U.S. Government Virtual Private Network Boundary Gateway for Medium Robustness Environments, Version 1.0

Web information ?

Status: archived
Certification date: 2006-02-23
Archived date: 2008-03-21
Scheme: 🇺🇸
Category: Network and Network-Related Devices and Systems
Security level: Medium

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, Rijndael
Schemes
Key Exchange
Protocols
IKE, VPN

Security level
EAL 4
Claims
T.EAVESDROP
Certificates
CCEVS-VR-06-0015

Standards
FIPS PUB 140-2, FIPS PUB 197, RFC 2406, RFC 2409, RFC 2451, RFC 2404

File metadata

Title Validation Report
Subject VPN Medium Robustness PP
Author Jerome Myers
Creation date D:20060512133823Z
Modification date D:20060512094227-04'00'
Pages 15
Creator Acrobat PDFMaker 5.0 for Word
Producer Acrobat Distiller 5.0.5 (Windows)

Profile ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDEA
Asymmetric Algorithms
ECDSA, Diffie-Hellman, DSA
Hash functions
SHA-1
Schemes
MAC, Key Exchange, Key Agreement, Key agreement
Protocols
IKE, IPsec, VPN
Randomness
PRNG, RNG

Vendor
Microsoft

Security level
EAL2
Claims
O.ADMIN_ROLE, O.AUDIT_GENERATION, O.AUDIT_PROTECTION, O.AUDIT_REVIEW, O.CHANGE_MANAGEMENT, O.CORRECT_, O.CRYPTOGRAPHIC_, O.CRYPTOGRAPHY_, O.DISPLAY_BANNER, O.DOCUMENT_KEY_LEAKAGE, O.INTEGRITY, O.MAINT_MODE, O.MANAGE, O.MEDIATE, O.PEER_AUTHENTICTION, O.REPLAY_DETECTION, O.RESIDUAL_INFORMATION, O.RESOURCE_SHARING, O.ROBUST_ADMIN_GUIDANCE, O.ROBUST_TOE_ACCESS, O.SELF_PROTECTION, O.SOUND_DESIGN, O.SOUND_IMPLEMENTATION, O.THOROUGH_FUNCTIONAL_, O.TIME_STAMPS, O.TRUSTED_PATH, O.VULNERABILITY_ANALYSIS_, O.VULNERABILITY_ANALYSIS, O.VULNERABILITY_ANALYSIS_TES, O.THOROUGH_FUNCTIONAL_T, O.THOROUGH_FUNCTIONAL_TESTI, O.PEER_AUTHENTICATION, O.CORRECT_TSF_OPERATION, O.CRYPTOGRAPHIC_FUNCTIO, O.CRYPTOGRAPHIC_FUNCTIONS, O.CRYPTOGRAPHY_VALIDATE, O.CRYPTOGRAPHY_VALIDATED, O.CRYPTOGRAPHIC_FUNC, O.CRYPTOGRAPHY_VALID, O.DOCUMENT_KEY_, O.RESIDUAL_INFORMATIO, O.ROBUST_ADMIN_GUIDA, O.SOUND_IMPLEMENTATI, O.THOROUGH_FUNCTIONA, O.FUNCTIONAL_TESTING, O.VULNERABILITY_ANAL, O.VULNERABILITY_ANALYSIS_TEST, T.ADDRESS_MASQUERADE, T.ADMIN_ERROR, T.ADMIN_ROGUE, T.AUDIT_COMPROMISE, T.CRYPTO_COMPROMISE, T.FLAWED_DESIGN, T.FLAWED_IMPLEMENTATION, T.MALICIOUS_TSF_, T.MASQUERADE, T.POOR_TEST, T.REPLAY, T.RESIDUAL_DATA, T.RESOURCE_EXHAUSTION, T.SPOOFING, T.UNATTENDED_SESSION, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_PEER, T.UNIDENTIFIED_ACTIONS, T.UNKNOWN_STATE, T.ADDRESS_MASQUER, T.ADMIN_, T.AUDIT_, T.CRYPTO_, T.FLAWED_IMPLEMENT, T.RESOURCE_EXHAUST, T.MALICIOUS_TSF_COM, T.UNATTENDED_SESSIO, T.UNAUTHORIZED_ACC, T.UNAUTHORIZED_PEE, T.UNIDENTIFIED_ACTIO, A.NO_GENERAL_PURPOSE, A.PHYSICAL, A.NO_TOE_BYPASS, OE.CRYPTANALYTIC, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_RCR.1, ADV_SPM.1, ADV_IMP.1, ADV_INT, ADV_HLD_EXP, ADV_ING, ADV_RCR, ADV_FSP_EXP, ADV_ARC_EXP, ADV_LLD_EXP, ADV_INT_EXP, AGD_ADM.1, AGD_USR.1, AGD_ING, AGD_ADM, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3, AVA_CCA_EXP.2, AVA_VLA
Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_SAA, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL, FAU_STG, FAU_STG.3, FAU_ARP.1.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1, FAU_STG.1, FAU_STG.3.1, FAU_SAR, FAU_ARP, FAU_UAU.1, FCO_NRO, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_BCM, FCS_CKM.1.1, FCS_CKM_EXP.1.1, FCS_CKM_EXP.1.2, FCS_CKM.2.1, FCS_COP.1.1, FCS_COP, FCS_CKM.4.1, FDP_IFC.1, FDP_IFF, FDP_RIP.2, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.6, FDP_RIP.2.1, FDP_IFC, FDP_ACF, FDP_ACC, FIA_AFL, FIA_ATD.1, FIA_UAU.1, FIA_UAU.2, FIA_UID.2, FIA_USB.1, FIA_AFL.1, FIA_UAU.1.1, FIA_ATD.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UID.1.2, FIA_UID.1.1, FIA_UAU.5, FIA_UAU, FIA_UID.2.1, FIA_USB.1.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA, FMT_MTD.1, FMT_MTD.2, FMT_REV.1, FMT_SMR.2, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_REV.1.1, FMT_REV.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1.1, FMT_MSA.2, FMT_SMR.1, FPT_RCV.1, FPT_RPL.1, FPT_RVM.1, FPT_SEP.2, FPT_STM.1, FPT_RCV.1.1, FPT_RPL.1.1, FPT_RPL.1.2, FPT_RVM.1.1, FPT_SEP.2.1, FPT_SEP.2.2, FPT_SEP.2.3, FPT_STM.1.1, FPT_TST.1.2, FPT_SEP, FPT_RVM, FPT_ITC.1, FPT_TRP, FPT_TST, FPT_RSA.1, FPT_SEP.1, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL.1, FTA_SSL.2, FTA_SSL.3, FTA_TAB.1, FTA_TSE.1, FTA_TSE, FTA_SSL.1.1, FTA_SSL.1.2, FTA_SSL.2.1, FTA_SSL.2.2, FTA_SSL.3.1, FTA_TAB.1.1, FTA_TSE.1.1, FTA_SSL, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ITC, FTP_TRP

Standards
FIPS PUB 140-2, FIPS PUB 197, FIPS 140-2, FIPS 40-2, FIPS PUB 180-2, FIPS PUB 171, FIPS PUB 46-3, FIPS PUB 17122, FIPS PUB 186-227, FIPS PUB 186-3, FIPS PUB 186-2, FIPS 140, FIPS140-2, PKCS #8, PKCS #12, PKCS #5, PKCS #11, PKCS#12, PKCS#1, RFC 2409, RFC 2406, RFC 2451, RFC 2404, RFC 792, RFC2409, X.509

File metadata

Title VPN PP
Author admin
Creation date D:20061025093559-04'00'
Modification date D:20061025094051-04'00'
Pages 210
Creator Acrobat PDFMaker 7.0.7 for Word
Producer Acrobat Distiller 7.0.5 (Windows)

References ?

No references are available for this protection profile.

Updates ?

  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name U.S. Government Virtual Private Network Boundary Gateway for Medium Robustness Environments, Version 1.0 was processed.

Raw data

{
  "_id": "04c9ad5e8c95d2a1",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "04c9ad5e8c95d2a1",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "PP_VPN_MR_V1.0.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_GENERAL_PURPOSE": 1,
          "A.NO_TOE_BYPASS": 1,
          "A.PHYSICAL": 1
        },
        "O": {
          "O.ADMIN_ROLE": 8,
          "O.AUDIT_GENERATION": 4,
          "O.AUDIT_PROTECTION": 4,
          "O.AUDIT_REVIEW": 4,
          "O.CHANGE_MANAGEMENT": 6,
          "O.CORRECT_": 5,
          "O.CORRECT_TSF_OPERATION": 1,
          "O.CRYPTOGRAPHIC_": 1,
          "O.CRYPTOGRAPHIC_FUNC": 1,
          "O.CRYPTOGRAPHIC_FUNCTIO": 1,
          "O.CRYPTOGRAPHIC_FUNCTIONS": 2,
          "O.CRYPTOGRAPHY_": 1,
          "O.CRYPTOGRAPHY_VALID": 1,
          "O.CRYPTOGRAPHY_VALIDATE": 1,
          "O.CRYPTOGRAPHY_VALIDATED": 2,
          "O.DISPLAY_BANNER": 6,
          "O.DOCUMENT_KEY_": 1,
          "O.DOCUMENT_KEY_LEAKAGE": 3,
          "O.FUNCTIONAL_TESTING": 1,
          "O.INTEGRITY": 5,
          "O.MAINT_MODE": 4,
          "O.MANAGE": 6,
          "O.MEDIATE": 6,
          "O.PEER_AUTHENTICATION": 4,
          "O.PEER_AUTHENTICTION": 1,
          "O.REPLAY_DETECTION": 5,
          "O.RESIDUAL_INFORMATIO": 1,
          "O.RESIDUAL_INFORMATION": 11,
          "O.RESOURCE_SHARING": 4,
          "O.ROBUST_ADMIN_GUIDA": 1,
          "O.ROBUST_ADMIN_GUIDANCE": 4,
          "O.ROBUST_TOE_ACCESS": 11,
          "O.SELF_PROTECTION": 8,
          "O.SOUND_DESIGN": 6,
          "O.SOUND_IMPLEMENTATI": 1,
          "O.SOUND_IMPLEMENTATION": 3,
          "O.THOROUGH_FUNCTIONA": 1,
          "O.THOROUGH_FUNCTIONAL_": 1,
          "O.THOROUGH_FUNCTIONAL_T": 2,
          "O.THOROUGH_FUNCTIONAL_TESTI": 2,
          "O.TIME_STAMPS": 4,
          "O.TRUSTED_PATH": 10,
          "O.VULNERABILITY_ANAL": 1,
          "O.VULNERABILITY_ANALYSIS": 4,
          "O.VULNERABILITY_ANALYSIS_": 1,
          "O.VULNERABILITY_ANALYSIS_TES": 4,
          "O.VULNERABILITY_ANALYSIS_TEST": 2
        },
        "OE": {
          "OE.CRYPTANALYTIC": 4,
          "OE.NO_GENERAL_PURPOSE": 1,
          "OE.PHYSICAL": 1
        },
        "T": {
          "T.ADDRESS_MASQUER": 1,
          "T.ADDRESS_MASQUERADE": 1,
          "T.ADMIN_": 1,
          "T.ADMIN_ERROR": 2,
          "T.ADMIN_ROGUE": 2,
          "T.AUDIT_": 1,
          "T.AUDIT_COMPROMISE": 1,
          "T.CRYPTO_": 1,
          "T.CRYPTO_COMPROMISE": 2,
          "T.FLAWED_DESIGN": 2,
          "T.FLAWED_IMPLEMENT": 1,
          "T.FLAWED_IMPLEMENTATION": 1,
          "T.MALICIOUS_TSF_": 1,
          "T.MALICIOUS_TSF_COM": 1,
          "T.MASQUERADE": 2,
          "T.POOR_TEST": 2,
          "T.REPLAY": 2,
          "T.RESIDUAL_DATA": 2,
          "T.RESOURCE_EXHAUST": 1,
          "T.RESOURCE_EXHAUSTION": 1,
          "T.SPOOFING": 2,
          "T.UNATTENDED_SESSIO": 1,
          "T.UNATTENDED_SESSION": 1,
          "T.UNAUTHORIZED_ACC": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_PEE": 1,
          "T.UNAUTHORIZED_PEER": 1,
          "T.UNIDENTIFIED_ACTIO": 1,
          "T.UNIDENTIFIED_ACTIONS": 1,
          "T.UNKNOWN_STATE": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 13,
          "ACM_CAP.4": 22,
          "ACM_SCP.2": 9
        },
        "ADO": {
          "ADO_DEL.2": 11,
          "ADO_IGS.1": 9
        },
        "ADV": {
          "ADV_ARC_EXP": 3,
          "ADV_FSP_EXP": 3,
          "ADV_HLD_EXP": 4,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 11,
          "ADV_ING": 1,
          "ADV_INT": 1,
          "ADV_INT_EXP": 1,
          "ADV_LLD_EXP": 1,
          "ADV_RCR": 9,
          "ADV_RCR.1": 11,
          "ADV_SPM.1": 12
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 16,
          "AGD_ING": 1,
          "AGD_USR.1": 11
        },
        "ALC": {
          "ALC_DVS.1": 11,
          "ALC_FLR.2": 12,
          "ALC_LCD.1": 10,
          "ALC_TAT.1": 11
        },
        "ATE": {
          "ATE_COV.2": 10,
          "ATE_DPT.2": 11,
          "ATE_FUN.1": 12,
          "ATE_IND.2": 11
        },
        "AVA": {
          "AVA_CCA_EXP.2": 1,
          "AVA_MSU.2": 15,
          "AVA_SOF.1": 10,
          "AVA_VLA": 1,
          "AVA_VLA.3": 21
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 11,
          "FAU_ARP.1.1": 2,
          "FAU_GEN": 15,
          "FAU_GEN.1": 3,
          "FAU_GEN.2": 2,
          "FAU_SAA": 9,
          "FAU_SAA.1": 3,
          "FAU_SAR": 2,
          "FAU_SAR.1": 10,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 2,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 2,
          "FAU_SAR.3": 8,
          "FAU_SAR.3.1": 1,
          "FAU_SEL": 9,
          "FAU_SEL.1": 1,
          "FAU_STG": 17,
          "FAU_STG.1": 2,
          "FAU_STG.3": 9,
          "FAU_STG.3.1": 2,
          "FAU_UAU.1": 1
        },
        "FCO": {
          "FCO_NRO": 2
        },
        "FCS": {
          "FCS_BCM": 3,
          "FCS_CKM": 2,
          "FCS_CKM.1": 21,
          "FCS_CKM.1.1": 4,
          "FCS_CKM.2": 7,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 10,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXP.1.1": 1,
          "FCS_CKM_EXP.1.2": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 35,
          "FCS_COP.1.1": 6
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACF": 1,
          "FDP_IFC": 2,
          "FDP_IFC.1": 21,
          "FDP_IFC.1.1": 2,
          "FDP_IFF": 24,
          "FDP_IFF.1": 20,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.6": 1,
          "FDP_RIP.2": 7,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_AFL": 5,
          "FIA_AFL.1": 4,
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 2,
          "FIA_UAU": 1,
          "FIA_UAU.1": 22,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 1,
          "FIA_UID.1": 2,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_UID.2": 9,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 57,
          "FMT_MOF.1.1": 8,
          "FMT_MSA": 11,
          "FMT_MSA.1": 6,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 7,
          "FMT_MTD.1": 29,
          "FMT_MTD.1.1": 3,
          "FMT_MTD.2": 15,
          "FMT_MTD.2.1": 3,
          "FMT_MTD.2.2": 4,
          "FMT_REV.1": 6,
          "FMT_REV.1.1": 2,
          "FMT_REV.1.2": 3,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 2,
          "FMT_SMR.2": 9,
          "FMT_SMR.2.1": 2,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_ITC.1": 1,
          "FPT_RCV.1": 6,
          "FPT_RCV.1.1": 1,
          "FPT_RPL.1": 8,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_RSA.1": 1,
          "FPT_RVM": 23,
          "FPT_RVM.1": 10,
          "FPT_RVM.1.1": 1,
          "FPT_SEP": 27,
          "FPT_SEP.1": 1,
          "FPT_SEP.2": 8,
          "FPT_SEP.2.1": 1,
          "FPT_SEP.2.2": 1,
          "FPT_SEP.2.3": 2,
          "FPT_STM.1": 10,
          "FPT_STM.1.1": 1,
          "FPT_TRP": 1,
          "FPT_TST": 1,
          "FPT_TST.1.2": 1
        },
        "FRU": {
          "FRU_RSA.1": 22,
          "FRU_RSA.1.1": 3
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.1": 8,
          "FTA_SSL.1.1": 2,
          "FTA_SSL.1.2": 2,
          "FTA_SSL.2": 6,
          "FTA_SSL.2.1": 1,
          "FTA_SSL.2.2": 2,
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 2,
          "FTA_TAB.1": 6,
          "FTA_TAB.1.1": 2,
          "FTA_TSE": 1,
          "FTA_TSE.1": 5,
          "FTA_TSE.1.1": 3
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 30,
          "FTP_ITC.1.1": 8,
          "FTP_ITC.1.2": 8,
          "FTP_ITC.1.3": 6,
          "FTP_TRP": 1,
          "FTP_TRP.1": 23,
          "FTP_TRP.1.1": 7,
          "FTP_TRP.1.2": 7,
          "FTP_TRP.1.3": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 6
        },
        "IPsec": {
          "IPsec": 1
        },
        "VPN": {
          "VPN": 85
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 5,
          "Key agreement": 2
        },
        "KEX": {
          "Key Exchange": 11
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RNG": 40
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140": 2,
          "FIPS 140-2": 17,
          "FIPS 40-2": 1,
          "FIPS PUB 140-2": 18,
          "FIPS PUB 171": 6,
          "FIPS PUB 17122": 1,
          "FIPS PUB 180-2": 3,
          "FIPS PUB 186-2": 2,
          "FIPS PUB 186-227": 1,
          "FIPS PUB 186-3": 2,
          "FIPS PUB 197": 2,
          "FIPS PUB 46-3": 2,
          "FIPS140-2": 1
        },
        "PKCS": {
          "PKCS #11": 2,
          "PKCS #12": 2,
          "PKCS #5": 2,
          "PKCS #8": 2,
          "PKCS#1": 1,
          "PKCS#12": 2
        },
        "RFC": {
          "RFC 2404": 4,
          "RFC 2406": 5,
          "RFC 2409": 11,
          "RFC 2451": 2,
          "RFC 792": 1,
          "RFC2409": 1
        },
        "X509": {
          "X.509": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 15
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 5
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "admin",
      "/CreationDate": "D:20061025093559-04\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 for Word",
      "/ModDate": "D:20061025094051-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/SourceModified": "D:20061025133448",
      "/Title": "VPN PP",
      "pdf_file_size_bytes": 1047068,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 210
    },
    "report_filename": "PP_VPN_MR_V1.0-vr.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-06-0015": 1
        }
      },
      "cc_claims": {
        "T": {
          "T.EAVESDROP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "VPN": {
          "VPN": 35
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS PUB 140-2": 4,
          "FIPS PUB 197": 1
        },
        "RFC": {
          "RFC 2404": 2,
          "RFC 2406": 3,
          "RFC 2409": 2,
          "RFC 2451": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          },
          "Rijndael": {
            "Rijndael": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Jerome Myers",
      "/CreationDate": "D:20060512133823Z",
      "/Creator": "Acrobat PDFMaker 5.0 for Word",
      "/ModDate": "D:20060512094227-04\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0.5 (Windows)",
      "/Subject": "VPN Medium Robustness PP",
      "/Title": "Validation Report",
      "pdf_file_size_bytes": 277167,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e657a018acb1dd8af72c3f05d5813f85ee65b96b3101591fda62627a5c6f9b9f",
      "txt_hash": "235013a2eeb1b9e18db46d52b0d29e0ab3b52a660ad6c9cf6b66bc6c54b610b1"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c0f5c66ed0396f94b6363b0beb70c5affe79688abaf550fda32f91b360a758a7",
      "txt_hash": "8735b6033b0910869f18bad3569d326b99b6871031fc5a5e3b93c72b5f2b3048"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Network and Network-Related Devices and Systems",
    "is_collaborative": false,
    "maintenances": [],
    "name": "U.S. Government Virtual Private Network Boundary Gateway for Medium Robustness Environments, Version 1.0",
    "not_valid_after": "2008-03-21",
    "not_valid_before": "2006-02-23",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VPN_MR_V1.0.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VPN_MR_V1.0-vr.pdf",
    "scheme": "US",
    "security_level": {
      "_type": "Set",
      "elements": [
        "Medium"
      ]
    },
    "status": "archived",
    "version": "1.0"
  }
}