This page was not yet optimized for use on mobile devices.
U.S. Government Virtual Private Network Boundary Gateway for Medium Robustness Environments, Version 1.2
Web information
Status: archivedCertification date: 2009-01-30
Archived date: 2009-10-01
Scheme: 🇺🇸
Category: Network and Network-Related Devices and Systems
Security level: AVA_VAN.4, Medium, AVA_CCA_(EXT).1
Certification report
certification report file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Profile
Extracted keywords
Symmetric Algorithms
AES, Rijndael, DESAsymmetric Algorithms
ECDSA, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-384, SHA-512, SHA-256Schemes
MAC, Key Exchange, Key Agreement, Key agreementProtocols
IKE, IKEv1, IPsec, VPNRandomness
PRNG, RNGElliptic Curves
P-256, P-384, P-521Security level
EAL2Claims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CHANGE_MANAGEMENT, O.CORRECT_, O.CRYPTOGRAPHIC_, O.CRYPTOGRAPHY_, O.DISPLAY_BANNER, O.DOCUMENT_KEY_LEAKAGE, O.INTEGRITY, O.MAINT_MODE, O.MANAGE, O.MEDIATE, O.PEER_AUTHENTICTION, O.REPLAY_DETECTION, O.RESIDUAL_INFORMATION, O.RESOURCE_SHARING, O.ROBUST_ADMIN_GUIDANCE, O.ROBUST_TOE_ACCESS, O.SELF_PROTECTION, O.SOUND_DESIGN, O.SOUND_IMPLEMENTATION, O.THOROUGH_FUNCTIONAL_, O.TIME_STAMPS, O.TRUSTED_PATH, O.VULNERABILITY_ANALYSIS_, O.VULNERABILITY_ANALYSIS, O.VULNERABILITY_ANALYSIS_TES, O.THOROUGH_FUNCTIONAL_T, O.THOROUGH_FUNCTIONAL_TESTI, O.PEER_AUTHENTICATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHIC_FUNCTIO, O.CRYPTOGRAPHIC_FUNCTIONS, O.CRYPTOGRAPHY_VALIDATE, O.CRYPTOGRAPHY_VALIDATED, O.CRYPTOGRAPHIC_FUNC, O.CRYPTOGRAPHY_VALID, O.DOCUMENT_KEY_, O.RESIDUAL_INFORMATIO, O.ROBUST_ADMIN_GUIDA, O.SOUND_IMPLEMENTATI, O.THOROUGH_FUNCTIONA, O.FUNCTIONAL_TESTING, O.VULNERABILITY_ANAL, O.VULNERABILITY_ANALYSIS_TEST, T.ADDRESS_MASQUERADE, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.FLAWED_DESIGN, T.FLAWED_IMPLEMENTATION, T.MALICIOUS_TSF_, T.MASQUERADE, T.POOR_TEST, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_EXHAUSTION, T.SPOOFING, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_PEER, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, T.ADDRESS_MASQUER, T.ADMIN_, T.AUDIT_, T.CRYPTO_, T.FLAWED_IMPLEMENT, T.RESOURCE_EXHAUST, T.MALICIOUS_TSF_COM, T.UNATTENDED_SESSIO, T.UNAUTHORIZED_ACC, T.UNAUTHORIZED_PEE, T.UNIDENTIFIED_ACTIO, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.NO_TOE_BYPASS, OE.CRYPTANALYTIC, OE.NO_GENERAL_PURPOSE, OE.NO_TOE_BYPASS, OE.PHYSICALSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.3, ADV_TDS.4, ADV_FSP.1, ADV_TDS.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_INT.1, ADV_IMP.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.4Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_SAA, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL, FAU_STG, FAU_STG.3, FAU_ARP.1.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1, FAU_STG.1, FAU_STG.3.1, FAU_SAR, FAU_ARP, FAU_UAU.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_BCM, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_IFC.1, FDP_IFF.1, FDP_RIP.2, FDP_IFF, FDP_IFF.1.2, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.6, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.2.1, FDP_IFC, FDP_ACF, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_AFL.1.1, FIA_UAU.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UID.1.2, FIA_UID.1.1, FIA_UAU.5, FIA_UAU, FIA_UID.2.1, FIA_USB.1.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_REV.1, FMT_SMR.2, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1.1, FMT_MSA.2, FMT_SMR.1, FMT_MSA.3.1, FPT_RCV.1, FPT_RPL.1, FPT_STM.1, FPT_TST.1, FPT_RCV.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITC.1, FPT_TRP, FPT_TST, FPT_RSA.1, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL.1, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_TSE, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTA_SSL, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC, FTP_TRPStandards
FIPS PUB 140-2, FIPS PUB 197, FIPS 140-2, FIPS PUB 140-3, FIPS PUB 186-3, FIPS 180-2, FIPS 140, FIPS PUB 186-2, FIPS PUB 140, NIST SP 800-57, PKCS#1, RFC 2409, RFC 2406, RFC 4869, RFC 2451, RFC 2404, RFC 792, RFC2409, X.509File metadata
Title | VPN PP |
---|---|
Author | admin |
Creation date | D:20090209135229 |
Modification date | D:20090209135229 |
Pages | 175 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
References
No references are available for this protection profile.
Updates
-
22.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The pp_metadata property was set to
{'pdf_file_size_bytes': 1304266, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 175, '/Title': 'VPN PP', '/Author': 'admin', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20090209135229', '/ModDate': 'D:20090209135229', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.niap-ccevs.org/cc-scheme/pp/']}}
. - The pp_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 26, 'ADV_FSP.5': 18, 'ADV_IMP.1': 15, 'ADV_INT.3': 8, 'ADV_TDS.4': 28, 'ADV_FSP.1': 2, 'ADV_TDS.1': 2, 'ADV_TDS.3': 3, 'ADV_FSP.2': 3, 'ADV_FSP.4': 1, 'ADV_ARC': 1, 'ADV_INT.1': 3, 'ADV_IMP.2': 1}, 'AGD': {'AGD_OPE.1': 19, 'AGD_PRE.1': 14}, 'ALC': {'ALC_CMC.4': 20, 'ALC_CMS.4': 10, 'ALC_DEL.1': 9, 'ALC_DVS.1': 11, 'ALC_FLR.2': 17, 'ALC_LCD.1': 12, 'ALC_TAT.1': 13, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 11, 'ATE_DPT.3': 13, 'ATE_FUN.1': 15, 'ATE_IND.2': 11, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.4': 19}}, 'cc_sfr': {'FAU': {'FAU_GEN': 15, 'FAU_ARP.1': 11, 'FAU_SAA': 9, 'FAU_SAR.1': 10, 'FAU_SAR.2': 6, 'FAU_SAR.3': 8, 'FAU_SEL': 9, 'FAU_STG': 17, 'FAU_STG.3': 9, 'FAU_ARP.1.1': 2, 'FAU_GEN.1': 3, 'FAU_GEN.2': 2, 'FAU_SAA.1': 4, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 2, 'FAU_SAR.2.1': 2, 'FAU_SAR.3.1': 1, 'FAU_SEL.1': 1, 'FAU_STG.1': 2, 'FAU_STG.3.1': 3, 'FAU_SAR': 2, 'FAU_ARP': 2, 'FAU_UAU.1': 1}, 'FCS': {'FCS_CKM.1': 21, 'FCS_CKM.2': 6, 'FCS_CKM.4': 10, 'FCS_COP.1': 29, 'FCS_CKM': 3, 'FCS_BCM': 1, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 2, 'FCS_COP': 2, 'FCS_COP.1.1': 16}, 'FDP': {'FDP_IFC.1': 21, 'FDP_IFF.1': 21, 'FDP_RIP.2': 7, 'FDP_IFF': 3, 'FDP_IFF.1.2': 6, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.1': 4, 'FDP_IFF.1.6': 3, 'FDP_IFF.1.3': 4, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_RIP.2.1': 1, 'FDP_IFC': 1, 'FDP_ACF': 1}, 'FIA': {'FIA_AFL.1': 8, 'FIA_ATD.1': 7, 'FIA_UAU.1': 23, 'FIA_UAU.2': 6, 'FIA_UID.2': 9, 'FIA_USB.1': 6, 'FIA_AFL.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UAU.5': 1, 'FIA_UAU': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 56, 'FMT_MSA.1': 7, 'FMT_MSA.3': 14, 'FMT_MTD.1': 29, 'FMT_MTD.2': 15, 'FMT_REV.1': 7, 'FMT_SMR.2': 8, 'FMT_MOF.1.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 3, 'FMT_MTD.2.1': 3, 'FMT_MTD.2.2': 4, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 3, 'FMT_SMR.2.1': 2, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.2': 2, 'FMT_SMR.1': 1, 'FMT_MSA.3.1': 2}, 'FPT': {'FPT_RCV.1': 6, 'FPT_RPL.1': 8, 'FPT_STM.1': 10, 'FPT_TST.1': 23, 'FPT_RCV.1.1': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 6, 'FPT_TST.1.2': 6, 'FPT_TST.1.3': 6, 'FPT_ITC.1': 1, 'FPT_TRP': 1, 'FPT_TST': 1, 'FPT_RSA.1': 1}, 'FRU': {'FRU_RSA.1': 22, 'FRU_RSA.1.1': 4}, 'FTA': {'FTA_SSL.1': 8, 'FTA_SSL.2': 6, 'FTA_SSL.3': 6, 'FTA_TAB.1': 6, 'FTA_TSE.1': 5, 'FTA_TSE': 1, 'FTA_SSL.1.1': 2, 'FTA_SSL.1.2': 2, 'FTA_SSL.2.1': 1, 'FTA_SSL.2.2': 2, 'FTA_SSL.3.1': 2, 'FTA_TAB.1.1': 2, 'FTA_TSE.1.1': 3, 'FTA_SSL': 1}, 'FTP': {'FTP_ITC.1': 30, 'FTP_TRP.1': 23, 'FTP_ITC.1.1': 8, 'FTP_ITC.1.2': 10, 'FTP_ITC.1.3': 7, 'FTP_TRP.1.1': 7, 'FTP_TRP.1.2': 7, 'FTP_TRP.1.3': 8, 'FTP_ITC': 2, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 8, 'O.AUDIT_GENERATION': 4, 'O.AUDIT_PROTECTION': 4, 'O.AUDIT_REVIEW': 4, 'O.CHANGE_MANAGEMENT': 6, 'O.CORRECT_': 5, 'O.CRYPTOGRAPHIC_': 1, 'O.CRYPTOGRAPHY_': 1, 'O.DISPLAY_BANNER': 6, 'O.DOCUMENT_KEY_LEAKAGE': 3, 'O.INTEGRITY': 5, 'O.MAINT_MODE': 4, 'O.MANAGE': 6, 'O.MEDIATE': 6, 'O.PEER_AUTHENTICTION': 1, 'O.REPLAY_DETECTION': 5, 'O.RESIDUAL_INFORMATION': 11, 'O.RESOURCE_SHARING': 4, 'O.ROBUST_ADMIN_GUIDANCE': 4, 'O.ROBUST_TOE_ACCESS': 11, 'O.SELF_PROTECTION': 8, 'O.SOUND_DESIGN': 6, 'O.SOUND_IMPLEMENTATION': 3, 'O.THOROUGH_FUNCTIONAL_': 1, 'O.TIME_STAMPS': 4, 'O.TRUSTED_PATH': 10, 'O.VULNERABILITY_ANALYSIS_': 1, 'O.VULNERABILITY_ANALYSIS': 4, 'O.VULNERABILITY_ANALYSIS_TES': 4, 'O.THOROUGH_FUNCTIONAL_T': 2, 'O.THOROUGH_FUNCTIONAL_TESTI': 2, 'O.PEER_AUTHENTICATION': 4, 'O.CORRECT_TSF_OPERATION': 1, 'O.CRYPTOGRAPHIC_FUNCTIO': 1, 'O.CRYPTOGRAPHIC_FUNCTIONS': 2, 'O.CRYPTOGRAPHY_VALIDATE': 1, 'O.CRYPTOGRAPHY_VALIDATED': 2, 'O.CRYPTOGRAPHIC_FUNC': 1, 'O.CRYPTOGRAPHY_VALID': 1, 'O.DOCUMENT_KEY_': 1, 'O.RESIDUAL_INFORMATIO': 1, 'O.ROBUST_ADMIN_GUIDA': 1, 'O.SOUND_IMPLEMENTATI': 1, 'O.THOROUGH_FUNCTIONA': 1, 'O.FUNCTIONAL_TESTING': 1, 'O.VULNERABILITY_ANAL': 1, 'O.VULNERABILITY_ANALYSIS_TEST': 1}, 'T': {'T.ADDRESS_MASQUERADE': 1, 'T.ADMIN_ERROR': 2, 'T.ADMIN_ROGUE': 2, 'T.AUDIT_COMPROMISE': 1, 'T.CRYPTO_COMPROMISE': 2, 'T.FLAWED_DESIGN': 2, 'T.FLAWED_IMPLEMENTATION': 1, 'T.MALICIOUS_TSF_': 1, 'T.MASQUERADE': 2, 'T.POOR_TEST': 2, 'T.REPLAY': 2, 'T.RESIDUAL_DATA': 2, 'T.RESOURCE_EXHAUSTION': 1, 'T.SPOOFING': 2, 'T.UNATTENDED_SESSION': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.UNAUTHORIZED_PEER': 1, 'T.UNIDENTIFIED_ACTIONS': 1, 'T.UNKNOWN_STATE': 2, 'T.ADDRESS_MASQUER': 1, 'T.ADMIN_': 1, 'T.AUDIT_': 1, 'T.CRYPTO_': 1, 'T.FLAWED_IMPLEMENT': 1, 'T.RESOURCE_EXHAUST': 1, 'T.MALICIOUS_TSF_COM': 1, 'T.UNATTENDED_SESSIO': 1, 'T.UNAUTHORIZED_ACC': 1, 'T.UNAUTHORIZED_PEE': 1, 'T.UNIDENTIFIED_ACTIO': 1}, 'A': {'A.NO_GENERAL_PURPOSE': 1, 'A.PHYSICAL': 1, 'A.NO_TOE_BYPASS': 1}, 'OE': {'OE.CRYPTANALYTIC': 4, 'OE.NO_GENERAL_PURPOSE': 1, 'OE.NO_TOE_BYPASS': 1, 'OE.PHYSICAL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}, 'Rijndael': {'Rijndael': 1}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-384': 3, 'SHA-512': 1, 'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 10}, 'KA': {'Key Agreement': 2, 'Key agreement': 1}}, 'crypto_protocol': {'IKE': {'IKE': 5, 'IKEv1': 2}, 'IPsec': {'IPsec': 2}, 'VPN': {'VPN': 86}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 9}}, 'cipher_mode': {}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4, 'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 13, 'FIPS PUB 197': 1, 'FIPS 140-2': 17, 'FIPS PUB 140-3': 1, 'FIPS PUB 186-3': 3, 'FIPS 180-2': 1, 'FIPS 140': 2, 'FIPS PUB 186-2': 1, 'FIPS PUB 140': 1}, 'NIST': {'NIST SP 800-57': 8}, 'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 2409': 10, 'RFC 2406': 5, 'RFC 4869': 1, 'RFC 2451': 2, 'RFC 2404': 4, 'RFC 792': 1, 'RFC2409': 1}, 'X509': {'X.509': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ec0d780d4123a844ad8a7bddcfa2a8b9f0262af24613d757b2e82a642f950cc7', 'txt_hash': '3e8cfd0d979e3053d57c3ee63491fb9163f2caa00d948b8f3e3e607cf1671486'}
data.
- The pp_metadata property was set to
-
14.04.2025 The protection profile data changed.
Protection Profile changed
The PDF extraction data was updated.
- The pp_metadata property was set to
None
. - The pp_keywords property was set to
None
.
The state of the protection profile object was updated.
- The pp property was updated, with the
{'convert_garbage': True, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7', 'txt_hash': None}
data.
- The pp_metadata property was set to
-
24.02.2025 The protection profile data changed.
Protection Profile changed
The state of the protection profile object was updated.
- The report property was updated, with the
{'pdf_hash': '6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7'}
data.
- The report property was updated, with the
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name U.S. Government Virtual Private Network Boundary Gateway for Medium Robustness Environments, Version 1.2 was processed.
Raw data
{
"_id": "00640de75d713a7c",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "00640de75d713a7c",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "PP_VPN_MR_V1.2.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_GENERAL_PURPOSE": 1,
"A.NO_TOE_BYPASS": 1,
"A.PHYSICAL": 1
},
"O": {
"O.ADMIN_ROLE": 8,
"O.AUDIT_GENERATION": 4,
"O.AUDIT_PROTECTION": 4,
"O.AUDIT_REVIEW": 4,
"O.CHANGE_MANAGEMENT": 6,
"O.CORRECT_": 5,
"O.CORRECT_TSF_OPERATION": 1,
"O.CRYPTOGRAPHIC_": 1,
"O.CRYPTOGRAPHIC_FUNC": 1,
"O.CRYPTOGRAPHIC_FUNCTIO": 1,
"O.CRYPTOGRAPHIC_FUNCTIONS": 2,
"O.CRYPTOGRAPHY_": 1,
"O.CRYPTOGRAPHY_VALID": 1,
"O.CRYPTOGRAPHY_VALIDATE": 1,
"O.CRYPTOGRAPHY_VALIDATED": 2,
"O.DISPLAY_BANNER": 6,
"O.DOCUMENT_KEY_": 1,
"O.DOCUMENT_KEY_LEAKAGE": 3,
"O.FUNCTIONAL_TESTING": 1,
"O.INTEGRITY": 5,
"O.MAINT_MODE": 4,
"O.MANAGE": 6,
"O.MEDIATE": 6,
"O.PEER_AUTHENTICATION": 4,
"O.PEER_AUTHENTICTION": 1,
"O.REPLAY_DETECTION": 5,
"O.RESIDUAL_INFORMATIO": 1,
"O.RESIDUAL_INFORMATION": 11,
"O.RESOURCE_SHARING": 4,
"O.ROBUST_ADMIN_GUIDA": 1,
"O.ROBUST_ADMIN_GUIDANCE": 4,
"O.ROBUST_TOE_ACCESS": 11,
"O.SELF_PROTECTION": 8,
"O.SOUND_DESIGN": 6,
"O.SOUND_IMPLEMENTATI": 1,
"O.SOUND_IMPLEMENTATION": 3,
"O.THOROUGH_FUNCTIONA": 1,
"O.THOROUGH_FUNCTIONAL_": 1,
"O.THOROUGH_FUNCTIONAL_T": 2,
"O.THOROUGH_FUNCTIONAL_TESTI": 2,
"O.TIME_STAMPS": 4,
"O.TRUSTED_PATH": 10,
"O.VULNERABILITY_ANAL": 1,
"O.VULNERABILITY_ANALYSIS": 4,
"O.VULNERABILITY_ANALYSIS_": 1,
"O.VULNERABILITY_ANALYSIS_TES": 4,
"O.VULNERABILITY_ANALYSIS_TEST": 1
},
"OE": {
"OE.CRYPTANALYTIC": 4,
"OE.NO_GENERAL_PURPOSE": 1,
"OE.NO_TOE_BYPASS": 1,
"OE.PHYSICAL": 1
},
"T": {
"T.ADDRESS_MASQUER": 1,
"T.ADDRESS_MASQUERADE": 1,
"T.ADMIN_": 1,
"T.ADMIN_ERROR": 2,
"T.ADMIN_ROGUE": 2,
"T.AUDIT_": 1,
"T.AUDIT_COMPROMISE": 1,
"T.CRYPTO_": 1,
"T.CRYPTO_COMPROMISE": 2,
"T.FLAWED_DESIGN": 2,
"T.FLAWED_IMPLEMENT": 1,
"T.FLAWED_IMPLEMENTATION": 1,
"T.MALICIOUS_TSF_": 1,
"T.MALICIOUS_TSF_COM": 1,
"T.MASQUERADE": 2,
"T.POOR_TEST": 2,
"T.REPLAY": 2,
"T.RESIDUAL_DATA": 2,
"T.RESOURCE_EXHAUST": 1,
"T.RESOURCE_EXHAUSTION": 1,
"T.SPOOFING": 2,
"T.UNATTENDED_SESSIO": 1,
"T.UNATTENDED_SESSION": 1,
"T.UNAUTHORIZED_ACC": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_PEE": 1,
"T.UNAUTHORIZED_PEER": 1,
"T.UNIDENTIFIED_ACTIO": 1,
"T.UNIDENTIFIED_ACTIONS": 1,
"T.UNKNOWN_STATE": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 26,
"ADV_FSP.1": 2,
"ADV_FSP.2": 3,
"ADV_FSP.4": 1,
"ADV_FSP.5": 18,
"ADV_IMP.1": 15,
"ADV_IMP.2": 1,
"ADV_INT.1": 3,
"ADV_INT.3": 8,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 28
},
"AGD": {
"AGD_OPE.1": 19,
"AGD_PRE.1": 14
},
"ALC": {
"ALC_CMC.4": 20,
"ALC_CMS.1": 1,
"ALC_CMS.4": 10,
"ALC_DEL.1": 9,
"ALC_DVS.1": 11,
"ALC_FLR.2": 17,
"ALC_LCD.1": 12,
"ALC_TAT.1": 13
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 11,
"ATE_DPT.3": 13,
"ATE_FUN.1": 15,
"ATE_IND.2": 11
},
"AVA": {
"AVA_VAN.4": 19
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 11,
"FAU_ARP.1.1": 2,
"FAU_GEN": 15,
"FAU_GEN.1": 3,
"FAU_GEN.2": 2,
"FAU_SAA": 9,
"FAU_SAA.1": 4,
"FAU_SAR": 2,
"FAU_SAR.1": 10,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 2,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 2,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1,
"FAU_SEL": 9,
"FAU_SEL.1": 1,
"FAU_STG": 17,
"FAU_STG.1": 2,
"FAU_STG.3": 9,
"FAU_STG.3.1": 3,
"FAU_UAU.1": 1
},
"FCS": {
"FCS_BCM": 1,
"FCS_CKM": 3,
"FCS_CKM.1": 21,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 6,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 10,
"FCS_CKM.4.1": 2,
"FCS_COP": 2,
"FCS_COP.1": 29,
"FCS_COP.1.1": 16
},
"FDP": {
"FDP_ACF": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 21,
"FDP_IFC.1.1": 2,
"FDP_IFF": 3,
"FDP_IFF.1": 21,
"FDP_IFF.1.1": 4,
"FDP_IFF.1.2": 6,
"FDP_IFF.1.3": 4,
"FDP_IFF.1.4": 2,
"FDP_IFF.1.5": 2,
"FDP_IFF.1.6": 3,
"FDP_RIP.2": 7,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 2,
"FIA_UAU": 1,
"FIA_UAU.1": 23,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 6,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 1,
"FIA_UID.1": 2,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1
},
"FMT": {
"FMT_MOF.1": 56,
"FMT_MOF.1.1": 8,
"FMT_MSA.1": 7,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 2,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 29,
"FMT_MTD.1.1": 3,
"FMT_MTD.2": 15,
"FMT_MTD.2.1": 3,
"FMT_MTD.2.2": 4,
"FMT_REV.1": 7,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 3,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 1,
"FMT_SMR.2": 8,
"FMT_SMR.2.1": 2,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1
},
"FPT": {
"FPT_ITC.1": 1,
"FPT_RCV.1": 6,
"FPT_RCV.1.1": 1,
"FPT_RPL.1": 8,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_RSA.1": 1,
"FPT_STM.1": 10,
"FPT_STM.1.1": 1,
"FPT_TRP": 1,
"FPT_TST": 1,
"FPT_TST.1": 23,
"FPT_TST.1.1": 6,
"FPT_TST.1.2": 6,
"FPT_TST.1.3": 6
},
"FRU": {
"FRU_RSA.1": 22,
"FRU_RSA.1.1": 4
},
"FTA": {
"FTA_SSL": 1,
"FTA_SSL.1": 8,
"FTA_SSL.1.1": 2,
"FTA_SSL.1.2": 2,
"FTA_SSL.2": 6,
"FTA_SSL.2.1": 1,
"FTA_SSL.2.2": 2,
"FTA_SSL.3": 6,
"FTA_SSL.3.1": 2,
"FTA_TAB.1": 6,
"FTA_TAB.1.1": 2,
"FTA_TSE": 1,
"FTA_TSE.1": 5,
"FTA_TSE.1.1": 3
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 30,
"FTP_ITC.1.1": 8,
"FTP_ITC.1.2": 10,
"FTP_ITC.1.3": 7,
"FTP_TRP": 1,
"FTP_TRP.1": 23,
"FTP_TRP.1.1": 7,
"FTP_TRP.1.2": 7,
"FTP_TRP.1.3": 8
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 5,
"IKEv1": 2
},
"IPsec": {
"IPsec": 2
},
"VPN": {
"VPN": 86
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2,
"Key agreement": 1
},
"KEX": {
"Key Exchange": 10
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 4,
"P-384": 4,
"P-521": 4
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 2,
"SHA-384": 3,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 9
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140": 2,
"FIPS 140-2": 17,
"FIPS 180-2": 1,
"FIPS PUB 140": 1,
"FIPS PUB 140-2": 13,
"FIPS PUB 140-3": 1,
"FIPS PUB 186-2": 1,
"FIPS PUB 186-3": 3,
"FIPS PUB 197": 1
},
"NIST": {
"NIST SP 800-57": 8
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 2404": 4,
"RFC 2406": 5,
"RFC 2409": 10,
"RFC 2451": 2,
"RFC 4869": 1,
"RFC 792": 1,
"RFC2409": 1
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
},
"Rijndael": {
"Rijndael": 1
}
},
"DES": {
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "admin",
"/CreationDate": "D:20090209135229",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20090209135229",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": "VPN PP",
"pdf_file_size_bytes": 1304266,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.niap-ccevs.org/cc-scheme/pp/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 175
},
"report_filename": "",
"report_keywords": null,
"report_metadata": null
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ec0d780d4123a844ad8a7bddcfa2a8b9f0262af24613d757b2e82a642f950cc7",
"txt_hash": "3e8cfd0d979e3053d57c3ee63491fb9163f2caa00d948b8f3e3e607cf1671486"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": false,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "6adef86c67e4bbbcbc8872bedf10c93c33839884a5cb1ca1d36f080444041ca7",
"txt_hash": null
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Network and Network-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "U.S. Government Virtual Private Network Boundary Gateway for Medium Robustness Environments, Version 1.2",
"not_valid_after": "2009-10-01",
"not_valid_before": "2009-01-30",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VPN_MR_V1.2.pdf",
"report_link": "https://www.commoncriteriaportal.org#no_cert",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.4",
"AVA_CCA_(EXT).1",
"Medium"
]
},
"status": "archived",
"version": "1.2"
}
}