| name |
Citrix ADC (MPX FIPS and VPX FIPS) Version 12.1 |
NC2.VPN+ v2.1.9 |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
US |
MY |
| status |
archived |
active |
| not_valid_after |
26.01.2024 |
13.09.2026 |
| not_valid_before |
26.01.2022 |
13.09.2021 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11225-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C121-CERTIFICATE-v1.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11225-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C121-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11225-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SCS%20NC2.vpn+%20Security%20Target%20v1.0.pdf |
| manufacturer |
Citrix Systems, Inc. |
System Consultancy Services Sdn. Bhd. |
| manufacturer_web |
https://www.citrix.com |
https://www.scs.my/ |
| security_level |
{} |
EAL2 |
| dgst |
f941ae49c8ac76f2 |
b25e9c1d52bcd897 |
| heuristics/cert_id |
CCEVS-VR-11225-2022 |
ISCB-5-RPT-C121-CR-v1 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CLL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
12.1 |
2.1.9 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11225/
- categories: ['Network Device']
- category: Network Device
- certification_date: 26.01.2022
- evaluation_facility: Acumen Security
- expiration_date: 26.01.2024
- id: CCEVS-VR-VID11225
- product: Citrix ADC (MPX FIPS and VPX FIPS) Version 12.1
- scheme: US
- url: https://www.niap-ccevs.org/products/11225
- vendor: Citrix Systems Inc.
|
- cert_no: 2021-008-C121
- certification_date: 13.09.2021
- developer: System Consultancy Services Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Network and Network-Related Devices and Systems
- cert_id: C121
- certification_date: 13.09.2021
- developer: No.36, Jalan Wangsa Delima 6Pusat Bandar Wangsa Maju53300 Kuala Lumpur Phone:+603 4149 1919Email: [email protected]: https://www.scs.my
- expiration_date: 13.09.2026
- mutual_recognition: CCRA
- product: NC2.vpn+ v2.1.9
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/ISCB-5-RPT-C121-CR-v1.pdf
- scope: The TOE (NC2.vpn+ version 2.1.9) a self-contained box (security appliance) consisting of hardware and software that provides security functionality such as Stateful Traffic Filter Firewall, Virtual Private Network (VPN), Cryptographic Support, Security Audit, Identification and Authentication, Security Management, Secure Communication. From the stateful inspection firewall to the inline intrusion detection & prevention system, various features are built-in to enhance network performance and protect your network from numerous cyber security threats. The TOE resides between one or more internal networks (that the TOE is protecting) and an external network such as the Internet. All information transferred between the internal and external networks shall pass through the TOE. Network packets are inspected in real-time as they pass through the TOE (inbound and outbound protection). Malicious network packets are filtered before they have a chance to reach inside the protected network.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C121/SCS_NC2.vpn_Security_Target_v1.0.pdf
- type: Network and Network-Related Devices and Systems
- expiration_date: 13.09.2026
- level: EAL2
- product: NC2.vpn+ v2.1.9
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/102
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
89f2a255423f4a20 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
| pdf_data/cert_filename |
st_vid11225-ci.pdf |
ISCB-5-CERT-C121-CERTIFICATE-v1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11225-2022: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20220125185236-05'00'
- /ModDate: D:20220125185236-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180294
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20210917005316Z00'00'
- /Creator: Word
- /ModDate: D:20210917005316Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext
- pdf_file_size_bytes: 704807
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
st_vid11225-vr.pdf |
ISCB-5-RPT-C121-CR-v1.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-11225-2022
- cert_item: for the Citrix ADC (MPX FIPS and VPX FIPS) Version 12.1
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- MY:
- ISCB-5-RPT-C121-CR-v1: 34
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.PHYSICAL: 1
- A.SINGLE_CONNECTION: 1
- A.TRUSTED_ADMIN: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
- IPsec:
- TLS:
- TLS:
- TLS: 1
- TLS v1.2: 1
- TLS v1.3: 1
- VPN:
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: ppatin
- /CreationDate: D:20220125182512-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220125182512-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 295296
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20210918094333Z00'00'
- /Creator: Word
- /ModDate: D:20210918094333Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1323) Quartz PDFContext
- pdf_file_size_bytes: 809947
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
| pdf_data/st_filename |
st_vid11225-st.pdf |
SCS NC2.vpn Security Target v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CLL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 4
- ASE_ECD.1: 3
- ASE_INT.1: 4
- ASE_OBJ.2: 4
- ASE_REQ.2: 4
- ASE_SPD.1: 4
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 6
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 4
- FCS_NTP_EXT.1: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 5
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHS_EXT.1: 6
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 3
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 3
- FIA_UAU.7.1: 2
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 1
- FMT_MTD: 4
- FMT_MTD.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_APW_EXT.1: 1
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 3
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- A.VS_CORRECT_CONFIGURATION: 1
- A.VS_ISOLATION: 1
- A.VS_REGULAR_UPDATES: 1
- A.VS_TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMN: 1
- OE.UPDATES: 1
- OE.VM_CONFIGURATION: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.PHYSICAL: 3
- A.SINGLE_CONNECTION: 2
- A.TRUSTED_ADMIN: 3
- O:
- O.DATA_FLOW_CONTROL: 4
- O.ENCRYPT: 3
- O.LOGGING: 3
- O.PROTECTED_MANAGEMENT: 4
- O.TOECOM: 4
- OE:
- OE.PHYSICAL: 4
- OE.SINGLE_CONNECTION: 2
- OE.TRUSTED_ADMIN: 5
- T:
- T.READ_MODIFY_DATA: 2
- T.TOECOM: 3
- T.UNAUTHORIZED_ACCESS: 3
- T.UNAUTHORIZED_DATA: 3
- T.UNDETECTED_ACTIONS: 2
|
| pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-128: 3
- AES-256: 4
- AES256: 2
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 2
- HMAC-SHA-512: 1
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 3
- SHA-512: 5
- SHA256: 2
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 37
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.1: 1
- VPN:
|
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 5
- TLS v1.2: 3
- TLS v1.3: 3
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- P-521: 8
- secp256r1: 2
- secp384r1: 2
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 1
- FIPS PUB 186-4: 6
- ISO:
- ISO/IEC 10118-: 1
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-: 1
- NIST:
- SP 800-56A: 1
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 3268: 2
- RFC 3447: 1
- RFC 4253: 1
- RFC 4346: 2
- RFC 4492: 8
- RFC 5077: 1
- RFC 5246: 6
- RFC 5280: 4
- RFC 5288: 4
- RFC 5289: 9
- RFC 6125: 1
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Securelytics
- /CreationDate: D:20210730035619+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20210730035619+00'00'
- /Subject: SCS Sdn Bhd
- /Title: SCS NC2.vpn+ Security Target
- pdf_file_size_bytes: 844757
- pdf_hyperlinks: http://www.commonriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |