BULL Trustway VPN Appliance v3.01.06

CSV information

Status archived
Valid from 21.09.2004
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer BULL S.A.
Category Network and Network-Related Devices and Systems
Security level ADV_LLD.1, ADV_IMP.1, AVA_VLA.2, ADV_HLD.2, EAL2+, ALC_FLR.3, ALC_DVS.1, ALC_TAT.1, AVA_MSU.1

Heuristics summary

Certificate ID: ANSSI-CC-2004/30

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
DES
Protocols
VPN

Security level
EAL7, EAL4, EAL21, EAL1, EAL3, EAL5, ITSEC E6 et
Security Assurance Requirements (SAR)
ACM_CAP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.1, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_HLD.2, ADV_LLD, ADV_IMP, ADV_FSP.1, ADV_RCR.1, ADV_FSP, ADV_HLD, ADV_INT, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR, ALC_DVS.1, ALC_TAT.1, ALC_FLR.3, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.1, AVA_VLA.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_SAA.1, FAU_SAR.1, FAU_STG.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_UCT.1, FDP_UIT.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMR.1, FPT_STM.1, FPT_TST.1, FTP_TRP.1
Certificates
Rapport de certification 2004/30

Standards
ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Rapport de certification 2004/30
Subject BULL Trustway VPN Appliance v3.01.06
Keywords CER/F/07.3
Author DCSSI
Creation date D:20040921140208+02'00'
Modification date D:20040921140243+03'00'
Pages 23
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0 (Windows)

Security target

Extracted keywords

Symmetric Algorithms
DES, 3DES, TDES, HMAC
Hash functions
MD5
Protocols
VPN
Block cipher modes
CBC

Security level
EAL2, EAL 2, EAL 2 augmented
Claims
O.DEFAULT_SECURITY_POLICY, O.CONFIDENTIALITY_EXCHANGED_USER_DATA, O.CONFIDENTIALITY_INTERNAL_USER_DATA, O.INTEGRITY_EXCHANGED_USER_DATA, O.AUTHENTICATION_USER_DATA, O.HANDLE, O.CONFIGURATION_PROTECTION, O.KEY_PROTECTION, O.SECURE_ADMINISTRATIVE_DIALOG, O.TRIPWIRE, O.AUDIT, O.INTEGRITY_USER_DATA, T.DEFAULT_CONFIGURATION, T.EXCHANGED_USER_DATA_DISCLOSURE, T.INTERNAL_USER_DATA_DISCLOSURE, T.USER_DATA_FORGERY, T.FALSE_FRAME_INJECTION, T.USER_ADDRESS_DISCLOSURE, T.KEYS_DISCLOSURE, T.KEYS_FORGERY, T.SENSITIVE_DATA_DISCLOSURE, T.SENSITIVE_DATA_FORGERY, T.FUNCTIONS_FORGERY, T.AUDIT, T.DEFAULT_SECURITY_POLICY, A.CONFIGURATION, A.NO_EVIL, A.CRYPTOGRAPHIC_DEVICE, R.KEYS, OE.CONFIGURATION, OE.NO_EVIL, OE.ADMINISTRATION, OE.KEY_MANAGEMENT, OE.INTEGRITY_FUNCTIONS
Security Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_HLD.2, ADV_LLD.1, ADV_IMP.1, ADV_FSP.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_TAT.1, ATE_COV.1, ATE_IND.2, ATE_FUN.1, AVA_MSU.1, AVA_VLA.2, AVA_SOF.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_SAA.1, FAU_SAR.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_RIP.1.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.2, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_UAU, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_TST.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TRP.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Standards
FIPS PUB 186-2, FIPS140-2, RFC 2451, RFC 2404, RFC2406

File metadata

Title BULL TRUSTWAY VPN APPLIANCE - ST
Author José Lavancier
Creation date D:20040907142503+02'00'
Modification date D:20040907142535+03'00'
Pages 53
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0 (Windows)

Heuristics

Certificate ID: ANSSI-CC-2004/30

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.1, AVA_SOF.1, AVA_VLA.2

References

No references are available for this certificate.

Updates

  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL2+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to {'product': 'BULL Trustway VPN Appliance v3.01.06', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-vpn-appliance-v30106', 'description': 'La cible d'évaluation est le produit « Trustway Virtual Private Network » en version 3.01.06, de l'offre « Trustway VPN Appliance », développée par BULL. Cette offre repose sur les éléments suivants : -le boîtier TVPN qui réalise le filtrage entre un réseau sécurisé et un réseau ouvert, conformément à une politique de sécurité. -La station d'administration TDM qui permet de défini', 'sponsor': 'Bull SA', 'developer': 'Bull SA', 'cert_id': 'ANSSI-CC-2004/30', 'level': 'EAL2+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/30', 'certification_date': '2004-09-21', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull SA', 'sponsor': 'Bull SA', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_HLD.2, ADV_LLD.1*, ADV_IMP.1*, ALC_DVS.1, ALC_TAT.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2 (*) Dans le cadre d'une qualification standard', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-30fr.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-30fr.pdf'}}.
  • 03.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 27.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BULL Trustway VPN Appliance v3.01.06', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-vpn-appliance-v30106', 'description': 'La cible d'évaluation est le produit « Trustway Virtual Private Network » en version 3.01.06, de l'offre « Trustway VPN Appliance », développée par BULL. Cette offre repose sur les éléments suivants : -le boîtier TVPN qui réalise le filtrage entre un réseau sécurisé et un réseau ouvert, conformément à une politique de sécurité. -La station d'administration TDM qui permet de défini', 'sponsor': 'Bull SA', 'developer': 'Bull SA', 'cert_id': 'ANSSI-CC-2004/30', 'level': 'EAL2+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/30', 'certification_date': '2004-09-21', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull SA', 'sponsor': 'Bull SA', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_HLD.2, ADV_LLD.1*, ADV_IMP.1*, ALC_DVS.1, ALC_TAT.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2 (*) Dans le cadre d'une qualification standard', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-30fr.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-30fr.pdf'}}.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BULL Trustway VPN Appliance v3.01.06', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-vpn-appliance-v30106', 'description': 'La cible d'évaluation est le produit « Trustway Virtual Private Network » en version 3.01.06, de l'offre « Trustway VPN Appliance », développée par BULL. Cette offre repose sur les éléments suivants : -le boîtier TVPN qui réalise le filtrage entre un réseau sécurisé et un réseau ouvert, conformément à une politique de sécurité. -La station d'administration TDM qui permet de défini', 'sponsor': 'Bull SA', 'developer': 'Bull SA', 'cert_id': 'ANSSI-CC-2004/30', 'level': 'EAL2+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/30', 'certification_date': '2004-09-21', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull SA', 'sponsor': 'Bull SA', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_HLD.2, ADV_LLD.1*, ADV_IMP.1*, ALC_DVS.1, ALC_TAT.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2 (*) Dans le cadre d'une qualification standard', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-30fr.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-30fr.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BULL Trustway VPN Appliance v3.01.06', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-vpn-appliance-v30106', 'description': 'La cible d'évaluation est le produit « Trustway Virtual Private Network » en version 3.01.06, de l'offre « Trustway VPN Appliance », développée par BULL. Cette offre repose sur les éléments suivants : -le boîtier TVPN qui réalise le filtrage entre un réseau sécurisé et un réseau ouvert, conformément à une politique de sécurité. -La station d'administration TDM qui permet de défini', 'sponsor': 'Bull SA', 'developer': 'Bull SA', 'cert_id': 'ANSSI-CC-2004/30', 'level': 'EAL2+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/30', 'certification_date': '2004-09-21', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull SA', 'sponsor': 'Bull SA', 'evaluation_facility': 'Oppida', 'level': 'EAL2+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_HLD.2, ADV_LLD.1*, ADV_IMP.1*, ALC_DVS.1, ALC_TAT.1, ALC_FLR.3, AVA_MSU.1, AVA_VLA.2 (*) Dans le cadre d'une qualification standard', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-30fr.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-30fr.pdf'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '61e15049ebdc705e6a3989bfee97028e95dabe3de1bf697db0c1bd1044467e07', 'txt_hash': '97e46e2e92dc4579beec4be5980ac4a2d20e7be96c06cc54f76389fa229624f7'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '549504da294228c71d3487f495803bedf7f3f4bcb11b30ca07afff839d7a5643', 'txt_hash': '08e93007900e497a79570a1b0abb632ff2d87f7d94d3346498054878dffc7b71'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 643757, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 23, '/Author': 'DCSSI', '/CreationDate': "D:20040921140208+02'00'", '/Creator': 'Acrobat PDFMaker 5.0 pour Word', '/Keywords': 'CER/F/07.3', '/ModDate': "D:20040921140243+03'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Subject': 'BULL Trustway VPN Appliance v3.01.06', '/Title': 'Rapport de certification 2004/30', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 459610, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 53, '/Author': 'José Lavancier', '/CreationDate': "D:20040907142503+02'00'", '/Creator': 'Acrobat PDFMaker 5.0 pour Word', '/ModDate': "D:20040907142535+03'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Title': 'BULL TRUSTWAY VPN APPLIANCE - ST', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'Rapport de certification 2004/30': 12}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL7': 2, 'EAL4': 1, 'EAL21': 1, 'EAL1': 1, 'EAL3': 1, 'EAL5': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.1': 3, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_HLD.2': 2, 'ADV_LLD': 3, 'ADV_IMP': 3, 'ADV_FSP.1': 1, 'ADV_RCR.1': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_INT': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_FLR': 2, 'ALC_DVS.1': 4, 'ALC_TAT.1': 2, 'ALC_FLR.3': 2, 'ALC_DVS': 2, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.1': 2, 'AVA_VLA.2': 2, 'AVA_SOF.1': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 2, 'FAU_GEN.1': 2, 'FAU_SAA.1': 2, 'FAU_SAR.1': 2, 'FAU_STG.1': 2}, 'FCS': {'FCS_CKM.1': 2, 'FCS_CKM.2': 2, 'FCS_CKM.4': 2, 'FCS_COP.1': 2}, 'FDP': {'FDP_ACC.2': 2, 'FDP_ACF.1': 2, 'FDP_IFC.1': 2, 'FDP_IFF.1': 2, 'FDP_RIP.1': 2, 'FDP_UCT.1': 2, 'FDP_UIT.1': 2}, 'FIA': {'FIA_AFL.1': 2, 'FIA_ATD.1': 2, 'FIA_UAU.2': 2, 'FIA_UID.2': 2}, 'FMT': {'FMT_MOF.1': 2, 'FMT_MSA.1': 2, 'FMT_MSA.3': 2, 'FMT_MTD.1': 2, 'FMT_MTD.2': 2, 'FMT_SMR.1': 2}, 'FPT': {'FPT_STM.1': 2, 'FPT_TST.1': 2}, 'FTP': {'FTP_TRP.1': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'VPN': {'VPN': 38}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL 2': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 1}, 'ADV': {'ADV_HLD.2': 4, 'ADV_LLD.1': 6, 'ADV_IMP.1': 7, 'ADV_FSP.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 1}, 'ALC': {'ALC_DVS.1': 5, 'ALC_FLR.3': 5, 'ALC_TAT.1': 6}, 'ATE': {'ATE_COV.1': 2, 'ATE_IND.2': 2, 'ATE_FUN.1': 1}, 'AVA': {'AVA_MSU.1': 5, 'AVA_VLA.2': 4, 'AVA_SOF.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 5, 'FAU_GEN.1': 7, 'FAU_SAA.1': 6, 'FAU_SAR.1': 6, 'FAU_STG.1': 6, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 9, 'FCS_CKM.2': 7, 'FCS_CKM.4': 10, 'FCS_COP.1': 10, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 3}, 'FDP': {'FDP_ACC.2': 8, 'FDP_ACF.1': 8, 'FDP_IFC.1': 6, 'FDP_IFF.1': 9, 'FDP_RIP.1': 6, 'FDP_UCT.1': 6, 'FDP_UIT.1': 6, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_RIP.1.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1}, 'FIA': {'FIA_AFL.1': 6, 'FIA_ATD.1': 7, 'FIA_UAU.2': 6, 'FIA_UID.2': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_UAU': 1}, 'FMT': {'FMT_MOF.1': 6, 'FMT_MSA.1': 6, 'FMT_MSA.3': 6, 'FMT_MTD.1': 9, 'FMT_MTD.2': 6, 'FMT_SMR.1': 7, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 7, 'FPT_TST.1': 6, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TRP.1': 1}, 'FTP': {'FTP_TRP.1': 6, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.DEFAULT_SECURITY_POLICY': 4, 'O.CONFIDENTIALITY_EXCHANGED_USER_DATA': 3, 'O.CONFIDENTIALITY_INTERNAL_USER_DATA': 4, 'O.INTEGRITY_EXCHANGED_USER_DATA': 1, 'O.AUTHENTICATION_USER_DATA': 4, 'O.HANDLE': 6, 'O.CONFIGURATION_PROTECTION': 8, 'O.KEY_PROTECTION': 8, 'O.SECURE_ADMINISTRATIVE_DIALOG': 7, 'O.TRIPWIRE': 8, 'O.AUDIT': 5, 'O.INTEGRITY_USER_DATA': 2}, 'T': {'T.DEFAULT_CONFIGURATION': 1, 'T.EXCHANGED_USER_DATA_DISCLOSURE': 1, 'T.INTERNAL_USER_DATA_DISCLOSURE': 1, 'T.USER_DATA_FORGERY': 1, 'T.FALSE_FRAME_INJECTION': 1, 'T.USER_ADDRESS_DISCLOSURE': 1, 'T.KEYS_DISCLOSURE': 1, 'T.KEYS_FORGERY': 1, 'T.SENSITIVE_DATA_DISCLOSURE': 1, 'T.SENSITIVE_DATA_FORGERY': 1, 'T.FUNCTIONS_FORGERY': 1, 'T.AUDIT': 1, 'T.DEFAULT_SECURITY_POLICY': 1}, 'A': {'A.CONFIGURATION': 3, 'A.NO_EVIL': 3, 'A.CRYPTOGRAPHIC_DEVICE': 3}, 'R': {'R.KEYS': 1}, 'OE': {'OE.CONFIGURATION': 3, 'OE.NO_EVIL': 2, 'OE.ADMINISTRATION': 3, 'OE.KEY_MANAGEMENT': 3, 'OE.INTEGRITY_FUNCTIONS': 7}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 5, 'TDES': 2}}, 'constructions': {'MAC': {'HMAC': 7}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {'VPN': {'VPN': 86}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-2': 1, 'FIPS140-2': 1}, 'RFC': {'RFC 2451': 3, 'RFC 2404': 2, 'RFC2406': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 2004_30.pdf.
    • The st_filename property was set to cible2004_30.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2004/30.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_30.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_30.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name BULL Trustway VPN Appliance v3.01.06 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "f6dc07ebf6583dc1",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2004/30",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL2+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.01.06"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "BULL S.A.",
  "manufacturer_web": "https://www.bull.com",
  "name": "BULL Trustway VPN Appliance v3.01.06",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2004-09-21",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2004_30.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "Rapport de certification 2004/30": 12
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_CAP": 1,
          "ACM_CAP.2": 2,
          "ACM_SCP": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.1": 3,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_HLD": 1,
          "ADV_HLD.2": 2,
          "ADV_IMP": 3,
          "ADV_INT": 1,
          "ADV_LLD": 3,
          "ADV_RCR": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.1": 4,
          "ALC_FLR": 2,
          "ALC_FLR.3": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.1": 2,
          "AVA_SOF": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA": 1,
          "AVA_VLA.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL21": 1,
          "EAL3": 1,
          "EAL4": 1,
          "EAL5": 1,
          "EAL7": 2
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 2,
          "FAU_GEN.1": 2,
          "FAU_SAA.1": 2,
          "FAU_SAR.1": 2,
          "FAU_STG.1": 2
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 2,
          "FCS_COP.1": 2
        },
        "FDP": {
          "FDP_ACC.2": 2,
          "FDP_ACF.1": 2,
          "FDP_IFC.1": 2,
          "FDP_IFF.1": 2,
          "FDP_RIP.1": 2,
          "FDP_UCT.1": 2,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 2,
          "FIA_ATD.1": 2,
          "FIA_UAU.2": 2,
          "FIA_UID.2": 2
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 2,
          "FMT_MTD.1": 2,
          "FMT_MTD.2": 2,
          "FMT_SMR.1": 2
        },
        "FPT": {
          "FPT_STM.1": 2,
          "FPT_TST.1": 2
        },
        "FTP": {
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "VPN": {
          "VPN": 38
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "DCSSI",
      "/CreationDate": "D:20040921140208+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/Keywords": "CER/F/07.3",
      "/ModDate": "D:20040921140243+03\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "BULL Trustway VPN Appliance v3.01.06",
      "/Title": "Rapport de certification 2004/30",
      "pdf_file_size_bytes": 643757,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 23
    },
    "st_filename": "cible2004_30.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONFIGURATION": 3,
          "A.CRYPTOGRAPHIC_DEVICE": 3,
          "A.NO_EVIL": 3
        },
        "O": {
          "O.AUDIT": 5,
          "O.AUTHENTICATION_USER_DATA": 4,
          "O.CONFIDENTIALITY_EXCHANGED_USER_DATA": 3,
          "O.CONFIDENTIALITY_INTERNAL_USER_DATA": 4,
          "O.CONFIGURATION_PROTECTION": 8,
          "O.DEFAULT_SECURITY_POLICY": 4,
          "O.HANDLE": 6,
          "O.INTEGRITY_EXCHANGED_USER_DATA": 1,
          "O.INTEGRITY_USER_DATA": 2,
          "O.KEY_PROTECTION": 8,
          "O.SECURE_ADMINISTRATIVE_DIALOG": 7,
          "O.TRIPWIRE": 8
        },
        "OE": {
          "OE.ADMINISTRATION": 3,
          "OE.CONFIGURATION": 3,
          "OE.INTEGRITY_FUNCTIONS": 7,
          "OE.KEY_MANAGEMENT": 3,
          "OE.NO_EVIL": 2
        },
        "R": {
          "R.KEYS": 1
        },
        "T": {
          "T.AUDIT": 1,
          "T.DEFAULT_CONFIGURATION": 1,
          "T.DEFAULT_SECURITY_POLICY": 1,
          "T.EXCHANGED_USER_DATA_DISCLOSURE": 1,
          "T.FALSE_FRAME_INJECTION": 1,
          "T.FUNCTIONS_FORGERY": 1,
          "T.INTERNAL_USER_DATA_DISCLOSURE": 1,
          "T.KEYS_DISCLOSURE": 1,
          "T.KEYS_FORGERY": 1,
          "T.SENSITIVE_DATA_DISCLOSURE": 1,
          "T.SENSITIVE_DATA_FORGERY": 1,
          "T.USER_ADDRESS_DISCLOSURE": 1,
          "T.USER_DATA_FORGERY": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.2": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.2": 4,
          "ADV_IMP.1": 7,
          "ADV_LLD.1": 6,
          "ADV_RCR.1": 2
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 5,
          "ALC_FLR.3": 5,
          "ALC_TAT.1": 6
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.1": 5,
          "AVA_SOF.1": 2,
          "AVA_VLA.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL2": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 5,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAA.1": 6,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 9,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 7,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_ACC.2": 8,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 2,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 6,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 9,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.1.6": 1,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1,
          "FDP_UCT.1": 6,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 6,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 2,
          "FIA_UAU": 1,
          "FIA_UAU.2": 6,
          "FIA_UAU.2.1": 1,
          "FIA_UID.2": 6,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 6,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 9,
          "FMT_MTD.1.1": 2,
          "FMT_MTD.2": 6,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TRP.1": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_TRP.1": 6,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "VPN": {
          "VPN": 86
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS PUB 186-2": 1,
          "FIPS140-2": 1
        },
        "RFC": {
          "RFC 2404": 2,
          "RFC 2451": 3,
          "RFC2406": 2
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 5,
            "TDES": 2
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Jos\u00e9 Lavancier",
      "/CreationDate": "D:20040907142503+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/ModDate": "D:20040907142535+03\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Title": "BULL TRUSTWAY VPN APPLIANCE - ST",
      "pdf_file_size_bytes": 459610,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 53
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_30.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_MSU.1",
      "ALC_DVS.1",
      "ADV_IMP.1",
      "ALC_TAT.1",
      "AVA_VLA.2",
      "ALC_FLR.3",
      "ADV_LLD.1",
      "EAL2+",
      "ADV_HLD.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_30.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "61e15049ebdc705e6a3989bfee97028e95dabe3de1bf697db0c1bd1044467e07",
      "txt_hash": "97e46e2e92dc4579beec4be5980ac4a2d20e7be96c06cc54f76389fa229624f7"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "549504da294228c71d3487f495803bedf7f3f4bcb11b30ca07afff839d7a5643",
      "txt_hash": "08e93007900e497a79570a1b0abb632ff2d87f7d94d3346498054878dffc7b71"
    }
  },
  "status": "archived"
}