This page was not yet optimized for use on mobile devices.
F5 Networks BIG-IP® Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180)
CSV information ?
Status | archived |
---|---|
Valid from | 15.02.2018 |
Valid until | 15.02.2023 |
Scheme | 🇩🇪 DE |
Manufacturer | F5 Networks, Inc. |
Category | Network and Network-Related Devices and Systems |
Security level | EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0975-2018
Certificate ?
Extracted keywords
Security level
EAL 4, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3, ALC_FLRCertificates
BSI-DSZ-CC-0975-2018Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-0975-2017 |
---|---|
Subject | Certificate, Zertifikat |
Keywords | "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20180220161811+01'00' |
Modification date | D:20180220163412+01'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
HMACAsymmetric Algorithms
RSASSAPKCS1-v1_5, ECDH, ECDHE, ECDSA, ECC, DHHash functions
SHA-1, SHA256, SHA-256, SHA-384, SHA384, MD5Schemes
MAC, Key agreementProtocols
SSH, SSL, TLS, TLSv1.2, TLSv1.1, IKE, VPNRandomness
RNGElliptic Curves
P-256, NIST P-256, secp256r1Block cipher modes
CBCSecurity level
EAL 4, EAL 2, EAL 1, EAL4, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_DVS.2, ALC_FLR.1, ALC_FLR.2, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_CKM.1, FIA_AFL, FIA_SOS, FTP_ITC.1, FTP_TRP.1Certificates
BSI-DSZ-CC-0975-2018, BSI-DSZ-CC-0856-2017Evaluation facilities
atsecSide-channel analysis
side channelsVulnerabilities
CVE-2013-0169Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 7, 2018-02-15, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 2017-09-26, CI list for documentation in PerforceStandards
PKCS#1, AIS 20, AIS 32, RFC3447, RFC5246, RFC4346, RFC4492, RFC1321, RFC6151, RFC4253, RFC4252, RFC3526, RFC2104, RFC4251, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0975-2017 |
---|---|
Subject | Certification Report, Zertifizierungsreport |
Keywords | "Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20180220164746+01'00' |
Modification date | D:20180221074413+01'00' |
Pages | 40 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0975-2018 |
---|---|
Certified item | F5 Networks BIG-IP® Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180 |
Certification lab | BSI |
Developer | F5 Networks, Inc |
References
Outgoing- BSI-DSZ-CC-0856-2017 - archived - F5 Networks BIG-IP® Application Delivery Firewall (ADF-Base) version 11.5 HF10
Security target ?
Extracted keywords
Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384Asymmetric Algorithms
RSASSAPKCS1-v1_5, ECDH, ECDHE, ECDSA, ECC, DHE, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA-384, SHA256, SHA384, MD5Schemes
MAC, Key Exchange, Key agreementProtocols
SSH, SSL, TLS, TLS 1.0, TLS 1.1, TLS 1.2, TLSv1.1, TLSv1.2, TLS v1.1, IKE, VPNRandomness
RNG, RBGLibraries
OpenSSLElliptic Curves
P-256, curve P-256, NIST P-256, secp256r1Block cipher modes
CBC, GCMTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384Vendor
MicrosoftSecurity level
EAL4, EAL4 augmentedClaims
O.APM-VPN, O.DISPLAY_BANNER, O.FAILOVER, O.LTM-TRAFFICMGMT, O.PROTECTED_COMMUNICATIONS, O.RESIDUAL_INFORMATION_CLEARING, O.RESOURCE_AVAILABILITY, O.SESSION_LOCK, O.SYSTEM_MONITORING, O.TOE_ADMINISTRATION, O.VERIFIABLE_UPDATES, O.TSF_SELF_TEST, T.ADMIN_ERROR, T.RESOURCE_EXHAUSTION, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.UNDETECTED_ACTIONS, A.PHYSICAL, A.TRUSTED_ADMIN, A.TRAINED_ADMIN, A.CONNECTIONS, A.MGMTNET, A.NO_GENERAL_PURPOSE, A.PEERTRUST, A.KEYS, A.TIME, A.LDAP, A.LOGSERVER, OE.CONNECTIONS, OE.LOGSERVER, OE.MGMTNET, OE.NO_GENERAL_PURPOSE, OE.PEERTRUST, OE.KEYS, OE.TIME, OE.PHYSICAL, OE.TRUSTED_ADMIN, OE.TRAINED_ADMIN, OE.LDAPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_STG_EXT.1, FAU_GEN.1, FAU_GEN.2, FAU_STG_EXT.1.1, FAU_STG, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FCS_CKM_EXT.4, FCS_RBG_EXT.1, FCS_SSH_EXT.1, FCS_TLS_EXT.1, FCS_CKM, FCS_COP.1, FCS_CKM.1, FCS_CKM_EXT.4.1, FCS_CKM.4, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_SSH_EXT.1.1, FCS_SSH_EXT.1.2, FCS_SSH_EXT.1.3, FCS_SSH_EXT.1.4, FCS_SSH_EXT.1.5, FCS_SSH_EXT.1.6, FCS_SSH_EXT.1.7, FCS_TLS_EXT.1.1, FCS_TLS_EXT.1.2, FCS_CKM.1.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FDP_ACC.1, FDP_ACF.1, FDP_IFC, FDP_IFF, FDP_ITC.1, FDP_RIP.2, FDP_UCT.1, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FDP_IFF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.2.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_AFL.1, FIA_ATD.1, FIA_UAU, FIA_UAU.7, FIA_UAU_EXT.2.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UIU_EXT.1, FIA_UAU.5, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_PMG_EXT.1.1, FIA_UAU.7.1, FIA_UID.1, FIA_UAU.1, FIA_AFL, FIA_SOS, FMT_MSA.1, FMT_MSA, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_APW_EXT.1, FPT_SKP_EXT.1, FPT_TST_EXT.1, FPT_TUD_EXT.1, FPT_FLS.1, FPT_TDC.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_APW, FPT_SKP_EXT.1.1, FPT_SKP, FPT_TST_EXT.1.1, FPT_TST_EXT, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD, FPT_FLS.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_STM.1, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL.3, FTA_SSL.4, FTA_TAB.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Evaluation facilities
atsecVulnerabilities
CVE-2017-6164Certification process
out of scope, TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.4.3 Certificate validation For TLS sessions, the TOE implementsStandards
FIPS 140-2, FIPS 186-2, FIPS PUB 186-3, FIPS198-1, FIPS197, PKCS#1, AIS20, RFC 2818, RFC 4253, RFC 2246, RFC 4346, RFC 5246, RFC4346, RFC4253, RFC2818, RFC4251, RFC4252, RFC4254, RFC5246, RFC 2616, RFC2616, RFC5280, RFC3447, RFC4492, RFC1321, RFC6151, RFC5228, RFC3526, RFC2104, X.509File metadata
Title | BIG-IP 11.5.1 HF 10 (build 10.123.180) ADC-AP Security Target (version 1.6 as of 2018-02-12) |
---|---|
Subject | BIG-IP ADC-AP |
Keywords | Security Target, Common Criteria, F5, VPN, Networking |
Author | David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.4) |
Creation date | D:20180213114202Z |
Modification date | D:20180213114202Z |
Pages | 100 |
Creator | Unknown |
Producer | XEP 4.18 build 20100322 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-0975-2018
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_ARC.1, ADV_TDS.3, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ADV_IMP.1, APE_INT.1, ATE_COV.2, ALC_FLR.3, AGD_OPE.1, ALC_DVS.1, APE_CCL.1, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, APE_OBJ.2, APE_SPD.1, ALC_LCD.1, ASE_OBJ.2Similar certificates
References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a1617956afd3a0f59c3a1d3b6829ba2aa7cac7953be291a0d9c9df40a214e722', 'txt_hash': '62abc24454f6602224b121f072cbbc10395667add41b279b4a3ef5086d9dc17a'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ae75f123d39c6cd515459dd2bef3871a7af6bf0cc3a03abd18766b3f8e8e8db8', 'txt_hash': 'c0d4e7e9a0dc898bc12d41436eb66c0b21d7c16d953c5e265fdd108f1c05fb91'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5cbb70be26c3b71c218ca0a5bba3bcc7f2c0d26120d840d51dc52ffd868c46f0', 'txt_hash': '746b061b9f3cf0bd646034759d0ad7cbdeb4e3d1b7d2d7e5449cf4095e4db5f5'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1617148, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180220164746+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10"', '/ModDate': "D:20180221074413+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Certification Report, Zertifizierungsreport', '/Title': 'Certification Report BSI-DSZ-CC-0975-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://support.f5.com/', 'https://askF5.com/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://downloads.f5.com/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.sogisportal.eu/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2959661, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 100, '/Keywords': 'Security Target, Common Criteria, F5, VPN, Networking', '/Subject': 'BIG-IP ADC-AP', '/Title': 'BIG-IP 11.5.1 HF 10 (build 10.123.180) ADC-AP Security Target (version 1.6 as of 2018-02-12)', '/Creator': 'Unknown', '/Author': 'David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.4)', '/Producer': 'XEP 4.18 build 20100322', '/application': 'CCTool version x.y', '/Trapped': '/False', '/CreationDate': 'D:20180213114202Z', '/ModDate': 'D:20180213114202Z', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf', 'http://www.ietf.org/rfc/rfc4492.txt', 'https://devcentral.f5.com/wiki/iRules.Events.ashx', 'http://www.ietf.org/rfc/rfc5246.txt', 'http://www.ietf.org/rfc/rfc5280.txt', 'http://www.ietf.org/rfc/rfc3447.txt', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf', 'http://www.ietf.org/rfc/rfc1321.txt', 'http://tmml.sourceforge.net/doc/tcl/index.html', 'http://www.ietf.org/rfc/rfc5228.txt', 'https://devcentral.f5.com/wiki/iRules.Commands.ashx', 'http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf', 'http://www.ietf.org/rfc/rfc3526.txt', 'http://www.ietf.org/rfc/rfc2104.txt']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 919805, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20180220161811+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10"', '/ModDate': "D:20180220163412+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Certificate, Zertifikat', '/Title': 'Certificate BSI-DSZ-CC-0975-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0975-2018', 'cert_item': 'F5 Networks BIG-IP® Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180', 'developer': 'F5 Networks, Inc', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0975-2018': 21, 'BSI-DSZ-CC-0856-2017': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 9, 'EAL 2': 8, 'EAL 1': 7, 'EAL4': 1, 'EAL 3': 4, 'EAL 5': 6, 'EAL 6': 3, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 4, 'AGD_OPE': 4, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_LCD.1': 1, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN.5': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 1}, 'FIA': {'FIA_AFL': 1, 'FIA_SOS': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {'constructions': {'MAC': {'HMAC': 9}}}, 'asymmetric_crypto': {'RSA': {'RSASSAPKCS1-v1_5': 1}, 'ECC': {'ECDH': {'ECDH': 7, 'ECDHE': 1}, 'ECDSA': {'ECDSA': 13}, 'ECC': {'ECC': 10}}, 'FF': {'DH': {'DH': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 13}, 'SHA2': {'SHA256': 2, 'SHA-256': 7, 'SHA-384': 7, 'SHA384': 1}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 8}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 14, 'TLSv1.2': 7, 'TLSv1.1': 6}}, 'IKE': {'IKE': 1}, 'VPN': {'VPN': 7}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-256': 2, 'NIST P-256': 2, 'secp256r1': 8}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2013-0169': 1}}, 'side_channel_analysis': {'SCA': {'side channels': 1}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 10}, 'BSI': {'AIS 20': 2, 'AIS 32': 1}, 'RFC': {'RFC3447': 10, 'RFC5246': 6, 'RFC4346': 4, 'RFC4492': 6, 'RFC1321': 1, 'RFC6151': 1, 'RFC4253': 4, 'RFC4252': 2, 'RFC3526': 1, 'RFC2104': 1, 'RFC4251': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report, Version 7, 2018-02-15, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 2017-09-26, CI list for documentation in Perforce': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_PRE': 2, 'AGD_OPE': 2, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT.1': 14, 'FAU_GEN.1': 12, 'FAU_GEN.2': 9, 'FAU_STG_EXT.1.1': 2, 'FAU_STG': 1, 'FAU_GEN': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_CKM_EXT.4': 20, 'FCS_RBG_EXT.1': 16, 'FCS_SSH_EXT.1': 15, 'FCS_TLS_EXT.1': 22, 'FCS_CKM': 15, 'FCS_COP.1': 36, 'FCS_CKM.1': 10, 'FCS_CKM_EXT.4.1': 2, 'FCS_CKM.4': 3, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_SSH_EXT.1.1': 2, 'FCS_SSH_EXT.1.2': 2, 'FCS_SSH_EXT.1.3': 2, 'FCS_SSH_EXT.1.4': 2, 'FCS_SSH_EXT.1.5': 2, 'FCS_SSH_EXT.1.6': 2, 'FCS_SSH_EXT.1.7': 2, 'FCS_TLS_EXT.1.1': 2, 'FCS_TLS_EXT.1.2': 2, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 3, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1, 'FCS_CKM.2': 4}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 9, 'FDP_IFC': 7, 'FDP_IFF': 6, 'FDP_ITC.1': 15, 'FDP_RIP.2': 11, 'FDP_UCT.1': 8, 'FDP_UIT.1': 8, 'FDP_ITC.2': 5, 'FDP_IFC.1': 7, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1}, 'FIA': {'FIA_PMG_EXT.1': 14, 'FIA_UAU_EXT.2': 15, 'FIA_UIA_EXT.1': 22, 'FIA_AFL.1': 10, 'FIA_ATD.1': 11, 'FIA_UAU': 19, 'FIA_UAU.7': 10, 'FIA_UAU_EXT.2.1': 2, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UIU_EXT.1': 1, 'FIA_UAU.5': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1': 3, 'FIA_UAU.1': 1, 'FIA_AFL': 1, 'FIA_SOS': 1}, 'FMT': {'FMT_MSA.1': 12, 'FMT_MSA': 17, 'FMT_MTD.1': 9, 'FMT_SMF.1': 12, 'FMT_SMR.1': 14, 'FMT_MSA.3': 9, 'FMT_MSA.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_APW_EXT.1': 13, 'FPT_SKP_EXT.1': 13, 'FPT_TST_EXT.1': 13, 'FPT_TUD_EXT.1': 14, 'FPT_FLS.1': 9, 'FPT_TDC.1': 9, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_APW': 1, 'FPT_SKP_EXT.1.1': 2, 'FPT_SKP': 1, 'FPT_TST_EXT.1.1': 2, 'FPT_TST_EXT': 1, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_TUD': 1, 'FPT_FLS.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_RSA.1': 9, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_SSL.3': 10, 'FTA_SSL.4': 10, 'FTA_TAB.1': 13, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 23, 'FTP_TRP.1': 15, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.APM-VPN': 16, 'O.DISPLAY_BANNER': 5, 'O.FAILOVER': 5, 'O.LTM-TRAFFICMGMT': 13, 'O.PROTECTED_COMMUNICATIONS': 18, 'O.RESIDUAL_INFORMATION_CLEARING': 5, 'O.RESOURCE_AVAILABILITY': 5, 'O.SESSION_LOCK': 6, 'O.SYSTEM_MONITORING': 8, 'O.TOE_ADMINISTRATION': 19, 'O.VERIFIABLE_UPDATES': 5, 'O.TSF_SELF_TEST': 4}, 'T': {'T.ADMIN_ERROR': 5, 'T.RESOURCE_EXHAUSTION': 3, 'T.TSF_FAILURE': 3, 'T.UNAUTHORIZED_ACCESS': 5, 'T.UNAUTHORIZED_UPDATE': 3, 'T.USER_DATA_REUSE': 3, 'T.UNDETECTED_ACTIONS': 1}, 'A': {'A.PHYSICAL': 3, 'A.TRUSTED_ADMIN': 3, 'A.TRAINED_ADMIN': 3, 'A.CONNECTIONS': 3, 'A.MGMTNET': 3, 'A.NO_GENERAL_PURPOSE': 3, 'A.PEERTRUST': 4, 'A.KEYS': 3, 'A.TIME': 3, 'A.LDAP': 3, 'A.LOGSERVER': 2}, 'OE': {'OE.CONNECTIONS': 3, 'OE.LOGSERVER': 3, 'OE.MGMTNET': 3, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PEERTRUST': 3, 'OE.KEYS': 3, 'OE.TIME': 5, 'OE.PHYSICAL': 3, 'OE.TRUSTED_ADMIN': 4, 'OE.TRAINED_ADMIN': 4, 'OE.LDAP': 3}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {'atsec': {'atsec': 99}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'constructions': {'MAC': {'HMAC': 11, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'RSA': {'RSASSAPKCS1-v1_5': 1}, 'ECC': {'ECDH': {'ECDH': 7, 'ECDHE': 1}, 'ECDSA': {'ECDSA': 15}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DHE': 2, 'Diffie-Hellman': 2, 'DH': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 15}, 'SHA2': {'SHA-256': 10, 'SHA-384': 9, 'SHA256': 1, 'SHA384': 1}}, 'MD': {'MD5': {'MD5': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 1}, 'KA': {'Key agreement': 2}}, 'crypto_protocol': {'SSH': {'SSH': 79}, 'TLS': {'SSL': {'SSL': 16}, 'TLS': {'TLS': 96, 'TLS 1.0': 2, 'TLS 1.1': 4, 'TLS 1.2': 4, 'TLSv1.1': 4, 'TLSv1.2': 5, 'TLS v1.1': 1}}, 'IKE': {'IKE': 2}, 'VPN': {'VPN': 22}}, 'randomness': {'RNG': {'RNG': 17, 'RBG': 6}}, 'cipher_mode': {'CBC': {'CBC': 5}, 'GCM': {'GCM': 2}}, 'ecc_curve': {'NIST': {'P-256': 13, 'curve P-256': 1, 'NIST P-256': 10, 'secp256r1': 8}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA256': 1, 'TLS_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDH_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDH_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256': 1, 'TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384': 1, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384': 1, 'TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256': 1, 'TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384': 1}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 14}}, 'vulnerability': {'CVE': {'CVE-2017-6164': 1}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 6, 'FIPS 186-2': 1, 'FIPS PUB 186-3': 3, 'FIPS198-1': 2, 'FIPS197': 2}, 'PKCS': {'PKCS#1': 10}, 'BSI': {'AIS20': 1}, 'RFC': {'RFC 2818': 1, 'RFC 4253': 2, 'RFC 2246': 1, 'RFC 4346': 1, 'RFC 5246': 1, 'RFC4346': 9, 'RFC4253': 9, 'RFC2818': 2, 'RFC4251': 4, 'RFC4252': 5, 'RFC4254': 2, 'RFC5246': 8, 'RFC 2616': 1, 'RFC2616': 2, 'RFC5280': 3, 'RFC3447': 11, 'RFC4492': 7, 'RFC1321': 2, 'RFC6151': 1, 'RFC5228': 2, 'RFC3526': 2, 'RFC2104': 2}, 'X509': {'X.509': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.4.3 Certificate validation For TLS sessions, the TOE implements': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0975-2018': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0975a_pdf.pdf
. - The st_filename property was set to
0975b_pdf.pdf
. - The cert_filename property was set to
0975c_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0975-2018
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0856-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0856-2017']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name F5 Networks BIG-IP® Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975c_pdf.pdf",
"dgst": "582b7ee77ad6041b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0975-2018",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10.123.180",
"11.5.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0856-2017"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0856-2017"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "F5 Networks, Inc.",
"manufacturer_web": "https://www.f5.com/",
"name": "F5 Networks BIG-IP\u00ae Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180)",
"not_valid_after": "2023-02-15",
"not_valid_before": "2018-02-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0975c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0975-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180220161811+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10\"",
"/ModDate": "D:20180220163412+01\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Certificate, Zertifikat",
"/Title": "Certificate BSI-DSZ-CC-0975-2017",
"pdf_file_size_bytes": 919805,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0975a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.3",
"cc_version": "Product specific Security Target Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0975-2018",
"cert_item": "F5 Networks BIG-IP\u00ae Application Delivery Controller (ADC-AP) version 11.5.1 HF10 (build 10.123.180",
"cert_lab": "BSI",
"developer": "F5 Networks, Inc",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "None"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 10
},
"ECDH": {
"ECDH": 7,
"ECDHE": 1
},
"ECDSA": {
"ECDSA": 13
}
},
"FF": {
"DH": {
"DH": 6
}
},
"RSA": {
"RSASSAPKCS1-v1_5": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0856-2017": 4,
"BSI-DSZ-CC-0975-2018": 21
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 1,
"AGD_PRE": 4,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 5,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 8,
"EAL 3": 4,
"EAL 4": 9,
"EAL 4 augmented": 3,
"EAL 5": 6,
"EAL 6": 3,
"EAL 7": 4,
"EAL4": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_SOS": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"Report, Version 7, 2018-02-15, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration list for the TOE, 2017-09-26, CI list for documentation in Perforce": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 1
},
"SSH": {
"SSH": 8
},
"TLS": {
"SSL": {
"SSL": 1
},
"TLS": {
"TLS": 14,
"TLSv1.1": 6,
"TLSv1.2": 7
}
},
"VPN": {
"VPN": 7
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 2,
"P-256": 2,
"secp256r1": 8
}
},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 13
},
"SHA2": {
"SHA-256": 7,
"SHA-384": 7,
"SHA256": 2,
"SHA384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"side channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 32": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"PKCS": {
"PKCS#1": 10
},
"RFC": {
"RFC1321": 1,
"RFC2104": 1,
"RFC3447": 10,
"RFC3526": 1,
"RFC4251": 1,
"RFC4252": 2,
"RFC4253": 4,
"RFC4346": 4,
"RFC4492": 6,
"RFC5246": 6,
"RFC6151": 1
}
},
"symmetric_crypto": {
"constructions": {
"MAC": {
"HMAC": 9
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {
"CVE": {
"CVE-2013-0169": 1
}
}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180220164746+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, F5 Networks, BIG-IP, Application Delivery Controller (ADC-AP) version 11.5.1 HF10\"",
"/ModDate": "D:20180221074413+01\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Certification Report, Zertifizierungsreport",
"/Title": "Certification Report BSI-DSZ-CC-0975-2017",
"pdf_file_size_bytes": 1617148,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/",
"http://www.sogisportal.eu/",
"https://downloads.f5.com/",
"https://support.f5.com/",
"https://askF5.com/",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
},
"st_filename": "0975b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDH": {
"ECDH": 7,
"ECDHE": 1
},
"ECDSA": {
"ECDSA": 15
}
},
"FF": {
"DH": {
"DH": 6,
"DHE": 2,
"Diffie-Hellman": 2
}
},
"RSA": {
"RSASSAPKCS1-v1_5": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONNECTIONS": 3,
"A.KEYS": 3,
"A.LDAP": 3,
"A.LOGSERVER": 2,
"A.MGMTNET": 3,
"A.NO_GENERAL_PURPOSE": 3,
"A.PEERTRUST": 4,
"A.PHYSICAL": 3,
"A.TIME": 3,
"A.TRAINED_ADMIN": 3,
"A.TRUSTED_ADMIN": 3
},
"O": {
"O.APM-VPN": 16,
"O.DISPLAY_BANNER": 5,
"O.FAILOVER": 5,
"O.LTM-TRAFFICMGMT": 13,
"O.PROTECTED_COMMUNICATIONS": 18,
"O.RESIDUAL_INFORMATION_CLEARING": 5,
"O.RESOURCE_AVAILABILITY": 5,
"O.SESSION_LOCK": 6,
"O.SYSTEM_MONITORING": 8,
"O.TOE_ADMINISTRATION": 19,
"O.TSF_SELF_TEST": 4,
"O.VERIFIABLE_UPDATES": 5
},
"OE": {
"OE.CONNECTIONS": 3,
"OE.KEYS": 3,
"OE.LDAP": 3,
"OE.LOGSERVER": 3,
"OE.MGMTNET": 3,
"OE.NO_GENERAL_PURPOSE": 3,
"OE.PEERTRUST": 3,
"OE.PHYSICAL": 3,
"OE.TIME": 5,
"OE.TRAINED_ADMIN": 4,
"OE.TRUSTED_ADMIN": 4
},
"T": {
"T.ADMIN_ERROR": 5,
"T.RESOURCE_EXHAUSTION": 3,
"T.TSF_FAILURE": 3,
"T.UNAUTHORIZED_ACCESS": 5,
"T.UNAUTHORIZED_UPDATE": 3,
"T.UNDETECTED_ACTIONS": 1,
"T.USER_DATA_REUSE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.3": 5,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 3,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 1,
"FAU_STG": 1,
"FAU_STG_EXT.1": 14,
"FAU_STG_EXT.1.1": 2
},
"FCS": {
"FCS_CKM": 15,
"FCS_CKM.1": 10,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 4,
"FCS_CKM.4": 3,
"FCS_CKM_EXT.4": 20,
"FCS_CKM_EXT.4.1": 2,
"FCS_COP.1": 36,
"FCS_COP.1.1": 3,
"FCS_RBG_EXT.1": 16,
"FCS_RBG_EXT.1.1": 2,
"FCS_RBG_EXT.1.2": 2,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1,
"FCS_SSH_EXT.1": 15,
"FCS_SSH_EXT.1.1": 2,
"FCS_SSH_EXT.1.2": 2,
"FCS_SSH_EXT.1.3": 2,
"FCS_SSH_EXT.1.4": 2,
"FCS_SSH_EXT.1.5": 2,
"FCS_SSH_EXT.1.6": 2,
"FCS_SSH_EXT.1.7": 2,
"FCS_TLS_EXT.1": 22,
"FCS_TLS_EXT.1.1": 2,
"FCS_TLS_EXT.1.2": 2
},
"FDP": {
"FDP_ACC.1": 17,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 7,
"FDP_IFC.1": 7,
"FDP_IFF": 6,
"FDP_IFF.1": 7,
"FDP_ITC.1": 15,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 5,
"FDP_RIP.2": 11,
"FDP_RIP.2.1": 1,
"FDP_UCT.1": 8,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_PMG_EXT.1": 14,
"FIA_PMG_EXT.1.1": 1,
"FIA_SOS": 1,
"FIA_UAU": 19,
"FIA_UAU.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.7": 10,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.2": 15,
"FIA_UAU_EXT.2.1": 2,
"FIA_UIA_EXT.1": 22,
"FIA_UIA_EXT.1.1": 2,
"FIA_UIA_EXT.1.2": 2,
"FIA_UID.1": 3,
"FIA_UIU_EXT.1": 1
},
"FMT": {
"FMT_MSA": 17,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 9,
"FMT_MTD.1": 9,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 12,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 14,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_APW": 1,
"FPT_APW_EXT.1": 13,
"FPT_APW_EXT.1.1": 2,
"FPT_APW_EXT.1.2": 2,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_SKP": 1,
"FPT_SKP_EXT.1": 13,
"FPT_SKP_EXT.1.1": 2,
"FPT_STM.1": 1,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 13,
"FPT_TST_EXT.1.1": 2,
"FPT_TUD": 1,
"FPT_TUD_EXT.1": 14,
"FPT_TUD_EXT.1.1": 2,
"FPT_TUD_EXT.1.2": 2,
"FPT_TUD_EXT.1.3": 2
},
"FRU": {
"FRU_RSA.1": 9,
"FRU_RSA.1.1": 1
},
"FTA": {
"FTA_SSL.3": 10,
"FTA_SSL.3.1": 1,
"FTA_SSL.4": 10,
"FTA_SSL.4.1": 1,
"FTA_TAB.1": 13,
"FTA_TAB.1.1": 1
},
"FTP": {
"FTP_ITC.1": 23,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 15,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"TOE, including the fipscardsync utility provided with BIG-IP for convenience, are considered to be out of scope for this evaluation. 7.1.4.3 Certificate validation For TLS sessions, the TOE implements": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 14
}
},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"SSH": {
"SSH": 79
},
"TLS": {
"SSL": {
"SSL": 16
},
"TLS": {
"TLS": 96,
"TLS 1.0": 2,
"TLS 1.1": 4,
"TLS 1.2": 4,
"TLS v1.1": 1,
"TLSv1.1": 4,
"TLSv1.2": 5
}
},
"VPN": {
"VPN": 22
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 10,
"P-256": 13,
"curve P-256": 1,
"secp256r1": 8
}
},
"eval_facility": {
"atsec": {
"atsec": 99
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
},
"SHA": {
"SHA1": {
"SHA-1": 15
},
"SHA2": {
"SHA-256": 10,
"SHA-384": 9,
"SHA256": 1,
"SHA384": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RBG": 6,
"RNG": 17
}
},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS20": 1
},
"FIPS": {
"FIPS 140-2": 6,
"FIPS 186-2": 1,
"FIPS PUB 186-3": 3,
"FIPS197": 2,
"FIPS198-1": 2
},
"PKCS": {
"PKCS#1": 10
},
"RFC": {
"RFC 2246": 1,
"RFC 2616": 1,
"RFC 2818": 1,
"RFC 4253": 2,
"RFC 4346": 1,
"RFC 5246": 1,
"RFC1321": 2,
"RFC2104": 2,
"RFC2616": 2,
"RFC2818": 2,
"RFC3447": 11,
"RFC3526": 2,
"RFC4251": 4,
"RFC4252": 5,
"RFC4253": 9,
"RFC4254": 2,
"RFC4346": 9,
"RFC4492": 7,
"RFC5228": 2,
"RFC5246": 8,
"RFC5280": 3,
"RFC6151": 1
},
"X509": {
"X.509": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"constructions": {
"MAC": {
"HMAC": 11,
"HMAC-SHA-256": 1,
"HMAC-SHA-384": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {
"TLS": {
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384": 1,
"TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA": 1,
"TLS_RSA_WITH_AES_128_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_128_GCM_SHA256": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA": 1,
"TLS_RSA_WITH_AES_256_CBC_SHA256": 1,
"TLS_RSA_WITH_AES_256_GCM_SHA384": 1
}
},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {
"CVE": {
"CVE-2017-6164": 1
}
}
},
"st_metadata": {
"/Author": "David Ochel, Gordon McIntosh, Staffan Persson (generated by CCTool version 2.8.4)",
"/CreationDate": "D:20180213114202Z",
"/Creator": "Unknown",
"/Keywords": "Security Target, Common Criteria, F5, VPN, Networking",
"/ModDate": "D:20180213114202Z",
"/Producer": "XEP 4.18 build 20100322",
"/Subject": "BIG-IP ADC-AP",
"/Title": "BIG-IP 11.5.1 HF 10 (build 10.123.180) ADC-AP Security Target (version 1.6 as of 2018-02-12)",
"/Trapped": "/False",
"/application": "CCTool version x.y",
"pdf_file_size_bytes": 2959661,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://devcentral.f5.com/wiki/iRules.Commands.ashx",
"http://www.ietf.org/rfc/rfc5228.txt",
"http://www.ietf.org/rfc/rfc4492.txt",
"http://www.ietf.org/rfc/rfc3447.txt",
"http://www.ietf.org/rfc/rfc1321.txt",
"http://www.ietf.org/rfc/rfc3526.txt",
"http://www.ietf.org/rfc/rfc2104.txt",
"http://www.ietf.org/rfc/rfc5246.txt",
"http://tmml.sourceforge.net/doc/tcl/index.html",
"https://devcentral.f5.com/wiki/iRules.Events.ashx",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R4.pdf",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R4.pdf",
"http://www.ietf.org/rfc/rfc5280.txt",
"http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 100
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0975b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5cbb70be26c3b71c218ca0a5bba3bcc7f2c0d26120d840d51dc52ffd868c46f0",
"txt_hash": "746b061b9f3cf0bd646034759d0ad7cbdeb4e3d1b7d2d7e5449cf4095e4db5f5"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a1617956afd3a0f59c3a1d3b6829ba2aa7cac7953be291a0d9c9df40a214e722",
"txt_hash": "62abc24454f6602224b121f072cbbc10395667add41b279b4a3ef5086d9dc17a"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ae75f123d39c6cd515459dd2bef3871a7af6bf0cc3a03abd18766b3f8e8e8db8",
"txt_hash": "c0d4e7e9a0dc898bc12d41436eb66c0b21d7c16d953c5e265fdd108f1c05fb91"
}
},
"status": "archived"
}