Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapted (SPA), incluiding VLAN Separation

CSV information

Status archived
Valid from 31.05.2008
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer Cisco Systems, Inc.
Category Network and Network-Related Devices and Systems
Security level EAL4+, ALC_FLR.1
Maintenance updates Cisco IOS IPSEC on the Integrated Services Routers, VPN Services Module (VPNSM), and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation, with the following Cisco IOS releases: Cisco IOS 12.4(15)T10 and Cisco IOS 12.2(18)SXF16 (11.12.2009) Certification report

Heuristics summary

Certificate ID: CCEVS-VR-VID-10116-2008

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, MD5
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, TLS, IKE, VPN

Vendor
Cisco, Cisco Systems

Security level
EAL4, EAL 4, EAL 4 augmented
Claims
A.PSK
Security Assurance Requirements (SAR)
ALC_FLR.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1
Certificates
CCEVS-VR-VID10116-2008

Side-channel analysis
SPA

File metadata

Title Validation Report: Cisco IOS-IPSec
Author cisco
Creation date D:20080702065739-04'00'
Modification date D:20080703073130-04'00'
Pages 37
Creator Acrobat PDFMaker 7.0 for Word
Producer Acrobat Distiller 7.0 (Windows)

Frontpage

Certificate ID CCEVS-VR-VID10116-2008
Certified item Cisco IOS-IPSEC on the Integrated Service Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN separation
Certification lab US NIAP

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC
Asymmetric Algorithms
Diffie-Hellman, DSA
Hash functions
SHA-1, MD5
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, IKE, VPN

Vendor
Cisco Systems, Inc, Cisco, Cisco Systems

Security level
EAL 4, EAL4, EAL 4 augmented
Claims
O.AUTHENTICITY, O.CONFIDENTIALITY, O.INTEGRITY, O.KEY-, O.NOREPLAY, O.SECURE-OPERATION, T.ATTACK, T.UNTRUSTED-PATH, A.PSK, A.PHYSEC, A.NOEVIL, A.TRAINING, A.TRUSTED-CA, OE.VPN
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_SCP.2, ACM_CAP.4, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_IMP.1, ADV_RCR.1, ADV_SPM.1, ADV_HLD.2, ADV_LLD.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_TAT.1, ALC_LCD.1, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, AVA_MSU.2, AVA_VLA.2, AVA_SOF.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1, FAU_SAR.1.2, FCO_NRO.2, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_IFF.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_UCT.1, FDP_UIT.1, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.2.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UAU, FIA_UID, FIA_GEN.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA, FPT_STM.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_AMT.1, FPT_AMT.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_TSE.1, FTA_TSE.1.1, FTP_RTC.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_RTC.1.1, FTP_RTC.1.2, FTP_RTC.1.3, FTP_RVM.1, FTP_SEP.1, FTP_MTD.1

Side-channel analysis
SPA

Standards
FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 140-1, PKCS #1, PKCS #3, PKCS#1, PKCS#7, RFC 2404, RFC 2403

File metadata

Title IOSIPSEC-EAL4-ST-v1-0-0213008.fm
Author rick west
Creation date D:20080626110350-04'00'
Modification date D:20080703073143-04'00'
Pages 70
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 8.1.0 (Windows)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-10116-2008

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2

Scheme data

Product Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation
Id CCEVS-VR-VID10116
Url https://www.niap-ccevs.org/products/10116
Api Url https://www.niap-ccevs.org/api/project/product/pcl_products/10116/
Certification Date 31.05.2008
Expiration Date None
Category Network Switch
Categories ['Network Switch', ' Router']
Vendor Cisco Systems, Inc.
Evaluation Facility Arca CCTL
Scheme US

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c2f780306682eb16",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-10116-2008",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "api_url": "https://www.niap-ccevs.org/api/project/product/pcl_products/10116/",
      "categories": [
        "Network Switch",
        " Router"
      ],
      "category": "Network Switch",
      "certification_date": "2008-05-31",
      "evaluation_facility": "Arca CCTL",
      "expiration_date": null,
      "id": "CCEVS-VR-VID10116",
      "product": "Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation",
      "scheme": "US",
      "url": "https://www.niap-ccevs.org/products/10116",
      "vendor": "Cisco Systems, Inc."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2009-12-11",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-add1.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Cisco IOS IPSEC on the Integrated Services Routers, VPN Services Module (VPNSM), and IPSec VPN Shared Port Adapter (SPA), including VLAN Separation, with the following Cisco IOS releases: Cisco IOS 12.4(15)T10 and Cisco IOS 12.2(18)SXF16"
      }
    ]
  },
  "manufacturer": "Cisco Systems, Inc.",
  "manufacturer_web": "https://www.cisco.com",
  "name": "Cisco IOS IPSec on the Integrated Services Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapted (SPA), incluiding VLAN Separation",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2008-05-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "st_vid10116-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID10116-2008",
        "cert_item": "Cisco IOS-IPSEC on the Integrated Service Routers, VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter (SPA), including VLAN separation",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10116-2008": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.PSK": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_SAR.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 28
        },
        "SSH": {
          "SSH": 6
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 39
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "SPA": 25
        }
      },
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 112,
          "Cisco Systems": 13
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "cisco",
      "/CreationDate": "D:20080702065739-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0 for Word",
      "/ModDate": "D:20080703073130-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0 (Windows)",
      "/SourceModified": "D:20080626164649",
      "/Title": "Validation Report: Cisco IOS-IPSec",
      "pdf_file_size_bytes": 380308,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_book09186a0080087df1.html",
          "http://www.cisco.com/en/US/products/hw/routers/ps368/products_configuration_guide_book09186a00801d4269.html",
          "http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/ffun_c/index.htm",
          "http://www.ietf.org/internet-drafts/draft-ietf-secsh-architecture-21.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 37
    },
    "st_filename": "st_vid10116-st.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 10
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NOEVIL": 1,
          "A.PHYSEC": 1,
          "A.PSK": 3,
          "A.TRAINING": 1,
          "A.TRUSTED-CA": 1
        },
        "O": {
          "O.AUTHENTICITY": 1,
          "O.CONFIDENTIALITY": 1,
          "O.INTEGRITY": 1,
          "O.KEY-": 1,
          "O.NOREPLAY": 1,
          "O.SECURE-OPERATION": 2
        },
        "OE": {
          "OE.VPN": 6
        },
        "T": {
          "T.ATTACK": 1,
          "T.UNTRUSTED-PATH": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 3,
          "ACM_CAP.4": 2,
          "ACM_SCP.2": 3
        },
        "ADO": {
          "ADO_DEL.2": 3,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.2": 5,
          "ADV_HLD.2": 2,
          "ADV_IMP.1": 3,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 5,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.1": 3,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 3
        },
        "ATE": {
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.2": 3,
          "AVA_SOF.1": 2,
          "AVA_VLA.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 4 augmented": 1,
          "EAL4": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 10,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 11,
          "FAU_SAR.1.2": 1
        },
        "FCO": {
          "FCO_NRO.2": 11,
          "FCO_NRO.2.1": 1,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 1
        },
        "FCS": {
          "FCS_CKM.1": 26,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 57,
          "FCS_COP.1.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_IFC.1": 46,
          "FDP_IFC.1.1": 3,
          "FDP_IFF.1": 48,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 3,
          "FDP_IFF.1.4": 3,
          "FDP_IFF.1.5": 3,
          "FDP_IFF.1.6": 3,
          "FDP_UCT.1": 13,
          "FDP_UCT.1.1": 2,
          "FDP_UIT.1": 17,
          "FDP_UIT.1.1": 2,
          "FDP_UIT.1.2": 2
        },
        "FIA": {
          "FIA_GEN.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.2": 13,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 13,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.2": 20,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 2,
          "FMT_MSA.1": 40,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.2": 32,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 32,
          "FMT_MSA.3.1": 3,
          "FMT_MSA.3.2": 3,
          "FMT_MTD.1": 22,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 17,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 13,
          "FPT_AMT.1.1": 1,
          "FPT_RVM.1": 9,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 9,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 11,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_TSE.1": 10,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 37,
          "FTP_ITC.1.1": 3,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 3,
          "FTP_MTD.1": 1,
          "FTP_RTC.1": 12,
          "FTP_RTC.1.1": 1,
          "FTP_RTC.1.2": 1,
          "FTP_RTC.1.3": 1,
          "FTP_RVM.1": 1,
          "FTP_SEP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 53
        },
        "SSH": {
          "SSH": 15
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          }
        },
        "VPN": {
          "VPN": 124
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 7
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 7
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 6
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "SPA": 32
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 46-3": 2,
          "FIPS PUB 140-1": 1,
          "FIPS PUB 46-3": 3
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS #3": 1,
          "PKCS#1": 1,
          "PKCS#7": 1
        },
        "RFC": {
          "RFC 2403": 1,
          "RFC 2404": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "3DES": 10
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 95,
          "Cisco Systems": 4,
          "Cisco Systems, Inc": 5
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "rick west",
      "/CreationDate": "D:20080626110350-04\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20080703073143-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.1.0 (Windows)",
      "/Title": "IOSIPSEC-EAL4-ST-v1-0-0213008.fm",
      "pdf_file_size_bytes": 410147,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 70
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10116-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "5ab02bbf7bfc3bedd6749a09d726a01b6a9d3b3ef5eec8ec9461e070e9099c55",
      "txt_hash": "1d37f7d9f006e3bcd8a30cbb1b3914d6c1dfd6a81cb2d43e3448095dbee9d8fc"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "edb164a38f2e8c30ab23811430f2f11fadaea82f0beea46dd6341cf555692c32",
      "txt_hash": "241674152124846184234e8aa1bdaa8405a16e41c86e30ea71ea0460b49766bf"
    }
  },
  "status": "archived"
}