Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Waterfall Unidirectional Security Gateway WF-500, Version 2.0
NSCIB-CC-0618820-CR
Red Hat Enterprise Linux 8.1
CCEVS-VR-VID-11107-2021
name Waterfall Unidirectional Security Gateway WF-500, Version 2.0 Red Hat Enterprise Linux 8.1
category Boundary Protection Devices and Systems Operating Systems
scheme NL US
status active archived
not_valid_after 24.03.2028 04.01.2023
not_valid_before 24.03.2023 04.01.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0618820-cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11107-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0618820-CR-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11107-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0618820-STv3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11107-st.pdf
manufacturer Waterfall Security Solutions Ltd. Red Hat, Inc.
manufacturer_web https://www.waterfallsecurity.com https://www.redhat.com
security_level ALC_FLR.2, EAL4+, ALC_DVS.2, AVA_VAN.5 {}
dgst c891270d230bb586 0b0b999b8665313b
heuristics/cert_id NSCIB-CC-0618820-CR CCEVS-VR-VID-11107-2021
heuristics/cert_lab US
heuristics/cpe_matches {} cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:8.1_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:8.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2019-2798, CVE-2019-0211, CVE-2019-2819, CVE-2019-12817, CVE-2019-6111, CVE-2020-2659, CVE-2019-2983, CVE-2019-15605, CVE-2019-11135, CVE-2019-2455, CVE-2021-3696, CVE-2019-6454, CVE-2019-2739, CVE-2019-15604, CVE-2019-7548, CVE-2019-6470, CVE-2019-0820, CVE-2019-12527, CVE-2019-11459, CVE-2019-2532, CVE-2019-2481, CVE-2022-0330, CVE-2019-2684, CVE-2019-2814, CVE-2020-2590, CVE-2019-2688, CVE-2018-10393, CVE-2019-2529, CVE-2019-2596, CVE-2019-14287, CVE-2019-3460, CVE-2019-2617, CVE-2019-2795, CVE-2019-10193, CVE-2019-2686, CVE-2018-18897, CVE-2019-7665, CVE-2019-9903, CVE-2019-2962, CVE-2020-2601, CVE-2019-2694, CVE-2019-2691, CVE-2019-2695, CVE-2019-2531, CVE-2019-2436, CVE-2019-2624, CVE-2019-2606, CVE-2019-10192, CVE-2020-6851, CVE-2019-2752, CVE-2021-44142, CVE-2020-2583, CVE-2019-2780, CVE-2019-2536, CVE-2019-11884, CVE-2019-2834, CVE-2019-2602, CVE-2019-2826, CVE-2019-16884, CVE-2019-2420, CVE-2019-15718, CVE-2019-17596, CVE-2019-2808, CVE-2018-16877, CVE-2019-2812, CVE-2019-2628, CVE-2021-4034, CVE-2019-2625, CVE-2022-2601, CVE-2019-11833, CVE-2021-3621, CVE-2019-2801, CVE-2019-2975, CVE-2019-0160, CVE-2019-1010238, CVE-2019-11043, CVE-2019-2698, CVE-2019-2802, CVE-2018-12121, CVE-2019-3887, CVE-2019-2797, CVE-2019-5010, CVE-2019-2785, CVE-2019-2530, CVE-2019-7150, CVE-2018-20662, CVE-2019-10126, CVE-2019-2988, CVE-2019-2774, CVE-2019-2589, CVE-2019-2581, CVE-2020-14311, CVE-2020-25632, CVE-2019-2879, CVE-2019-2996, CVE-2019-2757, CVE-2018-20650, CVE-2019-2510, CVE-2019-12450, CVE-2019-9810, CVE-2019-2636, CVE-2019-2999, CVE-2019-2644, CVE-2019-2580, CVE-2019-2587, CVE-2019-3459, CVE-2019-2689, CVE-2019-2585, CVE-2019-13734, CVE-2019-2533, CVE-2018-12207, CVE-2018-18506, CVE-2023-3972, CVE-2021-3672, CVE-2019-14814, CVE-2021-3697, CVE-2019-9959, CVE-2019-2784, CVE-2019-2635, CVE-2019-3816, CVE-2019-2634, CVE-2020-27779, CVE-2019-2614, CVE-2023-0494, CVE-2019-2800, CVE-2019-2627, CVE-2019-2740, CVE-2020-0603, CVE-2019-2738, CVE-2019-2687, CVE-2022-0847, CVE-2019-2584, CVE-2018-20685, CVE-2019-2592, CVE-2019-2945, CVE-2019-2973, CVE-2019-2683, CVE-2019-6109, CVE-2023-3899, CVE-2019-2810, CVE-2019-7310, CVE-2019-2681, CVE-2019-0757, CVE-2019-2623, CVE-2019-2811, CVE-2019-11356, CVE-2019-2535, CVE-2019-16775, CVE-2019-2805, CVE-2019-9791, CVE-2019-15606, CVE-2020-25647, CVE-2019-16777, CVE-2019-16776, CVE-2020-14372, CVE-2020-2593, CVE-2022-0492, CVE-2019-13313, CVE-2019-14816, CVE-2019-7664, CVE-2019-2593, CVE-2019-17631, CVE-2019-16276, CVE-2019-9948, CVE-2021-20233, CVE-2019-2789, CVE-2021-40438, CVE-2021-3609, CVE-2020-14310, CVE-2018-16878, CVE-2019-9506, CVE-2019-13616, CVE-2019-2534, CVE-2019-2978, CVE-2019-2539, CVE-2019-2626, CVE-2019-2631, CVE-2019-2803, CVE-2019-9514, CVE-2020-14355, CVE-2020-2604, CVE-2019-9792, CVE-2019-2778, CVE-2020-2654, CVE-2019-2693, CVE-2020-27749, CVE-2020-9490, CVE-2019-2630, CVE-2021-3695, CVE-2019-7222, CVE-2019-2830, CVE-2019-2815, CVE-2021-3570, CVE-2019-2981, CVE-2022-4254, CVE-2019-7164, CVE-2020-0602, CVE-2019-2755, CVE-2019-2620, CVE-2019-17024, CVE-2019-2796, CVE-2019-9788, CVE-2019-2434, CVE-2021-20225, CVE-2019-2685, CVE-2019-2992, CVE-2018-10392, CVE-2019-19339, CVE-2021-3656, CVE-2019-14815, CVE-2019-2607, CVE-2019-2503, CVE-2019-9755, CVE-2019-9636
heuristics/extracted_sars ALC_DEL.1, ATE_FUN.1, ALC_CMS.4, AVA_VAN.5, ASE_INT.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, ALC_CMC.4, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, AGD_PRE.1, ASE_TSS.1, ALC_FLR.2, ADV_IMP.1, ALC_DVS.2, ASE_REQ.2, ALC_LCD.1, ASE_OBJ.2 ALC_CMS.1, AGD_OPE.1, ASE_ECD.1, AVA_VAN.1, AGD_PRE.1, ASE_CCL.1, ASE_TSS.1, ASE_INT.1, ALC_CMC.1, ASE_REQ.2, ALC_TSU_EXT.1, ATE_IND.1, ASE_OBJ.2, ADV_FSP.1
heuristics/extracted_versions 2.0 8.1
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11107/
  • categories: ['Operating System']
  • category: Operating System
  • certification_date: 04.01.2021
  • evaluation_facility: Acumen Security
  • expiration_date: 04.01.2023
  • id: CCEVS-VR-VID11107
  • product: Red Hat Enterprise Linux 8.1
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11107
  • vendor: Red Hat, Inc.
heuristics/protection_profiles {} 236bced46aeb26ba, e34797b67a3163c5
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf
pdf_data/cert_filename NSCIB-CC-23-0618820-cert.pdf st_vid11107-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-23-0618820: 1
  • US:
    • CCEVS-VR-VID11107-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 2
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/report_filename NSCIB-CC-0618820-CR-1.pdf st_vid11107-vr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0618820-CR
    • cert_item: Waterfall Unidirectional Security Gateway WF-500, Version 2.0
    • cert_lab: SGS Brightsight B.V.
    • developer: Waterfall Security Solutions, Ltd
  • US:
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11107-2021
    • cert_item: for the Red Hat Enterprise Linux Version 8.1 Version 1.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0618820-CR: 11
    • NSCIB-CC-17-119023: 1
  • US:
    • CCEVS-VR-VID11107-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.2: 2
    • FCS_COP.1: 5
    • FCS_DRBG_EXT.1: 1
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHS_EXT.1: 2
    • FCS_TLSC_EXT.1: 4
    • FCS_TLSC_EXT.4: 1
  • FPT:
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA 2048: 1
    • RSA 4096: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 33
    • SSHv2: 4
  • TLS:
    • TLS:
      • TLS: 14
      • TLSv1.2: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 16
    • P-521: 12
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • and WF-500-Standard-Split, and the host agents exist in the same cabinet. However, those agents are out of scope of the TOE as well. The TOE has been evaluated by SGS Brightsight B.V. located in Delft, The: 1
    • out of scope: 1
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20210111133540-05'00'
  • /ModDate: D:20210111133540-05'00'
  • pdf_file_size_bytes: 815587
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename NSCIB-CC-0618820-STv3.pdf st_vid11107-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL4: 12
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 2
    • ADV_FSP.2: 2
    • ADV_FSP.4: 8
    • ADV_IMP.1: 5
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 8
  • AGD:
    • AGD_OPE.1: 6
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_DVS.2: 9
    • ALC_FLR.2: 7
    • ALC_LCD.1: 4
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 6
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 3
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 4
    • ATE_DPT.1: 4
    • ATE_FUN.1: 8
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 8
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFC.2: 8
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 8
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FMT:
    • FMT_MSA.3: 2
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 25
    • FCS_COP.1.1: 6
    • FCS_DRBG_EXT.1: 1
    • FCS_RBG_EXT.1: 3
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHS_EXT.1: 6
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSH_EXT.1: 4
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 3
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 8
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 2
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT.1: 3
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 3
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT.1: 3
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT.1: 3
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT.1: 3
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 3
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.NETWORK: 4
    • A.PHYSICAL: 4
  • O:
    • O.UNIDIRECTIONAL: 8
  • OE:
    • OE.FILTER_LOW: 4
  • T:
    • T.HACK_HIGH: 1
    • T.HACK_LOW: 3
    • T.LEAKAGE: 2
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 3
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
      • AES-128: 1
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 4
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • Diffie-Hellman: 8
  • RSA:
    • RSA 2048: 5
    • RSA 4096: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 7
      • SHA-384: 7
      • SHA-512: 7
      • SHA2: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 93
    • SSHv2: 5
  • TLS:
    • TLS:
      • TLS: 35
      • TLS 1.2: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 5
    • PRNG: 1
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 36
    • P-384: 36
    • P-521: 22
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 1
  • OpenSSL:
    • OpenSSL: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 3
    • FIPS 197: 1
    • FIPS 198-1: 1
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
    • SP 800-56A: 2
    • SP 800-56B: 1
  • RFC:
    • RFC 3526: 1
    • RFC 4251: 1
    • RFC 4253: 2
    • RFC 5246: 13
    • RFC 5280: 4
    • RFC 5288: 8
    • RFC 5289: 16
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 8017: 1
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • fiber optic cable and relays the data to a server equipped with Waterfall software. Agent Host (out of scope of the TOE) TX & RX Agent Host Modules: is a normal PC, it can transmit data to the TX for: 1
    • out of scope: 1
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Waterfall Security Solutions
  • /CreationDate: D:20230324114901+01'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20230324114901+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: WF-500 V2
  • /Title: Waterfall Unidirectional Security Gateway
  • pdf_file_size_bytes: 1808722
  • pdf_hyperlinks: http://www.waterfall-security.com/, https://waterfall-security.com/company/legal
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 32
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different