genugate 10.0 Firewall Software

CSV information ?

Status active
Valid from 22.06.2021
Valid until 21.06.2026
Scheme 🇩🇪 DE
Manufacturer genua GmbH
Category Network and Network-Related Devices and Systems
Security level AVA_VAN.5, ASE_TSS.2, ALC_FLR.2, EAL4+
Maintenance updates genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management) (25.09.2023) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1154-2021

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, AVA_VAN.5, ASE_TSS.2
Certificates
BSI-DSZ-CC-1154-2021

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Urkunde BSI-DSZ-CC-1154-2021
Subject Zertifikat, Certificate, Urkunde
Keywords "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH", Urkunde
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20210630131150+02'00'
Modification date D:20210630132300+02'00'
Pages 1
Creator Writer
Producer LibreOffice 6.3

Certification report ?

Extracted keywords

Hash functions
SHA-256, SHA-512, SHA256, SHA512, SHA-384
Protocols
SSH, SSL, TLS, IPsec, VPN

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 5+, EAL 6, EAL 4 augmented
Claims
A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC
Security Assurance Requirements (SAR)
ALC_FLR.2, ALC_PAM.1, ALC_FLR, ALC_PAM, AVA_VAN.5, ASE_TSS.2
Certificates
BSI-DSZ-CC-1154-2021, BSI-DSZ-CC-1039-2017, BSI-DSZ-CC-01154
Evaluation facilities
secuvera

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision, v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS

Standards
FIPS PUB 180-4, PKCS#1, AIS 34, AIS 32, AIS 38, RFC 3447, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Zertifizierungsreport BSI-DSZ-CC-1154-2021
Subject BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH
Keywords "Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20210630113008+02'00'
Modification date D:20210701114458+02'00'
Pages 29
Creator Writer
Producer LibreOffice 6.3

Frontpage

Certificate ID BSI-DSZ-CC-1154-2021
Certified item genugate 10.0 Firewall Software
Certification lab BSI
Developer genua GmbH

References

Outgoing

Security target ?

Extracted keywords

Hash functions
SHA-384, SHA-256, SHA-512
Protocols
SSH, SSL, TLS, IPsec

Vendor
Microsoft

Security level
EAL4, EAL4 augmented
Claims
O.IDAUTH, O.MEDIAT, O.SECSTA, O.SELPRO, O.SECFUN, O.MISUSESSH, O.AUDREC, O.ACCOUN, O.AVAIL, O.PATCH, T.NOAUTH, T.SPOOF, T.MEDIAT, T.SELPRO, T.MISUSESSH, T.PATCH, A.PHYSEC, A.NOEVIL, A.ADMIN, A.LOCAL, A.REST, A.SINGEN, A.POLICY, A.TIMESTMP, A.HANET, A.USER, A.TRUSTK, A.TRUSTU, A.LEGACY, A.REMOTE_AUTH, A.OSPF, OE.PHYSEC, OE.NOEVIL, OE.ADMIN, OE.LOCAL, OE.REST, OE.SINGEN, OE.POLICY, OE.TIMESTMP, OE.RTCLOCK, OE.HANET, OE.USER, OE.TRUSTK, OE.TRUSTU, OE.LEGACY, OE.REMOTE_AUTH, OE.OSPF, OE.PASSWD
Security Assurance Requirements (SAR)
ADV_INT, ADV_SPM, ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, ADV_ARC.1, ADV_TDS.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_PAM, ALC_PAM.1, ALC_FLR.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_CMC.4, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ALC_TAT.1, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, ATE_COV.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_REQ.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.2, FAU_UPD, FAU_ARP, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA, FAU_SAA.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG, FAU_STG.1, FAU_STG.4, FCS_COP.1, FCS_COP, FCS_COP.1.1, FCS_CKM.4, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_ITC.1, FIA_UAU, FIA_UAU.5, FIA_UAU.1, FIA_UAU.2, FIA_UAU.3, FIA_UAU.4, FIA_UAU.6, FIA_UAU.7, FIA_AFL, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.6.1, FIA_UID, FIA_UID.2, FIA_UID.2.1, FIA_UID.1, FMT_MOF, FMT_MOF.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MTD.1, FMT_SMF, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMR.3, FMT_SMR.3.1, FMT_SMR.1, FMT_IFF, FMT_MOF.1.3, FPT_SST, FPT_UPD, FPT_STM.1, FPT_RCV, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_STM, FPT_STM.1.1, FPT_TRC, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_ITT.1, FPT_TST.1, FPT_AMT.1

Side-channel analysis
side channel
Certification process
out of scope, genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same

Standards
FIPS PUB 180-4, PKCS#1, RFC 4251, ISO/IEC 18045, CCMB-2017-04-002

File metadata

Title genugate 10.0 Security Target
Subject Common Criteria certification
Keywords firewall, application level gateway, packet filter
Author genua GmbH
Creation date D:20210616140218+02'00'
Modification date D:20210616140218+02'00'
Pages 81
Creator LaTeX with hyperref
Producer GPL Ghostscript 9.53.3

Heuristics ?

Certificate ID: BSI-DSZ-CC-1154-2021

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TAT.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_PAM.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Scheme data ?

Cert Id BSI-DSZ-CC-1154-2021
Product genugate 10.0 p14 Firewall Software
Vendor genua GmbH
Certification Date 22.06.2021
Category Network and Network related Devices and Systems
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html
Enhanced
Product genugate 10.0 p14 Firewall Software
Applicant genua GmbH Domagkstrasse 7 85551 Kirchheim
Evaluation Facility secuvera GmbH
Assurance Level EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5
Certification Date 22.06.2021
Expiration Date 21.06.2026
Entries [frozendict({'id': 'BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity Maintanance Report', 'description': 'patchlevel is p14'}), frozendict({'id': 'BSI-DSZ-CC-1154-2021', 'description': 'Certificate'})]
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile&v=2
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile&v=2
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile&v=2
Description The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2021-06-22', 'enhanced': {'__update__': {'applicant': 'genua GmbH Domagkstrasse 7 85551 Kirchheim', 'certification_date': '2021-06-22', 'expiration_date': '2026-06-21', 'entries': {'0': {'__update__': {'id': 'BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity Maintanance Report'}}}, 'description': 'The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.'}}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a', 'txt_hash': '9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da', 'txt_hash': '50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 460773, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 81, '/Producer': 'GPL Ghostscript 9.53.3', '/CreationDate': "D:20210616140218+02'00'", '/ModDate': "D:20210616140218+02'00'", '/Author': 'genua GmbH', '/Creator': 'LaTeX with hyperref', '/Title': 'genugate 10.0 Security Target', '/Subject': 'Common Criteria certification', '/Keywords': 'firewall, application level gateway, packet filter', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4251.txt', 'http://www.openssh.org']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 263084, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20210630131150+02'00'", '/Creator': 'Writer', '/Keywords': '"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH", Urkunde', '/ModDate': "D:20210630132300+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Zertifikat, Certificate, Urkunde', '/Title': 'Urkunde BSI-DSZ-CC-1154-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_INT': 2, 'ADV_SPM': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 4, 'ADV_TDS.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 3, 'ADV_TAT.1': 1, 'ADV_TDS.3': 2, 'ADV_FSP.1': 1, 'ADV_FSP.2': 3, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 3}, 'ALC': {'ALC_PAM': 32, 'ALC_PAM.1': 48, 'ALC_FLR.2': 5, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 3, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1, 'ALC_CMC.4': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 2, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 4, 'ATE_DPT.1': 1, 'ATE_IND.2': 1, 'ATE_COV.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1, 'ASE_CCL.1': 1, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 33, 'FAU_GEN.1': 16, 'FAU_GEN.2': 1, 'FAU_UPD': 1, 'FAU_ARP': 2, 'FAU_ARP.1': 6, 'FAU_ARP.1.1': 1, 'FAU_SAA': 2, 'FAU_SAA.1': 7, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR': 4, 'FAU_SAR.1': 8, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 6, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 6, 'FAU_SAR.3.1': 1, 'FAU_STG': 31, 'FAU_STG.1': 7, 'FAU_STG.4': 2}, 'FCS': {'FCS_COP.1': 11, 'FCS_COP': 2, 'FCS_COP.1.1': 1, 'FCS_CKM.4': 2}, 'FDP': {'FDP_IFC': 60, 'FDP_IFC.1': 5, 'FDP_IFF': 52, 'FDP_IFF.1': 25, 'FDP_ITC.1': 2}, 'FIA': {'FIA_UAU': 28, 'FIA_UAU.5': 8, 'FIA_UAU.1': 2, 'FIA_UAU.2': 8, 'FIA_UAU.3': 1, 'FIA_UAU.4': 1, 'FIA_UAU.6': 7, 'FIA_UAU.7': 1, 'FIA_AFL': 2, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD': 2, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS': 2, 'FIA_SOS.1': 6, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID': 3, 'FIA_UID.2': 7, 'FIA_UID.2.1': 1, 'FIA_UID.1': 3}, 'FMT': {'FMT_MOF': 21, 'FMT_MOF.1': 3, 'FMT_MSA': 68, 'FMT_MSA.1': 4, 'FMT_MSA.3': 3, 'FMT_MTD': 15, 'FMT_MTD.1': 2, 'FMT_SMF': 2, 'FMT_SMF.1': 24, 'FMT_SMF.1.1': 1, 'FMT_SMR': 5, 'FMT_SMR.2': 19, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMR.3': 6, 'FMT_SMR.3.1': 1, 'FMT_SMR.1': 25, 'FMT_IFF': 2, 'FMT_MOF.1.3': 1}, 'FPT': {'FPT_SST': 22, 'FPT_UPD': 42, 'FPT_STM.1': 9, 'FPT_RCV': 2, 'FPT_RCV.2': 6, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_STM': 2, 'FPT_STM.1.1': 1, 'FPT_TRC': 3, 'FPT_TRC.1': 5, 'FPT_TRC.1.1': 1, 'FPT_TRC.1.2': 1, 'FPT_ITT.1': 1, 'FPT_TST.1': 2, 'FPT_AMT.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 15, 'O.MEDIAT': 13, 'O.SECSTA': 8, 'O.SELPRO': 4, 'O.SECFUN': 22, 'O.MISUSESSH': 7, 'O.AUDREC': 17, 'O.ACCOUN': 6, 'O.AVAIL': 8, 'O.PATCH': 5}, 'T': {'T.NOAUTH': 2, 'T.SPOOF': 2, 'T.MEDIAT': 2, 'T.SELPRO': 2, 'T.MISUSESSH': 2, 'T.PATCH': 2}, 'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 3, 'A.REST': 2, 'A.SINGEN': 3, 'A.POLICY': 2, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 2, 'OE.NOEVIL': 1, 'OE.ADMIN': 2, 'OE.LOCAL': 1, 'OE.REST': 2, 'OE.SINGEN': 1, 'OE.POLICY': 2, 'OE.TIMESTMP': 2, 'OE.RTCLOCK': 3, 'OE.HANET': 3, 'OE.USER': 2, 'OE.TRUSTK': 3, 'OE.TRUSTU': 2, 'OE.LEGACY': 1, 'OE.REMOTE_AUTH': 2, 'OE.OSPF': 1, 'OE.PASSWD': 3}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-384': 3, 'SHA-256': 3, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 26}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 5}}, 'IPsec': {'IPsec': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 31}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 3}, 'PKCS': {'PKCS#1': 3}, 'RFC': {'RFC 4251': 1}, 'ISO': {'ISO/IEC 18045': 4}, 'CC': {'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1, 'ALC_PAM.1': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1154b_pdf.pdf.
    • The cert_filename property was set to 1154c_pdf.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1039-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0718-2012', 'BSI-DSZ-CC-0890-2013', 'BSI-DSZ-CC-1039-2017']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005', 'txt_hash': '9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 637521, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20210630113008+02'00'", '/Creator': 'Writer', '/Keywords': '"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH"', '/ModDate': "D:20210701114458+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH', '/Title': 'Zertifizierungsreport BSI-DSZ-CC-1154-2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1154-2021', 'cert_item': 'genugate 10.0 Firewall Software', 'developer': 'genua GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'None', 'cc_version': 'Product specific Security Target Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1154-2021': 15, 'BSI-DSZ-CC-1039-2017': 3, 'BSI-DSZ-CC-01154': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 5': 3, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4, 'ALC_PAM.1': 13, 'ALC_FLR': 3, 'ALC_PAM': 3}, 'AVA': {'AVA_VAN.5': 5}, 'ASE': {'ASE_TSS.2': 5}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.PHYSEC': 2, 'A.NOEVIL': 2, 'A.ADMIN': 2, 'A.LOCAL': 2, 'A.REST': 2, 'A.SINGEN': 2, 'A.POLICY': 3, 'A.TIMESTMP': 2, 'A.HANET': 2, 'A.USER': 2, 'A.TRUSTK': 2, 'A.TRUSTU': 2, 'A.LEGACY': 2, 'A.REMOTE_AUTH': 2, 'A.OSPF': 2}, 'OE': {'OE.PHYSEC': 1}}, 'vendor': {}, 'eval_facility': {'secuvera': {'secuvera': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2, 'SHA-512': 2, 'SHA256': 36, 'SHA512': 36, 'SHA-384': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 5}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 1}}, 'IPsec': {'IPsec': 1}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 4}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS 34': 2, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 3447': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe März 2021, Revision': 1, 'v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically • AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema • AIS': 1}}}.
    • The report_filename property was set to 1154a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1154-2021.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_PAM', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154b_pdf.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_PAM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name genugate 10.0 Firewall Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154c_pdf.pdf",
  "dgst": "b60615a415b67af8",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1154-2021",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_PAM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1039-2017"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0718-2012",
          "BSI-DSZ-CC-0890-2013",
          "BSI-DSZ-CC-1039-2017"
        ]
      }
    },
    "scheme_data": {
      "category": "Network and Network related Devices and Systems",
      "cert_id": "BSI-DSZ-CC-1154-2021",
      "certification_date": "2021-06-22",
      "enhanced": {
        "applicant": "genua GmbH Domagkstrasse 7 85551 Kirchheim",
        "assurance_level": "EAL4+,ALC_FLR.2,ALC_PAM.1,ASE_TSS.2,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154c_pdf.pdf?__blob=publicationFile\u0026v=2",
        "certification_date": "2021-06-22",
        "description": "The TOE genugate 10.0 Z is a combination of an application level gateway (ALG) and a packet filter (PFL), which are implemented on two different systems. It is part of a larger product. The firewall genugate 10.0 Z consists of hardware and software. The TOE is part of the shipped software. The operating system is a modified OpenBSD.",
        "entries": [
          {
            "description": "patchlevel is p14",
            "id": "BSI-DSZ-CC-1154-2023-MA-01 (Ausstellungsdatum / Certification Date 25.09.2023) Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management Assurance Continuity Maintanance Report"
          },
          {
            "description": "Certificate",
            "id": "BSI-DSZ-CC-1154-2021"
          }
        ],
        "evaluation_facility": "secuvera GmbH",
        "expiration_date": "2026-06-21",
        "product": "genugate 10.0 p14 Firewall Software",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154a_pdf.pdf?__blob=publicationFile\u0026v=2",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1154b_pdf.pdf?__blob=publicationFile\u0026v=2"
      },
      "product": "genugate 10.0 p14 Firewall Software",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Netzwerk_und_Kommunikationsprodukte/1154.html",
      "vendor": "genua GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2023-09-25",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154MA01a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154MA01b_pdf.pdf",
        "maintenance_title": "genugate 10.0 p14 Firewall Software (Assurance Continuity Maintenance Report with partial re-evaluation applying ALC_PAM for patch management)"
      }
    ]
  },
  "manufacturer": "genua GmbH",
  "manufacturer_web": "https://www.genua.de",
  "name": "genugate 10.0 Firewall Software",
  "not_valid_after": "2026-06-21",
  "not_valid_before": "2021-06-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1154c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1154-2021": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.2": 1,
          "ALC_PAM.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210630131150+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\", Urkunde",
      "/ModDate": "D:20210630132300+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Zertifikat, Certificate, Urkunde",
      "/Title": "Urkunde BSI-DSZ-CC-1154-2021",
      "pdf_file_size_bytes": 263084,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1154a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 extended EAL 4 augmented by ASE_TSS.2, ALC_FLR.2, ALC_PAM.1, AVA_VAN.5",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1154-2021",
        "cert_item": "genugate 10.0 Firewall Software",
        "cert_lab": "BSI",
        "developer": "genua GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-01154": 1,
          "BSI-DSZ-CC-1039-2017": 3,
          "BSI-DSZ-CC-1154-2021": 15
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.LOCAL": 2,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 3,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 2,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "OE": {
          "OE.PHYSEC": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 3,
          "ALC_FLR.2": 4,
          "ALC_PAM": 3,
          "ALC_PAM.1": 13
        },
        "ASE": {
          "ASE_TSS.2": 5
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 8,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL 5+": 1,
          "EAL 6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report BSI-DSZ-CC-01154 for genugate firewall 10.0, Version 2, Date 11.06.2021, secuvera Gmbh (confidential document) [8] genugate 10.0 Z Installationshandbuch, Version 10.0 Z Patch 000, Ausgabe M\u00e4rz 2021, Revision": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "v10.0-RC3 [10] Archiv von Konfigurationslisten, 1154-ALC_CMS-RC3-20210331.tgz, Date 31.03.2021 (confidential document) 7 specifically \u2022 AIS 32, Version 7, CC-Interpretationen im deutschen Zertifizierungsschema \u2022 AIS": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        },
        "SSH": {
          "SSH": 5
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "secuvera": {
          "secuvera": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA-384": 1,
            "SHA-512": 2,
            "SHA256": 36,
            "SHA512": 36
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 4
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 3447": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210630113008+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Zertifizierung, Certification, genugate 10.0 Firewall Software from genua GmbH\"",
      "/ModDate": "D:20210701114458+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "BSI-DSZ-CC-1154-2021 for genugate 10.0 Firewall Software from genua GmbH",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-1154-2021",
      "pdf_file_size_bytes": 637521,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1154b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMIN": 2,
          "A.HANET": 2,
          "A.LEGACY": 2,
          "A.LOCAL": 3,
          "A.NOEVIL": 2,
          "A.OSPF": 2,
          "A.PHYSEC": 2,
          "A.POLICY": 2,
          "A.REMOTE_AUTH": 2,
          "A.REST": 2,
          "A.SINGEN": 3,
          "A.TIMESTMP": 2,
          "A.TRUSTK": 2,
          "A.TRUSTU": 2,
          "A.USER": 2
        },
        "O": {
          "O.ACCOUN": 6,
          "O.AUDREC": 17,
          "O.AVAIL": 8,
          "O.IDAUTH": 15,
          "O.MEDIAT": 13,
          "O.MISUSESSH": 7,
          "O.PATCH": 5,
          "O.SECFUN": 22,
          "O.SECSTA": 8,
          "O.SELPRO": 4
        },
        "OE": {
          "OE.ADMIN": 2,
          "OE.HANET": 3,
          "OE.LEGACY": 1,
          "OE.LOCAL": 1,
          "OE.NOEVIL": 1,
          "OE.OSPF": 1,
          "OE.PASSWD": 3,
          "OE.PHYSEC": 2,
          "OE.POLICY": 2,
          "OE.REMOTE_AUTH": 2,
          "OE.REST": 2,
          "OE.RTCLOCK": 3,
          "OE.SINGEN": 1,
          "OE.TIMESTMP": 2,
          "OE.TRUSTK": 3,
          "OE.TRUSTU": 2,
          "OE.USER": 2
        },
        "T": {
          "T.MEDIAT": 2,
          "T.MISUSESSH": 2,
          "T.NOAUTH": 2,
          "T.PATCH": 2,
          "T.SELPRO": 2,
          "T.SPOOF": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 3,
          "ADV_FSP.4": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_INT": 2,
          "ADV_SPM": 2,
          "ADV_TAT.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 5,
          "AGD_PRE": 1,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL": 3,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR": 1,
          "ALC_FLR.2": 5,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_PAM": 32,
          "ALC_PAM.1": 48,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 3,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 4,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 33,
          "FAU_GEN.1": 16,
          "FAU_GEN.2": 1,
          "FAU_SAA": 2,
          "FAU_SAA.1": 7,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR": 4,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 6,
          "FAU_SAR.3.1": 1,
          "FAU_STG": 31,
          "FAU_STG.1": 7,
          "FAU_STG.4": 2,
          "FAU_UPD": 1
        },
        "FCS": {
          "FCS_CKM.4": 2,
          "FCS_COP": 2,
          "FCS_COP.1": 11,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_IFC": 60,
          "FDP_IFC.1": 5,
          "FDP_IFF": 52,
          "FDP_IFF.1": 25,
          "FDP_ITC.1": 2
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 2,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 28,
          "FIA_UAU.1": 2,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.3": 1,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.6": 7,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 1,
          "FIA_UID": 3,
          "FIA_UID.1": 3,
          "FIA_UID.2": 7,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_IFF": 2,
          "FMT_MOF": 21,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.3": 1,
          "FMT_MSA": 68,
          "FMT_MSA.1": 4,
          "FMT_MSA.3": 3,
          "FMT_MTD": 15,
          "FMT_MTD.1": 2,
          "FMT_SMF": 2,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 5,
          "FMT_SMR.1": 25,
          "FMT_SMR.2": 19,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1,
          "FMT_SMR.3": 6,
          "FMT_SMR.3.1": 1
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_ITT.1": 1,
          "FPT_RCV": 2,
          "FPT_RCV.2": 6,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SST": 22,
          "FPT_STM": 2,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1,
          "FPT_TRC": 3,
          "FPT_TRC.1": 5,
          "FPT_TRC.1.1": 1,
          "FPT_TRC.1.2": 1,
          "FPT_TST.1": 2,
          "FPT_UPD": 42
        }
      },
      "certification_process": {
        "OutOfScope": {
          "genugate 400, genugate 600 and genugate 800 in the field with hardware revision 6 and 7 which are out of scope for the current certification. The genugate firewall 10.0 runs on this hardware with the same": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 2
        },
        "SSH": {
          "SSH": 26
        },
        "TLS": {
          "SSL": {
            "SSL": 3
          },
          "TLS": {
            "TLS": 5
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 31
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-002": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 3
        },
        "ISO": {
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS#1": 3
        },
        "RFC": {
          "RFC 4251": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "genua GmbH",
      "/CreationDate": "D:20210616140218+02\u002700\u0027",
      "/Creator": "LaTeX with hyperref",
      "/Keywords": "firewall, application level gateway, packet filter",
      "/ModDate": "D:20210616140218+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.53.3",
      "/Subject": "Common Criteria certification",
      "/Title": "genugate 10.0 Security Target",
      "pdf_file_size_bytes": 460773,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.openssh.org",
          "http://www.ietf.org/rfc/rfc4251.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 81
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ASE_TSS.2",
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1154b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f6490f4bd3755b5ab3f32cd34a07501e045fc8ddc32ad5987b5966a41eed50da",
      "txt_hash": "50af03dfddd87de76ca33b6444f5af10f1cfde18c9794963f3114b29f0b170b4"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "86f2e0bcc7b11465da147358585db0557864c6ee3cc3c4b8f66697ed4f81f005",
      "txt_hash": "9fac66d6037ff7ad36d6794c98da55311ba1c1ab1cc70583ddce0f44e8d49817"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "96c4c9f54d244ab966c01f45fcb1397efdf08aa2e9a2ed78a23f60f03b8d901a",
      "txt_hash": "9e20dc50bb971bc87293f3d8def7cf419800b5d3b0abc4d5b8717c0589596495"
    }
  },
  "status": "active"
}