- pdf_file_size_bytes: 840082
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |