Fortigate UTM appliances running FortiOS 5.0 Patch Release 10
CSV information ?
Status | archived |
---|---|
Valid from | 24.03.2015 |
Valid until | 14.04.2020 |
Scheme | 🇨🇦 CA |
Manufacturer | Fortinet, Inc. |
Category | Boundary Protection Devices and Systems |
Security level | |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, 3DES, HMACHash functions
SHA-1Protocols
TLSRandomness
DRBGSecurity Functional Requirements (SFR)
FAU_STG_EXT.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_TLS_EXT.1, FIA_PMG_EXT.1, FIA_UIA_EXT.1, FIA_UAU_EXT.2, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FTA_SSL_EXT.1Certificates
383-4-282-CRStandards
FIPS 46-3, FIPS 197, FIPS 186-2, FIPS 180-2, FIPS 198, FIPS 140-2, SP 800-90A, ISO/IEC 17025:2005File metadata
Title | 383-4-XXX CR vxe |
---|---|
Author | Clark, Cory P. |
Creation date | D:20150601112150-04'00' |
Modification date | D:20150601112150-04'00' |
Pages | 15 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Frontpage
Certificate ID | 383-4-282-CR |
---|---|
Certification lab | CANADA |
Security target ?
Extracted keywords
Symmetric Algorithms
AES-128, AES, AES128, AES256, Triple-DES, 3DES, HMAC, CMACAsymmetric Algorithms
Diffie-Hellman, DHE, DHHash functions
SHA-1, SHA256, SHA-256Schemes
Key AgreementProtocols
SSH, SSL, TLS, TLS 1.0, TLS 1.1, TLS 1.2, IPsec, VPNRandomness
DRBG, RNG, RBGBlock cipher modes
ECB, CBC, CFB, OFBTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHASecurity level
EAL 1Claims
O.PROTECTED_COMMUNICA, O.VERIFIABLE_UPDATES, O.SYSTEM_MONITORING, O.DISPLAY_BANNER, O.TOE_ADMINISTRATION, O.RESIDUAL_INFORMATION_, O.SESSION_LOCK, O.TSF_SELF_TEST, O.ADDRESS_FILTERING, O.PORT_FILTERING, O.STATEFUL_INSPECTION, O.RELATED_CONNECTION_FI, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.NETWORK_DISCLOSURE, T.NETWORK_ACCESS, T.NETWORK_MISUSE, T.NETWORK_DOS, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.TRUSTED_ADMIN, A.CONNECTIONS, OE.NO_GENERAL_PURPOSE, OE.TRUSTED_ADMIN, OE.PHYSICAL, OE.CONNECTIONSSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_STG.1, FAU_STG, FAU_GEN.1, FAU_STG_EXT.1.1, FAU_GEN, FAU_GEN.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM_EXT.4, FCS_TLS_EXT.1, FCS_RBG_EXT.1, FCS_CKM.4, FCS_CKM, FCS_CKM.1, FCS_CKM_EXT.4.1, FCS_COP.1, FCS_TLS_EXT.1.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM.1.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_RIP.2.1, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_UAU.1, FIA_PMG_EXT.1.1, FIA_UAU, FIA_UAU_EXT.2.1, FIA_UID.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU.7, FIA_UAU.7.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FPT_APW_EXT.1, FPT_SKP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_SSP.2, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_SSP.1, FPT_SKP_EXT.1.1, FPT_TST.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM.1, FPT_STM.1.1, FPT_TST_EXT, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Standards
FIPS 140-2, FIPS PUB 140-2, FIPS PUB 197, FIPS PUB 186-2, FIPS PUB 186-3, FIPS 9, FIPS 46-3, FIPS PUB 186-4, FIPS 186-2, FIPS 186-3, NIST SP 800-90B, NIST SP 800-38A, SP 800-90, NIST SP 800-90A, NIST SP 800-56B, SP 800-56B, PKCS#1, RFC 2818, RFC 2346, RFC 4346, RFC 5246, RFC 792, RFC 4443, RFC 791, RFC 2460, RFC 793, RFC 768, RFC 959, RFC 5735, RFC 3513, RFC 4123, RFC 2246File metadata
Title | Security Target |
---|---|
Subject | NDPP-FW based ST Template |
Keywords | FortiOS 5.0, FortiGate, Fortinet, Security Target, ST, NDPP, FW EP, Firewall, Network Device, FortiTRNG |
Author | Shawn Pinet |
Creation date | D:20150414125748-04'00' |
Modification date | D:20150414125748-04'00' |
Pages | 68 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Heuristics ?
Extracted SARs
ADV_FSP.1, ALC_CMS.1, AGD_OPE.1, ASE_CCL.1, ASE_INT.1, AGD_PRE.1, ATE_IND.1, ASE_OBJ.1, ASE_ECD.1, AVA_VAN.1, ALC_CMC.1, ASE_REQ.1, ASE_TSS.1Similar certificates
Name | Certificate ID | |
---|---|---|
FortiGate™ UTM appliances running FortiOS™ 5.0 Patch Release 10 | CCEVS-VR-10642-2016 | Compare |
References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Stateful Traffic Filter Firewall Extended Package for Network Device Protection Profile', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ND_TFFW_EP_V1.0']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Network Devices', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_ND_V1.1']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a3c0ecb874beb4b600d2f2f54afa0157e79c838a14403f16c5e0e3d3eda1cff9', 'txt_hash': '361e357626782d6d5c8785c74bc001cb908cef64eb53ee2a96f2b953c630d007'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '432847c54b72d8b9c1815299fb59e211e8c8fb781f6b57d92a0e7469c09642e1', 'txt_hash': '0e0fb4717e8e53e91f1c7cffd05452b9b285ace6d2e1124bfc77eaac111e5611'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'pdf_hash': '3f1238b8b81297f110f2a4f2b598f2b65b06a4dd4e0ce8cb5c8b7a91b55df8a4'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 465401, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Title': '383-4-XXX CR vxe', '/Author': 'Clark, Cory P.', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150601112150-04'00'", '/ModDate': "D:20150601112150-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1632772, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/Title': 'Security Target', '/Author': 'Shawn Pinet', '/Subject': 'NDPP-FW based ST Template', '/Keywords': 'FortiOS 5.0, FortiGate, Fortinet, Security Target, ST, NDPP, FW EP, Firewall, Network Device, FortiTRNG', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150414125748-04'00'", '/ModDate': "D:20150414125748-04'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://docs.fortinet.com/uploaded/files/800/fortigate-cli-50.pdf', 'http://docs.fortinet.com/', 'https://support.fortinet.com/', 'http://kb.fortinet.com/kb/microsites/msbrowse.do', 'http://docs.fortinet.com/uploaded/files/801/log-message-reference-510.pdf', 'http://docs.fortinet.com/d/fortianalyzer-5.0.9-administration-guide', 'https://kb.fortinet.com/', 'http://docs.fortinet.com/uploaded/files/1095/fortios-handbook-50.pdf', 'http://docs.fortinet.com/uploaded/files/2314/fips-cc.pdf']}}
. - The report_frontpage property was set to
{'CA': {'cert_id': '383-4-282-CR', 'cert_lab': 'CANADA'}}
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-282-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {'FAU': {'FAU_STG_EXT.1': 1}, 'FCS': {'FCS_CKM_EXT.4': 1, 'FCS_RBG_EXT.1': 1, 'FCS_TLS_EXT.1': 1}, 'FIA': {'FIA_PMG_EXT.1': 1, 'FIA_UIA_EXT.1': 1, 'FIA_UAU_EXT.2': 1}, 'FPT': {'FPT_SKP_EXT.1': 1, 'FPT_APW_EXT.1': 1, 'FPT_TUD_EXT.1': 1, 'FPT_TST_EXT.1': 1}, 'FTA': {'FTA_SSL_EXT.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'Triple-DES': 1, '3DES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {'PRNG': {'DRBG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 46-3': 1, 'FIPS 197': 1, 'FIPS 186-2': 1, 'FIPS 180-2': 1, 'FIPS 198': 1, 'FIPS 140-2': 2}, 'NIST': {'SP 800-90A': 1}, 'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 1': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT.1': 10, 'FAU_STG.1': 1, 'FAU_STG': 1, 'FAU_GEN.1': 5, 'FAU_STG_EXT.1.1': 2, 'FAU_GEN': 7, 'FAU_GEN.2': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_CKM_EXT.4': 17, 'FCS_TLS_EXT.1': 14, 'FCS_RBG_EXT.1': 12, 'FCS_CKM.4': 6, 'FCS_CKM': 1, 'FCS_CKM.1': 17, 'FCS_CKM_EXT.4.1': 2, 'FCS_COP.1': 31, 'FCS_TLS_EXT.1.1': 2, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 4}, 'FDP': {'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_RIP.2': 4, 'FDP_RIP.2.1': 1}, 'FIA': {'FIA_PMG_EXT.1': 10, 'FIA_UAU_EXT.2': 10, 'FIA_UIA_EXT.1': 15, 'FIA_UAU.1': 6, 'FIA_PMG_EXT.1.1': 2, 'FIA_UAU': 1, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.1': 6, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU.7': 4, 'FIA_UAU.7.1': 1}, 'FMT': {'FMT_MTD.1': 4, 'FMT_SMF.1': 5, 'FMT_SMR.2': 4, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1}, 'FPT': {'FPT_APW_EXT.1': 10, 'FPT_SKP_EXT.1': 10, 'FPT_TST_EXT.1': 9, 'FPT_TUD_EXT.1': 7, 'FPT_SSP.2': 1, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_SSP.1': 1, 'FPT_SKP_EXT.1.1': 2, 'FPT_TST.1': 1, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM.1': 5, 'FPT_STM.1.1': 1, 'FPT_TST_EXT': 1}, 'FTA': {'FTA_SSL_EXT.1': 10, 'FTA_TAB.1': 9, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3': 3, 'FTA_SSL.4': 4, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICA': 1, 'O.VERIFIABLE_UPDATES': 1, 'O.SYSTEM_MONITORING': 1, 'O.DISPLAY_BANNER': 1, 'O.TOE_ADMINISTRATION': 1, 'O.RESIDUAL_INFORMATION_': 1, 'O.SESSION_LOCK': 1, 'O.TSF_SELF_TEST': 1, 'O.ADDRESS_FILTERING': 1, 'O.PORT_FILTERING': 1, 'O.STATEFUL_INSPECTION': 1, 'O.RELATED_CONNECTION_FI': 1}, 'T': {'T.ADMIN_ERROR': 1, 'T.TSF_FAILURE': 1, 'T.UNDETECTED_ACTIONS': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNAUTHORIZED_UPDATE': 1, 'T.USER_DATA_REUSE': 1, 'T.NETWORK_DISCLOSURE': 1, 'T.NETWORK_ACCESS': 1, 'T.NETWORK_MISUSE': 1, 'T.NETWORK_DOS': 1}, 'A': {'A.NO_GENERAL_PURPOSE': 1, 'A.PHYSICAL': 1, 'A.TRUSTED_ADMIN': 1, 'A.CONNECTIONS': 1}, 'OE': {'OE.NO_GENERAL_PURPOSE': 1, 'OE.TRUSTED_ADMIN': 1, 'OE.PHYSICAL': 1, 'OE.CONNECTIONS': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-128': 3, 'AES': 21, 'AES128': 1, 'AES256': 1}}, 'DES': {'3DES': {'Triple-DES': 5, '3DES': 1}}, 'constructions': {'MAC': {'HMAC': 12, 'CMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 4, 'DHE': 1, 'DH': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 12}, 'SHA2': {'SHA256': 9, 'SHA-256': 2}}}, 'crypto_scheme': {'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 5}, 'TLS': {'TLS': 31, 'TLS 1.0': 7, 'TLS 1.1': 2, 'TLS 1.2': 2}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 1}}, 'randomness': {'PRNG': {'DRBG': 8}, 'RNG': {'RNG': 2, 'RBG': 5}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 11}, 'CFB': {'CFB': 1}, 'OFB': {'OFB': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 3, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 3, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 7, 'FIPS PUB 140-2': 2, 'FIPS PUB 197': 6, 'FIPS PUB 186-2': 1, 'FIPS PUB 186-3': 1, 'FIPS 9': 1, 'FIPS 46-3': 5, 'FIPS PUB 186-4': 8, 'FIPS 186-2': 1, 'FIPS 186-3': 1}, 'NIST': {'NIST SP 800-90B': 1, 'NIST SP 800-38A': 1, 'SP 800-90': 1, 'NIST SP 800-90A': 1, 'NIST SP 800-56B': 1, 'SP 800-56B': 1}, 'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 2818': 2, 'RFC 2346': 2, 'RFC 4346': 3, 'RFC 5246': 2, 'RFC 792': 3, 'RFC 4443': 3, 'RFC 791': 3, 'RFC 2460': 3, 'RFC 793': 3, 'RFC 768': 3, 'RFC 959': 2, 'RFC 5735': 3, 'RFC 3513': 3, 'RFC 4123': 1, 'RFC 2246': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
383-4-282 CR v1.0e.pdf
. - The st_filename property was set to
383-4-282 ST v1.7.pdf
. - The cert_filename property was set to
383-4-282 CT v0.1e.docx
.
The computed heuristics were updated.
- The cert_lab property was set to
['CANADA']
. - The cert_id property was set to
383-4-282
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}
.
- The report property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'pdf_hash': None}
data.
The PDF extraction data was updated.
- The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The cert property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-282%20CR%20v1.0e.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-282%20ST%20v1.7.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Fortigate UTM appliances running FortiOS 5.0 Patch Release 10 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-282%20CT%20v0.1e.docx",
"dgst": "b87e3266749e8593",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "383-4-282",
"cert_lab": [
"CANADA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Fortinet, Inc.",
"manufacturer_web": "https://www.fortinet.com/",
"name": "Fortigate UTM appliances running FortiOS 5.0 Patch Release 10",
"not_valid_after": "2020-04-14",
"not_valid_before": "2015-03-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "383-4-282 CT v0.1e.docx",
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "383-4-282 CR v1.0e.pdf",
"report_frontpage": {
"CA": {
"cert_id": "383-4-282-CR",
"cert_lab": "CANADA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"CA": {
"383-4-282-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_STG_EXT.1": 1
},
"FCS": {
"FCS_CKM_EXT.4": 1,
"FCS_RBG_EXT.1": 1,
"FCS_TLS_EXT.1": 1
},
"FIA": {
"FIA_PMG_EXT.1": 1,
"FIA_UAU_EXT.2": 1,
"FIA_UIA_EXT.1": 1
},
"FPT": {
"FPT_APW_EXT.1": 1,
"FPT_SKP_EXT.1": 1,
"FPT_TST_EXT.1": 1,
"FPT_TUD_EXT.1": 1
},
"FTA": {
"FTA_SSL_EXT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS 180-2": 1,
"FIPS 186-2": 1,
"FIPS 197": 1,
"FIPS 198": 1,
"FIPS 46-3": 1
},
"ISO": {
"ISO/IEC 17025:2005": 1
},
"NIST": {
"SP 800-90A": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Clark, Cory P.",
"/CreationDate": "D:20150601112150-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20150601112150-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "383-4-XXX CR vxe",
"pdf_file_size_bytes": 465401,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "383-4-282 ST v1.7.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 5,
"DHE": 1,
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 1,
"A.NO_GENERAL_PURPOSE": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_ADMIN": 1
},
"O": {
"O.ADDRESS_FILTERING": 1,
"O.DISPLAY_BANNER": 1,
"O.PORT_FILTERING": 1,
"O.PROTECTED_COMMUNICA": 1,
"O.RELATED_CONNECTION_FI": 1,
"O.RESIDUAL_INFORMATION_": 1,
"O.SESSION_LOCK": 1,
"O.STATEFUL_INSPECTION": 1,
"O.SYSTEM_MONITORING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1
},
"OE": {
"OE.CONNECTIONS": 1,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_ADMIN": 1
},
"T": {
"T.ADMIN_ERROR": 1,
"T.NETWORK_ACCESS": 1,
"T.NETWORK_DISCLOSURE": 1,
"T.NETWORK_DOS": 1,
"T.NETWORK_MISUSE": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 7,
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 1,
"FAU_STG_EXT.1": 10,
"FAU_STG_EXT.1.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 17,
"FCS_CKM.1.1": 1,
"FCS_CKM.4": 6,
"FCS_CKM_EXT.4": 17,
"FCS_CKM_EXT.4.1": 2,
"FCS_COP.1": 31,
"FCS_COP.1.1": 4,
"FCS_RBG_EXT.1": 12,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_TLS_EXT.1": 14,
"FCS_TLS_EXT.1.1": 2
},
"FDP": {
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP.2": 4,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PMG_EXT.1": 10,
"FIA_PMG_EXT.1.1": 2,
"FIA_UAU": 1,
"FIA_UAU.1": 6,
"FIA_UAU.7": 4,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2": 10,
"FIA_UAU_EXT.2.1": 2,
"FIA_UIA_EXT.1": 15,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 6
},
"FMT": {
"FMT_MTD.1": 4,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 1,
"FMT_SMR.2": 4,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_APW_EXT.1": 10,
"FPT_APW_EXT.1.1": 2,
"FPT_APW_EXT.1.2": 2,
"FPT_SKP_EXT.1": 10,
"FPT_SKP_EXT.1.1": 2,
"FPT_SSP.1": 1,
"FPT_SSP.2": 1,
"FPT_STM.1": 5,
"FPT_STM.1.1": 1,
"FPT_TST.1": 1,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 9,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD_EXT.1": 7,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.3": 3,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 4,
"FTA_SSL.4.1": 1,
"FTA_SSL_EXT.1": 10,
"FTA_SSL_EXT.1.1": 2,
"FTA_TAB.1": 9,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 6,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 11
},
"CFB": {
"CFB": 1
},
"ECB": {
"ECB": 1
},
"OFB": {
"OFB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 2
},
"TLS": {
"SSL": {
"SSL": 5
},
"TLS": {
"TLS": 31,
"TLS 1.0": 7,
"TLS 1.1": 2,
"TLS 1.2": 2
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 12
},
"SHA2": {
"SHA-256": 2,
"SHA256": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 8
},
"RNG": {
"RBG": 5,
"RNG": 2
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 7,
"FIPS 186-2": 1,
"FIPS 186-3": 1,
"FIPS 46-3": 5,
"FIPS 9": 1,
"FIPS PUB 140-2": 2,
"FIPS PUB 186-2": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 186-4": 8,
"FIPS PUB 197": 6
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-56B": 1,
"NIST SP 800-90A": 1,
"NIST SP 800-90B": 1,
"SP 800-56B": 1,
"SP 800-90": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 2246": 2,
"RFC 2346": 2,
"RFC 2460": 3,
"RFC 2818": 2,
"RFC 3513": 3,
"RFC 4123": 1,
"RFC 4346": 3,
"RFC 4443": 3,
"RFC 5246": 2,
"RFC 5735": 3,
"RFC 768": 3,
"RFC 791": 3,
"RFC 792": 3,
"RFC 793": 3,
"RFC 959": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21,
"AES-128": 3,
"AES128": 1,
"AES256": 1
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 5
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 12
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 3,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 3,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Shawn Pinet",
"/CreationDate": "D:20150414125748-04\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "FortiOS 5.0, FortiGate, Fortinet, Security Target, ST, NDPP, FW EP, Firewall, Network Device, FortiTRNG",
"/ModDate": "D:20150414125748-04\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "NDPP-FW based ST Template",
"/Title": "Security Target",
"pdf_file_size_bytes": 1632772,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://docs.fortinet.com/uploaded/files/1095/fortios-handbook-50.pdf",
"http://docs.fortinet.com/uploaded/files/2314/fips-cc.pdf",
"http://docs.fortinet.com/uploaded/files/801/log-message-reference-510.pdf",
"http://docs.fortinet.com/uploaded/files/800/fortigate-cli-50.pdf",
"http://docs.fortinet.com/",
"https://kb.fortinet.com/",
"http://kb.fortinet.com/kb/microsites/msbrowse.do",
"https://support.fortinet.com/",
"http://docs.fortinet.com/d/fortianalyzer-5.0.9-administration-guide"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 68
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": {
"_type": "Set",
"elements": [
"PP_ND_TFFW_EP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf",
"pp_name": "Stateful Traffic Filter Firewall Extended Package for Network Device Protection Profile"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": {
"_type": "Set",
"elements": [
"PP_ND_V1.1"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_nd_v1.1.pdf",
"pp_name": "Protection Profile for Network Devices"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-282%20CR%20v1.0e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": []
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-282%20ST%20v1.7.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "3f1238b8b81297f110f2a4f2b598f2b65b06a4dd4e0ce8cb5c8b7a91b55df8a4",
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a3c0ecb874beb4b600d2f2f54afa0157e79c838a14403f16c5e0e3d3eda1cff9",
"txt_hash": "361e357626782d6d5c8785c74bc001cb908cef64eb53ee2a96f2b953c630d007"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "432847c54b72d8b9c1815299fb59e211e8c8fb781f6b57d92a0e7469c09642e1",
"txt_hash": "0e0fb4717e8e53e91f1c7cffd05452b9b285ace6d2e1124bfc77eaac111e5611"
}
},
"status": "archived"
}