This page was not yet optimized for use on mobile
devices.
genugate 10.0 Firewall Software
CSV information
| Status | active |
|---|---|
| Valid from | 22.06.2021 |
| Valid until | 21.06.2026 |
| Scheme | 🇩🇪 DE |
| Manufacturer | genua GmbH |
| Category | Network and Network-Related Devices and Systems |
| Security level | ASE_TSS.2, AVA_VAN.5, EAL4+, ALC_FLR.2 |
| Maintenance updates | genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management) (25.09.2023) Certification report Security target |
Heuristics summary
Certificate ID: BSI-DSZ-CC-1154-2021
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, AVA_VAN.5, ASE_TSS.2Certificates
BSI-DSZ-CC-1154-2021Standards
ISO/IEC 15408, ISO/IEC 18045Certification report
Extracted keywords
Hash functions
SHA-256, SHA-512, SHA256, SHA512, SHA-384Protocols
SSH, SSL, TLS, IPsec, VPNSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmentedClaims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSECSecurity Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, ALC_PAM, AVA_VAN.5, ASE_TSS.2Certificates
BSI-DSZ-CC-1154-2021, BSI-DSZ-CC-1039-2017, BSI-DSZ-CC-01154Evaluation facilities
secuveraCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AISStandards
FIPS PUB 180-4, PKCS#1, AIS 34, AIS 32, AIS 38, RFC 3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
| Title | Zertifizierungsreport BSI-DSZ-CC-1154-2021 |
|---|---|
| Subject | BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH |
| Keywords | "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20210630113008+02'00' |
| Modification date | D:20210701114458+02'00' |
| Pages | 29 |
| Creator | Writer |
| Producer | LibreOffice 6.3 |
Frontpage
| Certificate ID | BSI-DSZ-CC-1154-2021 |
|---|---|
| Certified item | genugate 10.0 Firewall Software |
| Certification lab | BSI |
| Developer | genua GmbH |
References
Outgoing- BSI-DSZ-CC-1039-2017 - archived - genugate 9.0 Firewall Software
Security target
Extracted keywords
Hash functions
SHA-384, SHA-256, SHA-512Protocols
SSH, SSL, TLS, IPsecVendor
MicrosoftSecurity level
EAL4, EAL4 augmentedClaims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.SECFUN, O.MISUSESSH, O.AUDREC, O.ACCOUN, O.AVAIL, O.PATCH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, T.PATCH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.LOCAL, OE.REST, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.OSPF, OE.PASSWDSecurity Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_PAM, ALC_PAM.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_UPD, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP, FCS_COP.1.1, FCS_CKM.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_UPD, FPT_STM.1, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_STM, FPT_STM.1.1, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_ITT.1, FPT_TST.1, FPT_AMT.1Side-channel analysis
side channelCertification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the sameStandards
FIPS PUB 180-4, PKCS#1, RFC 4251, ISO/IEC 18045, CCMB-2017-04-002File metadata
| Title | genugate 10.0 Security Target |
|---|---|
| Subject | Common Criteria certification |
| Keywords | firewall, application level gateway, packet filter |
| Author | genua GmbH |
| Creation date | D:20210616140218+02'00' |
| Modification date | D:20210616140218+02'00' |
| Pages | 81 |
| Creator | LaTeX with hyperref |
| Producer | GPL Ghostscript 9.53.3 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-1154-2021Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_PAM.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154c_pdf.pdf",
"dgst": "b60615a415b67af8",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-1154-2021",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_PAM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1039-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0718-2012",
"BSI-DSZ-CC-0890-2013",
"BSI-DSZ-CC-1039-2017"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-09-25",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154MA01a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154MA01b_pdf.pdf",
"maintenance_title": "genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management)"
}
]
},
"manufacturer": "genua GmbH",
"manufacturer_web": "https://www.genua.de",
"name": "genugate 10.0 Firewall Software",
"not_valid_after": "2026-06-21",
"not_valid_before": "2021-06-22",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "1154c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1154-2021": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.2": 1,
"ALC_PAM.1": 1
},
"ASE": {
"ASE_TSS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "1154a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5",
"cc_version": "Product specific Security Target Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-1154-2021",
"cert_item": "genugate 10.0 Firewall Software",
"cert_lab": "BSI",
"developer": "genua GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-01154": 1,
"BSI-DSZ-CC-1039-2017": 3,
"BSI-DSZ-CC-1154-2021": 15
}
},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.HANET": 2,
"A.LEGACY": 2,
"A.LOCAL": 2,
"A.NOEVIL": 2,
"A.OSPF": 2,
"A.PHYSEC": 2,
"A.POLICY": 3,
"A.REMOTE_AUTH": 2,
"A.REST": 2,
"A.SINGEN": 2,
"A.TIMESTMP": 2,
"A.TRUSTK": 2,
"A.TRUSTU": 2,
"A.USER": 2
},
"OE": {
"OE.PHYSEC": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 3,
"ALC_FLR.2": 4,
"ALC_PAM": 3,
"ALC_PAM.1": 13
},
"ASE": {
"ASE_TSS.2": 5
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 8,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL 5+": 1,
"EAL 6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe M\u00e4rz 2021, Revision": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically \u2022 AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema \u2022 AIS": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 1
},
"SSH": {
"SSH": 5
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"secuvera": {
"secuvera": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2,
"SHA-384": 1,
"SHA-512": 2,
"SHA256": 36,
"SHA512": 36
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 34": 2,
"AIS 38": 1
},
"FIPS": {
"FIPS PUB 180-4": 4
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 2
},
"RFC": {
"RFC 3447": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20210630113008+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\"",
"/ModDate": "D:20210701114458+02\u002700\u0027",
"/Producer": "LibreOffice 6.3",
"/Subject": "BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH",
"/Title": "Zertifizierungsreport BSI-DSZ-CC-1154-2021",
"pdf_file_size_bytes": 637521,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/AIS",
"https://www.sogis.eu/",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/cc/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "1154b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMIN": 2,
"A.HANET": 2,
"A.LEGACY": 2,
"A.LOCAL": 3,
"A.NOEVIL": 2,
"A.OSPF": 2,
"A.PHYSEC": 2,
"A.POLICY": 2,
"A.REMOTE_AUTH": 2,
"A.REST": 2,
"A.SINGEN": 3,
"A.TIMESTMP": 2,
"A.TRUSTK": 2,
"A.TRUSTU": 2,
"A.USER": 2
},
"O": {
"O.ACCOUN": 6,
"O.AUDREC": 17,
"O.AVAIL": 8,
"O.IDAUTH": 15,
"O.MEDIAT": 13,
"O.MISUSESSH": 7,
"O.PATCH": 5,
"O.SECFUN": 22,
"O.SECSTA": 8,
"O.SELPRO": 4
},
"OE": {
"OE.ADMIN": 2,
"OE.HANET": 3,
"OE.LEGACY": 1,
"OE.LOCAL": 1,
"OE.NOEVIL": 1,
"OE.OSPF": 1,
"OE.PASSWD": 3,
"OE.PHYSEC": 2,
"OE.POLICY": 2,
"OE.REMOTE_AUTH": 2,
"OE.REST": 2,
"OE.RTCLOCK": 3,
"OE.SINGEN": 1,
"OE.TIMESTMP": 2,
"OE.TRUSTK": 3,
"OE.TRUSTU": 2,
"OE.USER": 2
},
"T": {
"T.MEDIAT": 2,
"T.MISUSESSH": 2,
"T.NOAUTH": 2,
"T.PATCH": 2,
"T.SELPRO": 2,
"T.SPOOF": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 4,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 3,
"ADV_FSP.4": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 3,
"ADV_INT": 2,
"ADV_SPM": 2,
"ADV_TAT.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 5,
"AGD_PRE": 1,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_DEL": 3,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 2,
"ALC_FLR": 1,
"ALC_FLR.2": 5,
"ALC_LCD": 1,
"ALC_LCD.1": 2,
"ALC_PAM": 32,
"ALC_PAM.1": 48,
"ALC_TAT": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 3,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 1,
"ASE_REQ.1": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 4
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 4,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 6,
"FAU_ARP.1.1": 1,
"FAU_GEN": 33,
"FAU_GEN.1": 16,
"FAU_GEN.2": 1,
"FAU_SAA": 2,
"FAU_SAA.1": 7,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1,
"FAU_SAR": 4,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 6,
"FAU_SAR.3.1": 1,
"FAU_STG": 31,
"FAU_STG.1": 7,
"FAU_STG.4": 2,
"FAU_UPD": 1
},
"FCS": {
"FCS_CKM.4": 2,
"FCS_COP": 2,
"FCS_COP.1": 11,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_IFC": 60,
"FDP_IFC.1": 5,
"FDP_IFF": 52,
"FDP_IFF.1": 25,
"FDP_ITC.1": 2
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL.1": 6,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD": 2,
"FIA_ATD.1": 6,
"FIA_ATD.1.1": 1,
"FIA_SOS": 2,
"FIA_SOS.1": 6,
"FIA_SOS.1.1": 1,
"FIA_UAU": 28,
"FIA_UAU.1": 2,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UAU.3": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 8,
"FIA_UAU.6": 7,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 1,
"FIA_UID": 3,
"FIA_UID.1": 3,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_IFF": 2,
"FMT_MOF": 21,
"FMT_MOF.1": 3,
"FMT_MOF.1.3": 1,
"FMT_MSA": 68,
"FMT_MSA.1": 4,
"FMT_MSA.3": 3,
"FMT_MTD": 15,
"FMT_MTD.1": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 24,
"FMT_SMF.1.1": 1,
"FMT_SMR": 5,
"FMT_SMR.1": 25,
"FMT_SMR.2": 19,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1,
"FMT_SMR.3": 6,
"FMT_SMR.3.1": 1
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_ITT.1": 1,
"FPT_RCV": 2,
"FPT_RCV.2": 6,
"FPT_RCV.2.1": 1,
"FPT_RCV.2.2": 1,
"FPT_SST": 22,
"FPT_STM": 2,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TRC": 3,
"FPT_TRC.1": 5,
"FPT_TRC.1.1": 1,
"FPT_TRC.1.2": 1,
"FPT_TST.1": 2,
"FPT_UPD": 42
}
},
"certification_process": {
"OutOfScope": {
"genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 2
},
"SSH": {
"SSH": 26
},
"TLS": {
"SSL": {
"SSL": 3
},
"TLS": {
"TLS": 5
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 31
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-002": 1
},
"FIPS": {
"FIPS PUB 180-4": 3
},
"ISO": {
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 4251": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "genua GmbH",
"/CreationDate": "D:20210616140218+02\u002700\u0027",
"/Creator": "LaTeX with hyperref",
"/Keywords": "firewall, application level gateway, packet filter",
"/ModDate": "D:20210616140218+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.53.3",
"/Subject": "Common Criteria certification",
"/Title": "genugate 10.0 Security Target",
"pdf_file_size_bytes": 460773,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.openssh.org",
"http://www.ietf.org/rfc/rfc4251.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 81
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ASE_TSS.2",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da",
"txt_hash": "50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005",
"txt_hash": "9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a",
"txt_hash": "9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495"
}
},
"status": "active"
}