Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco X-ES Xpedite5205 Embedded Services Router
CCEVS-VR-VID-10576-2014
CONEXA 3.0, Version 1.6
BSI-DSZ-CC-0918-V7-2025
name Cisco X-ES Xpedite5205 Embedded Services Router CONEXA 3.0, Version 1.6
category Data Protection Other Devices and Systems
scheme US DE
status archived active
not_valid_after 17.11.2016 05.02.2033
not_valid_before 17.11.2014 06.02.2025
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V7c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10576-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V7a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10576-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V7b_pdf.pdf
manufacturer Cisco Systems, Inc. Theben Smart Energy GmbH
manufacturer_web https://www.cisco.com https://www.theben.de
security_level {} EAL4+, ALC_FLR.2, AVA_VAN.5
dgst c686d7848cdd7943 6ac2705bebbf0953
heuristics/cert_id CCEVS-VR-VID-10576-2014 BSI-DSZ-CC-0918-V7-2025
heuristics/cert_lab US BSI
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ATE_COV.2, ASE_TSS.1, ASE_INT.1, ALC_CMS.4, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.4, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions - 1.6, 3.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0918-V6-2024
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0918-V2-2021, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0918-V5-2023
heuristics/scheme_data
  • category: Network Device, Router, Virtual Private Network
  • certification_date: 17.11.2014
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 17.11.2016
  • id: CCEVS-VR-VID10576
  • product: Cisco X-ES Xpedite5205 Embedded Services Router
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10576
  • vendor: Cisco Systems, Inc.
  • category: Intelligent measuring systems
  • cert_id: BSI-DSZ-CC-0918-V7-2025
  • certification_date: 06.02.2025
  • enhanced:
    • applicant: Theben Smart Energy GmbH (vormals: Theben AG) Schlossfeld 10 72401 Haigerloch
    • assurance_level: EAL4+,ALC_FLR.2,AVA_VAN.5
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V7c_pdf.pdf?__blob=publicationFile&v=2
    • certification_date: 06.02.2025
    • description: The Target of Evaluation (TOE) is the Smart Meter Gateway (SMGW) CONEXA 3.0, Version 1.0. The Smart Meter Gateway is the communication unit in a smart metering system. The main functionality of the gateway is the reception and the storage of measured consumption and status values of the connected meters as well as the processing and the transfer of these consumption and status values to authorized entities.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-0918-V7-2025 (Ausstellungsdatum / Certification Date 06.02.2025, gültig bis / valid until 05.02.2033)', 'description': 'The Target of Evaluation (TOE) presented in this document is called "Smart Meter Gateway", “SMGW” or “Gateway” and uniquely identified as CONEXA 3.0 (CC), Version 1.6. It is the communication unit used within such an intelligent metering system and represented by the product CONEXA 3.0 except for the integrated Security Module. Besides data processing, Smart Meter Gateway offers possibility to generate tariff rates in order to enable network operators and consumers to control energy consumption in an intelligent way. The following changes on the evaluated product have been in the focus of this re-evaluation procedure: Adjustment in assignment of counter register to measured value list, optimization GWA change process, compression of data at the WAN interface, documentation adaptions, implementation of the MPO delivery method, further changes and bugfixes, kernel update and editorial changes.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-03', 'description': 'The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-02', 'description': 'The changes are related to an update of the user guidance and to the certified scope of the delivery procedures. For the certified scope of the delivery procedures, the assurance component ALC_DEL.1 (ALC_DEL.1.1D, ALC_DEL.1.1C) has been refined in the ST to only cover the delivery of the TOE from the manufacturer to the MPO (metering point operator), who is the customer of the developer and the recipient of the TOE.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024-MA-01', 'description': 'The maintenance consists of a bug fix that was necessary to eliminate problems with connection interruptions both when tariffing with compact profiles and during network Management.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V6-2024 (Ausstellungsdatum / Certification Date 08.02.2024, gültig bis / valid until 07.02.2032)', 'description': ', some software adjustments and adjustment of kernel-hardening. And last but not least the boot process was improved, some further adjustments with impact on documentation and editorial changes were made.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023-MA-02', 'description': 'The change to the certified product is at the level of vendor’s renaming.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023-MA-01', 'description': 'The description of the secure delivery procedure was extended due to adding an alternative delivery procedure (cardbox delivery).'}), frozendict({'id': 'BSI-DSZ-CC-0918-V5-2023 (Ausstellungsdatum / Certification Date 11.05.2023, gültig bis / valid until 10.05.2031)', 'description': 'The focus of this re-evaluation was on certification obligations following BSI-K-TR-0507-2022, mobile phone signal validation without tools, adaption reaction of >36h no time synchronization and some further small changes, adjustments and updates.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-03'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-02', 'description': 'The assembly space for the Fakra socket was adapted.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022-MA-01', 'description': 'The order of the configuration parameters regarding the LTE module were corrected.'}), frozendict({'id': 'BSI-DSZ-CC-0918-V4-2022 (Ausstellungsdatum / Certification Date 08.03.2022, gültig bis / valid until 07.03.2030)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0918-V3-2022 (Ausstellungsdatum / Certification Date 24.01.2022, gültig bis / valid until 23.01.2030)', 'description': 'Certificate'}), frozendict({'id': 'BSI-DSZ-CC-0918-V2-2021 (Ausstellungsdatum / Certification Date 01.07.2021, gültig bis / valid until 30.06.2029)', 'description': '), Version 1.1 was enhanced due to the new tariff use cases (TAF) 9, 10 and 14. Further optimizations and some minor bugfixing were also performed.'}), frozendict({'id': 'BSI-DSZ-CC-0918-2020-MA-01', 'description': 'alive values. Therefore the version number changed for the Software from v3.33.0-cc to v3.33.3-cc.'})]
    • evaluation_facility: TÜV Informationstechnik GmbH
    • expiration_date: 05.02.2033
    • product: CONEXA 3.0, Version 1.6
    • protection_profile: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V7a_pdf.pdf?__blob=publicationFile&v=2
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte09/0918V7b_pdf.pdf?__blob=publicationFile&v=2
  • product: CONEXA 3.0, Version 1.6
  • subcategory: (Smart Meter Gateway)
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartMeter_Gateway/0918.html
  • vendor: Theben Smart Energy GmbH (vormals: Theben AG)
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0957-V2-2016
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016
heuristics/protection_profiles bb67fb1b4f10e7a5, ac9abe3d5c5a31f0 989546572bfeab5c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073V2b_pdf.pdf
pdf_data/cert_filename 0918V7c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0918-V6-2024: 2
    • BSI-DSZ-CC-0918-V7-2025: 13
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 4
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_CMS.4: 2
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/cert_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
pdf_data/cert_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 9
pdf_data/cert_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/cert_keywords/crypto_protocol
  • IKE:
    • IKEv2: 1
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 3
pdf_data/cert_keywords/ecc_curve
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-03109-1: 3
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 2
  • FIPS:
    • FIPS 180-4: 4
    • FIPS 197: 7
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 3
    • RFC 3394: 3
    • RFC 4493: 6
    • RFC 5084: 3
    • RFC 5114: 3
    • RFC 5246: 4
    • RFC 5289: 3
    • RFC 5639: 3
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
  • ConfidentialDocument:
    • 3.0 (ALC_CMS.4), Version 3.85.0-cc, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.13.3, 2024-11-25, Theben Smart: 1
    • 4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0, Version 1.1, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER: 1
    • Report – Smart Meter Gateway CONEXA, Version 3.01.1, 2025-01- 20, Theben Smart Energy GmbH (confidential document) [21] BSI. Anforderungskatalog zur MSB-Lieferkette, in der aktuell gültigen Fassung. URL: 1
    • Technical Report, Version 2, 2025-01-29, ETR Summary – CONEXA 1.6, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/cert_metadata
pdf_data/report_filename st_vid10576-vr.pdf 0918V7a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10576-2014
    • cert_item: For X-ES Xpedite5205 Embedded Services Router
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2, AVA_VAN.5 valid until: 5 February 2033
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0918-V7-2025
    • cert_item: CONEXA 3.0 Version 1.6
    • cert_lab: BSI
    • developer: Theben Smart Energy GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI-CC-PP-0073-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10576-2014: 1
  • DE:
    • BSI-DSZ-CC-0918-V6-2024: 2
    • BSI-DSZ-CC-0918-V7-2025: 13
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_CMS.4: 2
    • ALC_FLR: 3
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_SSH_EXT.1.4: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 26
    • Cisco Systems, Inc: 2
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 5
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA256: 9
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 10
  • SSH:
    • SSH: 3
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 29
  • IKE:
    • IKEv2: 1
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 3
  • TLS:
    • TLS:
      • TLS: 6
      • TLS 1.2: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • GCM:
    • GCM: 3
pdf_data/report_keywords/ecc_curve
  • NIST:
    • secp256r1: 1
    • secp384r1: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-03109-1: 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • RFC:
    • RFC 2460: 1
    • RFC 5280: 1
  • BSI:
    • AIS 32: 1
    • AIS 34: 2
    • AIS 38: 1
    • AIS 46: 2
    • AIS 48: 2
  • FIPS:
    • FIPS 180-4: 4
    • FIPS 197: 7
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • RFC:
    • RFC 2104: 3
    • RFC 3394: 3
    • RFC 4493: 6
    • RFC 5084: 3
    • RFC 5114: 3
    • RFC 5246: 4
    • RFC 5289: 3
    • RFC 5639: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 3.0 (ALC_CMS.4), Version 3.85.0-cc, Theben Smart Energy GmbH (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.13.3, 2024-11-25, Theben Smart: 1
    • 4 Konfigurationsliste Smart Meter Gateway CONEXA 3.0, Version 1.1, Theben Smart Energy GmbH (confidential document) [10] Configuration list for the TOE SW, “ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT” DER: 1
    • Report – Smart Meter Gateway CONEXA, Version 3.01.1, 2025-01- 20, Theben Smart Energy GmbH (confidential document) [21] BSI. Anforderungskatalog zur MSB-Lieferkette, in der aktuell gültigen Fassung. URL: 1
    • Technical Report, Version 2, 2025-01-29, ETR Summary – CONEXA 1.6, TÜV Informationstechnik GmbH, (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10576-st.pdf 0918V7b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0918-V7-2024: 1
    • BSI-DSZ-CC-0957-V2-2016: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0073: 1
    • BSI-CC-PP-0077: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 6
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.1.2: 1
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 7
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1: 3
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
  • FDP:
    • FDP_RIP.2: 4
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT.1: 2
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_PSK_EXT.1.4: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS.1: 3
    • FPT_FLS.1.1: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD_EXT.1: 3
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 2
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
    • FTA_TSE.1: 1
    • FTA_VCM_EXT.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP: 10
    • FAU_ARP.1: 1
    • FAU_GEN: 38
    • FAU_GEN.1: 22
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAA: 11
    • FAU_SAA.1: 4
    • FAU_SAR: 30
    • FAU_SAR.1: 7
    • FAU_STG: 32
    • FAU_STG.1: 8
    • FAU_STG.2: 15
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.3: 3
    • FAU_STG.4: 3
  • FCO:
    • FCO_NRO: 3
    • FCO_NRO.1: 1
    • FCO_NRO.2: 9
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 44
    • FCS_CKM.1: 16
    • FCS_CKM.2: 6
    • FCS_CKM.4: 32
    • FCS_CKM.4.1: 1
    • FCS_COP: 63
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 9
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 3
    • FDP_IFC: 29
    • FDP_IFC.1: 12
    • FDP_IFC.2: 4
    • FDP_IFF: 25
    • FDP_IFF.1: 24
    • FDP_IFF.1.3: 1
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 2
    • FDP_RIP.1: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
    • FDP_SDI: 2
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 8
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
    • FIA_USB: 3
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 64
    • FMT_MSA.1: 9
    • FMT_MSA.3: 12
    • FMT_SMF: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR: 3
    • FMT_SMR.1: 30
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_CON: 6
    • FPR_CON.1: 10
    • FPR_CON.1.1: 3
    • FPR_CON.1.2: 5
    • FPR_PSE: 2
    • FPR_PSE.1: 8
    • FPR_PSE.1.1: 3
    • FPR_PSE.1.2: 2
    • FPR_PSE.1.3: 2
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_RPL: 3
    • FPT_RPL.1: 8
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_STM: 3
    • FPT_STM.1: 18
    • FPT_STM.1.1: 1
    • FPT_TST: 3
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 30
    • FTP_ITC.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECTIONS: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.ADDRESS_FILTERING: 1
    • O.AUTHENTICATION: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.DISPLAY_BANNER: 1
    • O.FAIL_SECURE: 1
    • O.PORT_FILTERING: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.DATA_INTEGRITY: 1
    • T.NETWORK_DISCLOSURE: 1
    • T.NETWORK_MISUSE: 1
    • T.REPLAY_ATTACK: 1
    • T.TSF_FAILURE: 2
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
  • OE:
    • OE.SM: 4
  • OSP:
    • OSP.SM: 5
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 27
    • Cisco Systems, Inc: 4
pdf_data/st_keywords/eval_facility
  • TSystems:
    • T-Systems International: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
      • AES-: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 3
  • AES_competition:
    • AES:
      • AES: 7
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • DH: 16
      • Diffie-Hellman: 6
  • ECC:
    • ECC:
      • ECC: 5
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 2
  • SHA:
    • SHA2:
      • SHA-256: 13
      • SHA-384: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 33
    • IKEv1: 10
    • IKEv2: 8
  • IPsec:
    • IPsec: 70
  • SSH:
    • SSH: 50
    • SSHv2: 18
  • VPN:
    • VPN: 65
  • TLS:
    • TLS:
      • TLS: 62
      • TLS 1.2: 5
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 3
    • RNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 6
    • P-384: 6
    • P-521: 6
  • NIST:
    • NIST P-256: 3
    • NIST P-384: 3
    • P-256: 3
    • P-384: 3
    • secp256r1: 3
    • secp384r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
    • physical tampering: 4
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03109: 1
    • BSI TR-03109-1: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-002: 1
    • CCMB-2012-009-003: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 180-3: 1
    • FIPS PUB 186-2: 2
    • FIPS PUB 186-3: 8
    • FIPS PUB 197: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-56B: 1
    • SP 800-90: 3
  • RFC:
    • RFC 2460: 2
    • RFC 2560: 1
    • RFC 2986: 1
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4301: 1
    • RFC 4303: 1
    • RFC 4945: 1
    • RFC 5280: 3
    • RFC 5282: 1
    • RFC 5759: 1
    • RFC 6379: 1
    • RFC 768: 2
    • RFC 791: 2
    • RFC 793: 2
  • X509:
    • X.509: 3
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 180-4: 8
    • FIPS 197: 12
  • RFC:
    • RFC 2104: 6
    • RFC 2616: 5
    • RFC 3394: 3
    • RFC 4493: 8
    • RFC 5084: 4
    • RFC 5114: 5
    • RFC 5246: 7
    • RFC 5289: 6
    • RFC 5639: 5
    • RFC 5905: 4
    • RFC5246: 1
pdf_data/st_metadata
  • /Author: Debra Baker
  • /Category:
  • /Comments:
  • /Company: Cisco Systems, Inc.
  • /CreationDate: D:20141126103105-05'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Keywords:
  • /Manager:
  • /ModDate: D:20141126103113-05'00'
  • /Models: X-ES XPedite5205
  • /NDPP_version: 1.1
  • /PP: Protection Profile for Network Devices
  • /PP_2: Network Device Protection Profile Extended Package VPN Gateway
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20141126152459
  • /Subject:
  • /TOE: X-ES Xpedite5205 Embedded Services Router
  • /TOE_Software_Version: IOS 15.2(4)GC
  • /TOE_short: ESR
  • /Title: 1
  • /VPNGW_version: 1.1
  • /_Date: October 13, 2014
  • /_Version: 1.0
  • pdf_file_size_bytes: 532068
  • pdf_hyperlinks: http://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 55
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different