Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 14 - Fall
CCEVS-VR-VID-11539-2024
Symantec™ Network Access Control Version 11.0
383-4-92
name Samsung Galaxy Devices on Android 14 - Fall Symantec™ Network Access Control Version 11.0
category Mobility Access Control Devices and Systems
scheme US CA
status active archived
not_valid_after 23.12.2026 28.09.2015
not_valid_before 23.12.2024 15.07.2008
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/snacv110-cert-e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/snacv110-sec-e.pdf
manufacturer Samsung Electronics Co., Ltd. Symantec Corporation
manufacturer_web https://www.samsung.com https://www.symantec.com
security_level {} EAL2+, ALC_FLR.2, AVA_MSU.1
dgst ccfb157305084c14 7a4d21e544032cb2
heuristics/cert_id CCEVS-VR-VID-11539-2024 383-4-92
heuristics/cert_lab US CANADA
heuristics/cpe_matches cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:* cpe:2.3:a:symantec:network_access_control:11.0.6300:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.6000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.7100:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.6200:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.7000:*:*:*:*:*:*:*, cpe:2.3:a:symantec:network_access_control:11.0.6100:*:*:*:*:*:*:*
heuristics/related_cves CVE-2024-49413, CVE-2024-20891, CVE-2024-34612, CVE-2024-34594, CVE-2023-42563, CVE-2024-34589, CVE-2024-20864, CVE-2024-34647, CVE-2024-49415, CVE-2025-20889, CVE-2024-34595, CVE-2023-42562, CVE-2023-42567, CVE-2025-20887, CVE-2024-20836, CVE-2024-34604, CVE-2024-20855, CVE-2025-20891, CVE-2023-42565, CVE-2023-42564, CVE-2024-34646, CVE-2024-20865, CVE-2024-20892, CVE-2024-34666, CVE-2025-20884, CVE-2024-34678, CVE-2024-49402, CVE-2024-20857, CVE-2024-20831, CVE-2023-42556, CVE-2024-20884, CVE-2024-34655, CVE-2024-20900, CVE-2025-20904, CVE-2025-20893, CVE-2024-34682, CVE-2024-20895, CVE-2024-20843, CVE-2024-34652, CVE-2024-34669, CVE-2024-34583, CVE-2024-20893, CVE-2024-20885, CVE-2024-20817, CVE-2024-20849, CVE-2024-34588, CVE-2023-42561, CVE-2024-20814, CVE-2024-20859, CVE-2024-20860, CVE-2025-20881, CVE-2025-20885, CVE-2024-34607, CVE-2024-34614, CVE-2024-20848, CVE-2024-20832, CVE-2024-20875, CVE-2024-20888, CVE-2024-34665, CVE-2024-34676, CVE-2024-20897, CVE-2024-34609, CVE-2024-34619, CVE-2025-20905, CVE-2024-34587, CVE-2024-20847, CVE-2024-34668, CVE-2024-34642, CVE-2024-20812, CVE-2023-52432, CVE-2024-49410, CVE-2024-20818, CVE-2024-34618, CVE-2024-20876, CVE-2024-34616, CVE-2023-42560, CVE-2024-34593, CVE-2024-34651, CVE-2024-20819, CVE-2024-20874, CVE-2024-34611, CVE-2024-49411, CVE-2024-34590, CVE-2024-34650, CVE-2024-20833, CVE-2024-34602, CVE-2024-20842, CVE-2024-20811, CVE-2024-20898, CVE-2024-20899, CVE-2024-34605, CVE-2025-20907, CVE-2024-34680, CVE-2024-34603, CVE-2024-20815, CVE-2024-34585, CVE-2023-42559, CVE-2024-34641, CVE-2024-20890, CVE-2023-42557, CVE-2024-34615, CVE-2025-20883, CVE-2024-20879, CVE-2024-34637, CVE-2024-20806, CVE-2024-20894, CVE-2024-20896, CVE-2024-34610, CVE-2024-34586, CVE-2024-34617, CVE-2024-34677, CVE-2024-34644, CVE-2024-34608, CVE-2024-34643, CVE-2024-20803, CVE-2024-20830, CVE-2024-20813, CVE-2025-20886, CVE-2024-20882, CVE-2024-34674, CVE-2024-20863, CVE-2023-42570, CVE-2024-20889, CVE-2025-20890, CVE-2024-34591, CVE-2024-49414, CVE-2024-20877, CVE-2024-34606, CVE-2024-20834, CVE-2025-20888, CVE-2024-34592, CVE-2024-34679, CVE-2024-20856, CVE-2024-20880, CVE-2024-20816, CVE-2024-34654, CVE-2024-20901, CVE-2024-20862, CVE-2024-20861, CVE-2024-34648, CVE-2024-34620, CVE-2024-49401, CVE-2024-34673, CVE-2024-20883, CVE-2024-34675, CVE-2025-20882, CVE-2024-20858, CVE-2025-20892, CVE-2024-20835, CVE-2024-34649, CVE-2023-42566, CVE-2024-20878, CVE-2024-34667, CVE-2024-34653 CVE-2012-0289
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, AVA_MSU.1, ADV_HLD.1, AVA_SOF.1, ALC_FLR.2
heuristics/extracted_versions 14 11.0
heuristics/scheme_data
heuristics/protection_profiles 29ba341b00e9bd10, c40ae795865a0dba, e8fcfe94dc27b54b, f84bb9133ca2c8db, 83014eb399a802f3, 593b939921a117e0 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLAN_AS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.4_PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf {}
pdf_data/cert_filename st_vid11539-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11539-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Producer: WeasyPrint 62.3
  • /Title: VID11539-FINAL CERT
  • pdf_file_size_bytes: 136750
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11539-vr.pdf snacv110-cert-e.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11539-2024
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Fall
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
    • cert_id: 383-4-92
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11539-2024: 1
  • CA:
    • 383-4-92: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 5
    • EAL 2 augmented: 1
    • EAL 2+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
  • AVA:
    • AVA_MSU.1: 2
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_PLA_EXP.1: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
  • Samsung:
    • Samsung: 34
  • Microsoft:
    • Microsoft: 9
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 9
  • VPN:
    • VPN: 11
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_AMCPP_Date: [AM_AMCPP_Date]
  • /AM_AMCPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_AMCPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [AM_IAR_Date]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [AM_ST Date]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author:
  • /CC Version: 2.3
  • /CC date: August 2005
  • /CEM Version: 2.3
  • /CEM date: August 2005
  • /CR_Date: 25 June 2008
  • /CR_Version: 1.0
  • /Client City: Cupertino
  • /Client Country: USA
  • /Client Full Name: Symantec Corporation
  • /Client Postal Code: 95014
  • /Client Postal ZIP Code:
  • /Client Short Name: Fortress
  • /Client State: California
  • /Client State/Prov:
  • /Client Street: 20330 Stevens Creek Blvd.
  • /Client Street Address:
  • /CreationDate: D:20080730133619-04'00'
  • /Creator: Acrobat PDFMaker 6.0 for Word
  • /Developer: Symantec Corporation
  • /Developer Long Name: Symantec Corporation
  • /Developer Short Name: Symantec
  • /Developer_caps: SYMANTEC CORPORATION
  • /Doc#: 1569-000-D002
  • /EAL: EAL 2+
  • /EAL Base: 2
  • /EAL Level: 2+
  • /EAL Level Base: 2
  • /EAL Long: EAL 2 Augmented
  • /EAL Short: EAL 2+
  • /EAL_base: EAL 2
  • /ETPRoc_Date: day month yyyy
  • /ETPlan_Doc#: 1573-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: [0.0]
  • /ETPlan_date: day month yyyy
  • /ETProcRes_Date: day month yyyy
  • /ETProcRes_Doc#: 1573-000-D005
  • /ETProcRes_Title: Evaluation Test Results
  • /ETProcRes_Version: [0.0]
  • /ETProc_Doc#: 1573-000-D004
  • /ETProc_Title: Evaluation Test Procedures
  • /ETProc_Version: [0.0]
  • /ETReport_Date: 25 June 2008
  • /ETReport_Doc#: 1573-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_Version: 1.1
  • /EWP_Date: 17 October 2007
  • /EWP_Doc#: 1573-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.2
  • /Eval number: 383-4-92
  • /Eval_End_Date: dd month yyyy
  • /Eval_Start_Date: dd month yyyy
  • /ModDate: D:20080730134213-04'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /ProjectNumber: 1573
  • /ST_Date: June 19, 2008
  • /ST_Title: Security Target: Symantec™ Network Access Control Version 11.0
  • /ST_Version: 1.6
  • /SV City: Mountainview
  • /SVR_Date: [day month yyyy]
  • /SVR_Doc#: 1573-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: [0.0]
  • /SV_City: [site vist city/cities]
  • /Security Classification: EWA-Canada & Symantec Proprietary
  • /SourceModified: D:20080729191505
  • /Sponsor: Symantec Corporation
  • /Sponsor - Noun:
  • /Sponsor City: Cupertino
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 95014
  • /Sponsor State: California
  • /Sponsor Street: 20330 Stevens Creek Blvd.
  • /Sponsor_caps: SYMANTEC CORPORATION
  • /TOE: Symantec™ Network Access Control Version 11.0
  • /TOE Line1: [TOE Line1 - enter later for PCR or web page]
  • /TOE Line2: [TOE Line2 - enter later for PCR or web page]
  • /TOE Line3: [TOE Line3 - enter later for PCR or web page]
  • /TOE Line4: [TOE Line4 - enter later for PCR or web page]
  • /TOE Line5: [TOE Line5 - enter later for PCR or web page]
  • /TOE Short: Symantec™ Network Access Control
  • /TOE Short with version: SNAC Version 11.0
  • /TOE Short-NoTM: [TOE Short, no version, no trademarks]
  • /TOE Version: 11.0
  • /TOE with version: Symantec™ Network Access Control Version 11.0
  • /TOE-NoTM: [TOE Name, no version, no trademarks]
  • /TOE_caps: SYMANTEC ENDPOINT PROTECTION
  • /Title: Microsoft Word - snacv110-cert-e
  • /Version: 0.4
  • /Version date: 12 April 2007
  • /_AdHocReviewCycleID: -187140885
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: White, Debra E.
  • /_EmailSubject: Partial Post to full Post
  • pdf_file_size_bytes: 126851
  • pdf_hyperlinks: http://www.commoncriteriaportal.es /, http://www.cse-cst.gc.ca/services/common-criteria/trusted-products-e.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename st_vid11539-st.pdf snacv110-sec-e.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 6
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 4
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 20
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM_EXT: 21
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 1
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 50
    • FCS_COP.1: 9
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 6
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 1
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 1
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1.1: 1
    • FCS_WPA_EXT: 4
    • FCS_WPA_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 9
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 6
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 2
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 7
    • FDP_UPC_EXT.1: 4
    • FDP_VPN_EXT: 3
    • FDP_VPN_EXT.1.1: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 18
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 1
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 3
    • FIA_MBE_EXT: 1
    • FIA_MBE_EXT.1: 2
    • FIA_MBE_EXT.1.1: 1
    • FIA_MBE_EXT.2: 3
    • FIA_MBE_EXT.2.1: 1
    • FIA_MBV_EXT: 4
    • FIA_MBV_EXT.1: 5
    • FIA_MBV_EXT.2: 2
    • FIA_MBV_EXT.2.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 11
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 2
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 18
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_BDP_EXT.1: 1
    • FPT_BDP_EXT.1.1: 1
    • FPT_BDP_EXT.1.2: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 6
    • FPT_KST_EXT.1: 3
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 3
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_PBT_EXT.1: 1
    • FPT_PBT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 19
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 2
    • FPT_TST_EXT.3: 2
    • FPT_TUD_EXT: 10
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 1
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 1
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 10
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 4
    • FTP_ITC.1: 3
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 1
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 21
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 12
    • FAU_SAR.3.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 18
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_IFC.1: 12
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PLA_EXP.1: 5
    • FIA_PLA_EXP.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 28
    • FMT_MTD.1.1: 5
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_RIP.1: 1
    • FPT_RVM.1: 5
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.1: 6
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_SEP.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.PROTECTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.AUDIT_BACKUP: 1
    • A.NOEVIL: 1
    • A.NO_EVIL: 2
    • A.PHYSICAL: 1
    • A.SECURE_COMMS: 4
  • O:
    • O.ADMIN_ROLE: 5
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 2
    • O.AUDIT_PROTECTI: 1
    • O.AUDIT_PROTECTION: 4
    • O.AUDIT_REVIEW: 3
    • O.CORRECT_TSF_OPERATIO: 1
    • O.MANAGE: 5
    • O.UNAUTH_ENDPOI: 1
    • O.UNAUTH_ENDPOINT: 1
  • OE:
    • OE.AUDIT_ALARM: 4
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_STORAGE: 4
    • OE.DISPLAY_BANNE: 1
    • OE.DISPLAY_BANNER: 2
    • OE.DOMAIN_: 2
    • OE.DOMAIN_SEPARATION: 3
    • OE.NO_BYPASS: 5
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 2
    • OE.RESIDUAL_INFORMATION: 3
    • OE.SECURE_COMMS: 4
    • OE.TIME_STAMPS: 3
    • OE.TOE_ACCESS: 4
  • T:
    • T.AUDIT_: 1
    • T.AUDIT_COMPROMISE: 1
    • T.TSF_COMPROMIS: 1
    • T.TSF_COMPROMISE: 3
    • T.UNAUTH_ENDPOI: 1
    • T._AUDIT_COMPROMISE: 2
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 24
  • Samsung:
    • Samsung: 144
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 5
      • AES-128: 1
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 21
      • SHA-384: 3
      • SHA-512: 3
  • scrypt:
    • scrypt: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv2: 18
  • IPsec:
    • IPsec: 39
  • TLS:
    • TLS:
      • TLS: 67
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 96
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 15
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 10
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 23
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 8
  • other:
    • TEE: 33
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 8
    • FIPS 197: 10
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-38A: 2
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 3
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 1
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 4
    • RFC 5289: 8
    • RFC 5746: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
    • RFC 8247: 1
    • RFC 8603: 1
    • RFC 8784: 1
  • X509:
    • X.509: 12
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
pdf_data/st_metadata
  • /Author: Apex Assurance Group
  • /CreationDate: D:20080619192513Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20080716160312-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Symantec™ Network Access Control Version 11.0
  • /Title: Security Target for Common Criteria Evaluation
  • pdf_file_size_bytes: 853391
  • pdf_hyperlinks: http://www.symantec.com/, http://www.apexassurance.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different