StoneGate Firewall/VPN

CSV information ?

Status archived
Valid from 13.03.2009
Valid until 13.03.2014
Scheme 🇬🇧 UK
Manufacturer Stonesoft Corporation
Category Boundary Protection Devices and Systems
Security level EAL4+, ALC_FLR.1
Maintenance updates Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1 (23.03.2010) Certification report Security target

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

No heuristics are available for this certificate.

Extracted SARs

ALC_FLR.1

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 08.07.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 11.06.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60', 'txt_hash': 'd3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f', 'txt_hash': '4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 836073, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 22, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110143Z00'00'", '/ModDate': "D:20090325110143Z00'00'", '/Title': 'Microsoft Word - 090325 LFS T536 StoneGate CRP249 v1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP249': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}}, 'IKE': {'IKE': 2}, 'VPN': {'VPN': 11}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 2, 'FIPS 140-2': 3}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.
    • The report_filename property was set to crp249.pdf.
    • The st_filename property was set to lfs_t536_st.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP249.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 09.06.2024 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.stonesoft.com/.
  • 03.06.2024 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60', 'txt_hash': 'd3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f', 'txt_hash': '4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'CA': {'1 1 2': 1, '4 8 7': 1, '1 5-7': 1, '4 8 9': 1, '4 8 10': 1, '4 8 11': 1, '4 8 12': 1, '4 8 13': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2010-03-23', 'maintenance_title': 'Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f.
    • The st_txt_hash property was set to 4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.
    • The st_filename property was set to lfs_t536_st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f.
    • The st_txt_hash property was set to 4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.
    • The st_filename property was set to lfs_t536_st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp249.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 11}}}} data.
    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 70}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'crp249.pdf', 'st_filename': 'lfs_t536_st.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'UK': {'__update__': {'CRP249': 2}}}}, 'cc_sfr': {'FAU': {'FAU_STG': 2}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 1}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}}}}}} data.
    • The st_keywords property was updated, with the {'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG': 13, 'FAU_STG.4': 1}}, 'FCS': {'__insert__': {'FCS_COP': 33, 'FCS_CKM': 18}}, 'FDP': {'__update__': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UIT.1': 6, 'FDP_IFF.1.5': 5}}, 'FMT': {'__update__': {'FMT_SMF.1': 8, 'FMT_SMR.1': 8}}}}, 'cc_claims': {'__update__': {'O': {'__insert__': {'O.E': 41}, '__delete__': ['O.E.AUDIT_SUPPORT', 'O.E.AUDITMAN', 'O.E.MEDIAT_SUPPORT', 'O.E.USER_AUTH', 'O.E.ADMIN_ACCESS', 'O.E.ADMINTRUSTED', 'O.E.MODEXP', 'O.E.OPERATING_ENVIRONMENT', 'O.E.SHAREDSECRETKEY']}, 'T': {'__delete__': ['T']}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 14}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}}, '3DES': {'__update__': {'3DES': 15}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 9}}}}}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 2}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 2}}}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 3}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 2401': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}, '__delete__': ['ion of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2010-03-23', 'maintenance_title': 'Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP249': 46}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}}, 'IKE': {'IKE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 2, 'FIPS 140-2': 3}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 13, 'FDP_IFF.1': 10, 'FDP_UCT.1': 7, 'FDP_UIT.1': 7, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 4, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 10, 'FMT_SMR.1': 10, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 9, 'O.E.AUDIT_SUPPORT': 6, 'O.E.AUDITMAN': 4, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.E.MEDIAT_SUPPORT': 6, 'O.E.USER_AUTH': 4, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10, 'O.E.ADMIN_ACCESS': 4, 'O.E.ADMINTRUSTED': 2, 'O.E.MODEXP': 2, 'O.E.OPERATING_ENVIRONMENT': 2, 'O.E.SHAREDSECRETKEY': 2}, 'T': {'T': 3, 'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 21}, '3DES': {'3DES': 16}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 19}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2, 'RFC 2401': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ion of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60', 'st_pdf_hash': '9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f', 'report_txt_hash': 'd3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3', 'st_txt_hash': '4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1, 'MD5': 1}, 'rules_crypto_schemes': {'Key Exchange': 2, 'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 16, '3DES': 16, 'DES': 5, 'HMAC': 1}, 'rules_asymmetric_crypto': {'Diffie-Hellman': 13, 'DH': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 19}, 'rules_crypto_schemes': {'MAC': 1, 'Key Exchange': 5, 'SSL': 3, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 5}, 'rules_side_channels': {'malfunction': 3}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': '', 'cert_item': '• confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 © Crown Copyright 2009 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 – StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report', 'developer': 'Stonesoft Corporation', 'cert_lab': ''}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name StoneGate Firewall/VPN was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "d670b489e240783a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-03-23",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf",
        "maintenance_title": "Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1"
      }
    ]
  },
  "manufacturer": "Stonesoft Corporation",
  "manufacturer_web": "https://www.stonesoft.com/",
  "name": "StoneGate Firewall/VPN",
  "not_valid_after": "2014-03-13",
  "not_valid_before": "2009-03-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/crp249.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}