name |
F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base) version 11.5 HF10 |
ID.me 1.28 on IDeal Citiz MOSID V2.1.1 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
DE |
FR |
status |
archived |
archived |
not_valid_after |
02.08.2022 |
15.11.2021 |
not_valid_before |
03.08.2017 |
15.11.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_70.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0856b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_70.pdf |
manufacturer |
F5 Networks, Inc. |
Safran Morpho |
manufacturer_web |
https://www.f5.com/ |
https://morpho.com |
security_level |
EAL4+, ALC_FLR.3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
f34044c28e3c540c |
2270d0f0e4ed4dbf |
heuristics/cert_id |
BSI-DSZ-CC-0856-2017 |
ANSSI-CC-2016/70 |
heuristics/cert_lab |
BSI |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ASE_CCL.1 |
heuristics/extracted_versions |
11.5 |
1.28, 2.1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0975-2018 |
ANSSI-CC-2017/09, ANSSI-CC-2017/08, ANSSI-CC-2018/22 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, ANSSI-CC-2016/67, BSI-DSZ-CC-0879-V2-2015, ANSSI-CC-2016/66 |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0975-2018 |
ANSSI-CC-2017/09, ANSSI-CC-2017/08, ANSSI-CC-2018/22 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0879-2014, ANSSI-CC-2016/66, BSI-DSZ-CC-0782-V2-2015, ANSSI-CC-2016/67, BSI-DSZ-CC-0879-V2-2015 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 27abdb9c6ab375a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0856a_pdf.pdf |
ANSSI-CC-2016_70.pdf |
pdf_data/report_frontpage |
- FR:
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0856-2017
- cert_item: F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base), version 11.5.1 HF10
- cert_lab: BSI
- developer: F5 Networks, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/70
- cert_item: ID.me 1.28 on IDeal Citiz MOSID V2.1.1
- cert_item_version: Applet version 1.28, plateforme version 2.1.1
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Safran Identity & Security (ex-MORPHO) 18 Chaussée Jules César, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Safran Identity & Security (ex-MORPHO) 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 : Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013
- DE:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 1
- BSI-DSZ-CC-0879-V2-2015: 1
- FR:
- ANSSI-CC-2016/66: 4
- ANSSI-CC-2016/67: 4
- ANSSI-CC-2016/70: 18
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 4
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- EAL4: 1
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE: 4
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FIA:
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
- Morpho:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 7
- SHA256: 2
- SHA384: 1
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 14
- TLS v1.1: 2
- TLSv1.1: 6
- TLSv1.2: 7
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- NIST:
- NIST P-256: 1
- P-256: 1
- secp256r1: 8
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- FIPS:
- FIPS180-3: 16
- FIPS180-310: 1
- FIPS180-4: 1
- FIPS186-3: 6
- FIPS186-39: 1
- FIPS186-4: 1
- FIPS198-1: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC1321: 1
- RFC2104: 1
- RFC3447: 10
- RFC3526: 1
- RFC4251: 1
- RFC4252: 2
- RFC4253: 4
- RFC4346: 5
- RFC4492: 6
- RFC5246: 6
- RFC6151: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 5.1, 2017-07-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] Configuration list for the TOE, 2017-07-05, CI list for documentation in Perforce: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20170816150424+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Firewall (ADF-Base) version 11.5.1 HF10"
- /ModDate: D:20170817100036+02'00'
- /Producer: LibreOffice 5.2
- /Subject: Certification Report, Zertifizierungsreport
- /Title: Certification Report BSI-DSZ-CC-0856-2017
- pdf_file_size_bytes: 1712889
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://askF5.com/, https://www.bsi.bund.de/zertifizierung, https://downloads.f5.com/, https://www.bsi.bund.de/zertifizierungsreporte, https://support.f5.com/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_70
- pdf_file_size_bytes: 250863
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
0856b_pdf.pdf |
anssi_cible_2016_70.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 1
- PP-SSCD2: 23
- PP-SSCD3: 15
- PP-SSCD4: 15
- PP-SSCD5: 23
- PP-SSCD6: 15
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 5+: 2
- EAL4+: 1
- EAL5: 5
- EAL5 augmented: 5
- EAL5+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 8
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 8
- AGD:
- AGD_ADM: 1
- AGD_OPE: 3
- AGD_OPE.1: 5
- AGD_PRE: 3
- AGD_PRE.1: 5
- AGD_USR: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 14
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 3
- FCS_CKM_EXT.4: 19
- FCS_CKM_EXT.4.1: 2
- FCS_COP.1: 33
- FCS_COP.1.1: 3
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FCS_SSH_EXT.1: 15
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_TLS_EXT.1: 21
- FCS_TLS_EXT.1.1: 2
- FCS_TLS_EXT.1.2: 2
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 14
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 5
- FDP_RIP.2: 11
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_PMG_EXT.1: 14
- FIA_PMG_EXT.1.1: 1
- FIA_SOS: 1
- FIA_UAU.1: 2
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 14
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 21
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 3
- FIA_UIU_EXT.1: 1
- FMT:
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW: 1
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_SKP: 1
- FPT_SKP_EXT.1: 13
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 13
- FPT_TST_EXT.1.1: 2
- FPT_TUD: 1
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FRU:
- FRU_RSA.1: 9
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTA_SSL.4: 10
- FTA_SSL.4.1: 1
- FTA_TAB.1: 13
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 21
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 26
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.3: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 18
- FCS_COP.1.1: 2
- FCS_RND: 5
- FCS_RND.1: 15
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 76
- FDP_ACC.1: 15
- FDP_ACF: 67
- FDP_ACF.1: 20
- FDP_DAU: 12
- FDP_DAU.2: 2
- FDP_IFC: 2
- FDP_IFC.1: 7
- FDP_IFF: 2
- FDP_ITC: 11
- FDP_ITC.1: 5
- FDP_ITC.2: 2
- FDP_RIP: 8
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_ROL: 1
- FDP_SDI: 32
- FDP_SDI.2: 5
- FDP_UCT: 17
- FDP_UCT.1: 1
- FDP_UIT: 16
- FDP_UIT.1: 2
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 5
- FIA_API.1: 15
- FIA_API.1.1: 2
- FIA_ATD: 1
- FIA_UAU.1: 27
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 2
- FIA_UID.1: 26
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MSA: 39
- FMT_MSA.1: 4
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 25
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 17
- FMT_MSA.4.1: 1
- FMT_MTD: 30
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 29
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 18
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS: 3
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 14
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 16
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_TDC.1: 1
- FPT_TST: 1
- FPT_TST.1: 19
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 69
- FTP_ITC.1: 14
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECTIONS: 3
- A.KEYS: 2
- A.LDAP: 3
- A.LOGSERVER: 3
- A.MGMTNET: 3
- A.NO_GENERAL_PURPOSE: 3
- A.PEERTRUST: 3
- A.PHYSICAL: 3
- A.TIME: 3
- A.TRAINED_ADMIN: 3
- A.TRUSTED_ADMIN: 3
- O:
- O.ADDRESS_FILTERING: 9
- O.DISPLAY_BANNER: 5
- O.FAILOVER: 5
- O.LTM-TRAFFICMGMT: 13
- O.PORT_FILTERING: 9
- O.PROTECTED_COMMUNICATIONS: 19
- O.RELATED_CONNECTION_FILTERING: 6
- O.RESIDUAL_INFORMATION_CLEARING: 5
- O.RESOURCE_AVAILABILITY: 5
- O.SESSION_LOCK: 6
- O.STATEFUL_INSPECTION: 4
- O.SYSTEM_MONITORING: 9
- O.TOE_ADMINISTRATION: 19
- O.TSF_SELF_TEST: 5
- O.VERIFIABLE_UPDATES: 5
- OE:
- OE.CONNECTIONS: 3
- OE.KEYS: 2
- OE.LDAP: 4
- OE.LOGSERVER: 3
- OE.MGMTNET: 3
- OE.NO_GENERAL_PURPOSE: 3
- OE.PEERTRUST: 3
- OE.PHYSICAL: 3
- OE.TIME: 5
- OE.TRAINED_ADMIN: 4
- OE.TRUSTED_ADMIN: 4
- T:
- T.ADMIN_ERROR: 5
- T.NETWORK_ACCESS: 5
- T.NETWORK_DISCLOSURE: 2
- T.NETWORK_DOS: 4
- T.NETWORK_MISUSE: 2
- T.PUBLIC_NETWORKS: 3
- T.RESOURCE_EXHAUSTION: 3
- T.TSF_FAILURE: 3
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_UPDATE: 3
- T.UNDETECTED_ACTIONS: 3
- T.USER_DATA_REUSE: 3
|
- A:
- A.APPLET: 1
- A.CGA: 7
- A.CSP: 10
- A.PRODUCTION: 1
- A.SCA: 6
- A.VERIFICATION: 1
- D:
- O:
- O.ALARM: 1
- O.BIO-MNGT: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 5
- OE.HI_VAD: 2
- OE.KEY_GENERATION: 1
- OE.PRODUCTION: 1
- OE.QUOTAS: 1
- OE.SECURITY-DOMAINS: 1
- OE.SHARE-CONTROL: 1
- OE.VERIFICATION: 1
- OSP:
- OSP.KEY_GENERATION: 1
- OSP.QUOTAS: 1
- OSP.SECURITY_DOMAINS: 1
- OSP.SHARE-CONTROL: 1
- OSP.VERIFICATION: 1
- T:
- T.APP_DATA_INTEGRITY: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LIFE_CYCLE: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
- T.UNAUTH_ACCESS: 1
- T.UNAUTH_CARD_MNGT: 1
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 2
- Diffie-Hellman: 2
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 9
- SHA256: 1
- SHA384: 1
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 4
- SHA-224: 3
- SHA-256: 6
- SHA-384: 4
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 83
- TLS 1.0: 4
- TLS 1.1: 4
- TLS 1.2: 2
- TLS v1.1: 1
- TLSv1.1: 4
- TLSv1.2: 7
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 10
- P-256: 13
- curve P-256: 1
- secp256r1: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Fault injection: 1
- fault injection: 2
- malfunction: 1
- physical tampering: 8
- SCA:
- DPA: 3
- SPA: 3
- physical probing: 2
- side channel: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 6
- FIPS 186-2: 1
- FIPS PUB 186-3: 3
- FIPS197: 2
- FIPS198-1: 2
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2460: 1
- RFC 2818: 1
- RFC 3513: 1
- RFC 4253: 2
- RFC 4346: 1
- RFC 4443: 1
- RFC 5246: 1
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- RFC1321: 2
- RFC2104: 2
- RFC2326: 2
- RFC2460: 4
- RFC2818: 2
- RFC3261: 2
- RFC3447: 11
- RFC3526: 2
- RFC4251: 4
- RFC4252: 5
- RFC4253: 9
- RFC4254: 2
- RFC4291: 3
- RFC4346: 9
- RFC4443: 4
- RFC4492: 7
- RFC5228: 2
- RFC5246: 8
- RFC5280: 3
- RFC5722: 2
- RFC5735: 4
- RFC6151: 1
- RFC768: 4
- RFC791: 4
- RFC792: 4
- RFC793: 4
- RFC959: 4
- X509:
|
- BSI:
- AIS 20: 1
- AIS20: 1
- AIS31: 2
- CC:
- CCMB-2012-09-001: 4
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-: 1
- ISO/IEC 9797-1: 2
- NIST:
- PKCS:
- PKCS#1: 2
- PKCS1: 6
- PKCS3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.3.3 Certificate validation For TLS sessions, the TOE implements: 1
- out of scope: 1
|
- OutOfScope:
- Figure 2: TOE physical scope Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitizTM Operating System enforces separation of the data between the applets and: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /AAPL:Keywords: ['Security Target', 'Common Criteria', 'F5', 'Application Delivery Controller', 'Firewall', 'Networking']
- /Author: David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.1.16)
- /CreationDate: D:20170216134702Z
- /Creator: Unknown
- /Keywords: Security Target, Common Criteria, F5, Application Delivery Controller, Firewall, Networking
- /ModDate: D:20170816153147+02'00'
- /Producer: Mac OS X 10.12.3 Quartz PDFContext
- /Subject: BIG-IP ADF-Base
- /Title: BIG-IP 11.5.1 HF 10 ADF-Base Security Target (version 1.7 as of 2017-02-06)
- pdf_file_size_bytes: 3458585
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf, http://www.ietf.org/rfc/rfc2104.txt, http://www.ietf.org/rfc/rfc5228.txt, https://devcentral.f5.com/wiki/iRules.Events.ashx, http://www.ietf.org/rfc/rfc1321.txt, http://www.ietf.org/rfc/rfc3447.txt, http://tmml.sourceforge.net/doc/tcl/index.html, http://www.ietf.org/rfc/rfc4492.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf, http://www.ietf.org/rfc/rfc5246.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf, http://www.ietf.org/rfc/rfc3526.txt, http://www.cs.ucr.edu/~marios/ethereal-tcpdump.pdf, https://devcentral.f5.com/wiki/iRules.Commands.ashx, http://www.ietf.org/rfc/rfc5280.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
- /Author: MOLINS Nicolas (MORPHO)
- /CreationDate: D:20161108135807+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20161108135807+01'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 2396029
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 121
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |