Protection Profile for IPsec Virtual Private Network (VPN) Clients

Web information ?

Status: archived
Certification date: 2013-10-21
Archived date: 2017-12-26
Scheme: 🇺🇸
Category: Data Protection
Security level: EAL1

Certification report ?

Extracted keywords

Schemes
Key Exchange
Protocols
IKE, IPsec, VPN

Vendor
Samsung

Claims
O.VPN_TUNNEL, O.RESIDUAL_INFORMATION_CLEARING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, T.TSF_CONFIGURATION, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_TOE_BYPASS, A.PHYSICAL, A.TRUSTED_CONFIG, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.TRUSTED_CONFIG
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_PRE, AGD_OPE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_SEL, FCS_CKM.1, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FDP_RIP, FDP_IFC_EXT, FIA_PSK_EXT, FMT_SMF, FMT_SMF.1, FPT_TST_EXT, FPT_TUD_EXT, FRU_RSA, FTP_ITC
Evaluation facilities
Gossamer Security

Standards
X.509

File metadata

Creation date D:20150417145158-04'00'
Modification date D:20150417164134-04'00'
Pages 10

Profile ?

Extracted keywords

Symmetric Algorithms
AES, AES-, DES, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224
Schemes
MAC, Key Exchange
Protocols
IKE, IKEv2, IKEv1, IPsec, VPN
Randomness
DRBG, RNG, RBG
Elliptic Curves
P-256, P-384, P-521, curve P-384, P-284
Block cipher modes
CBC, GCM, CCM

Claims
O.VPN_TUNNEL, O.TOE_CONFIGURATION, O.VERIFIABLE_UPDATES, O.RESIDUAL_INFORMATION_CLEARING, O.TSF_SELF_TEST, O.TOE_ADMINISTRATION, T.UNAUTHORIZED_ACCESS, T.TSF_CONFIGURATION, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.TSF_FAILURE, A.NO_TOE_BYPASS, A.PHYSICAL, A.TRUSTED_CONFIG, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.TRUSTED_CONFIG
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, AGD_OPR, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMS.2, ATE_IND.1, ATE_IND, AVA_VAN.1, AVA_VAN
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1, FAU_SEL, FAU_SEL.1.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM_EXT.2, FCS_CKM_EXT.2.1, FCS_CKM_EXT.4.1, FCS_COP, FCS_RBG_EXT.1, FCS_RBG_EXT, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FDP_IFC, FDP_RIP.2, FDP_RIP, FDP_RIP.2.1, FDP_IFC_EXT.1, FDP_IFC_EXT.1.1, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FMT_SMF.1, FMT_SMF, FMT_SMF.1.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_TST_EXT.1.2, FPT_TST_EXT, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2

Side-channel analysis
malfunction

Standards
FIPS PUB 186-4, FIPS 186-4, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 180-4, FIPS 140-2, SP 800-56A, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-57, NIST SP 800-57A, SP 800-90A, RFC 4301, RFC 2406, RFC 4303, RFC 4106, RFC 3602, RFC 4109, RFC 4304, RFC 4868, RFC 5996, RFC 6379, RFC 5282, RFC 4945, RFC 5280, RFC 2560, RFC 5759, RFC 2865, RFC 2868, RFC 3575, RFC 3579, RFC 3580, RFC 5216, X.509

File metadata

Title Security Requirements for WLAN Clients
Creation date D:20131205104426-05'00'
Modification date D:20150417164153-04'00'
Pages 83
Creator Acrobat PDFMaker 10.1 for Word
Producer Adobe PDF Library 10.0

References ?

Updates ?

  • 04.02.2025 The protection profile was first processed.
    New Protection Profile

    A new Protection Profile with the name Protection Profile for IPsec Virtual Private Network (VPN) Clients was processed.

Raw data

{
  "_id": "db7434eb64f09c94",
  "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
  "dgst": "db7434eb64f09c94",
  "heuristics": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
  },
  "pdf_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
    "pp_filename": "pp_vpn_ipsec_client_v1.4.pdf",
    "pp_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 7
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 11
          }
        },
        "FF": {
          "DH": {
            "DH": 16,
            "Diffie-Hellman": 4
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_TOE_BYPASS": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED_CONFIG": 1
        },
        "O": {
          "O.RESIDUAL_INFORMATION_CLEARING": 2,
          "O.TOE_ADMINISTRATION": 1,
          "O.TOE_CONFIGURATION": 1,
          "O.TSF_SELF_TEST": 2,
          "O.VERIFIABLE_UPDATES": 2,
          "O.VPN_TUNNEL": 2
        },
        "OE": {
          "OE.NO_TOE_BYPASS": 1,
          "OE.PHYSICAL": 1,
          "OE.TRUSTED_CONFIG": 1
        },
        "T": {
          "T.TSF_CONFIGURATION": 3,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 3,
          "T.UNAUTHORIZED_UPDATE": 3,
          "T.USER_DATA_REUSE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 9
        },
        "AGD": {
          "AGD_OPE": 4,
          "AGD_OPE.1": 12,
          "AGD_OPR": 1,
          "AGD_PRE": 2,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.1": 6,
          "ALC_CMC.2": 1,
          "ALC_CMS.1": 2,
          "ALC_CMS.2": 4
        },
        "ATE": {
          "ATE_IND": 4,
          "ATE_IND.1": 6
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.1": 7
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 2,
          "FAU_GEN.1.1": 2,
          "FAU_GEN.1.2": 2,
          "FAU_SEL": 1,
          "FAU_SEL.1": 2,
          "FAU_SEL.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 6,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 1,
          "FCS_CKM_EXT.2": 2,
          "FCS_CKM_EXT.2.1": 1,
          "FCS_CKM_EXT.4": 4,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_COP": 3,
          "FCS_COP.1": 21,
          "FCS_COP.1.1": 6,
          "FCS_RBG_EXT": 1,
          "FCS_RBG_EXT.1": 5,
          "FCS_RBG_EXT.1.1": 3,
          "FCS_RBG_EXT.1.2": 4
        },
        "FDP": {
          "FDP_IFC": 2,
          "FDP_IFC_EXT.1": 2,
          "FDP_IFC_EXT.1.1": 1,
          "FDP_RIP": 1,
          "FDP_RIP.2": 4,
          "FDP_RIP.2.1": 1
        },
        "FIA": {
          "FIA_PSK_EXT": 3,
          "FIA_PSK_EXT.1": 1,
          "FIA_PSK_EXT.1.1": 1,
          "FIA_PSK_EXT.1.2": 2,
          "FIA_PSK_EXT.1.3": 3
        },
        "FMT": {
          "FMT_SMF": 3,
          "FMT_SMF.1": 5,
          "FMT_SMF.1.1": 2
        },
        "FPT": {
          "FPT_TST_EXT": 1,
          "FPT_TST_EXT.1": 4,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.1.2": 3,
          "FPT_TUD_EXT.1": 7,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 3,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CCM": {
          "CCM": 1
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 35,
          "IKEv1": 21,
          "IKEv2": 17
        },
        "IPsec": {
          "IPsec": 57
        },
        "VPN": {
          "VPN": 180
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        },
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 18,
          "P-284": 6,
          "P-384": 7,
          "P-521": 18,
          "curve P-384": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 2
        },
        "RNG": {
          "RBG": 25,
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-4": 5,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 7,
          "FIPS PUB 197": 1,
          "FIPS PUB 198-1": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1,
          "NIST SP 800-38D": 1,
          "NIST SP 800-57": 3,
          "NIST SP 800-57A": 1,
          "SP 800-56A": 1,
          "SP 800-90A": 1
        },
        "RFC": {
          "RFC 2406": 1,
          "RFC 2560": 1,
          "RFC 2865": 1,
          "RFC 2868": 1,
          "RFC 3575": 1,
          "RFC 3579": 1,
          "RFC 3580": 1,
          "RFC 3602": 1,
          "RFC 4106": 1,
          "RFC 4109": 1,
          "RFC 4301": 2,
          "RFC 4303": 2,
          "RFC 4304": 1,
          "RFC 4868": 2,
          "RFC 4945": 1,
          "RFC 5216": 1,
          "RFC 5280": 2,
          "RFC 5282": 1,
          "RFC 5759": 1,
          "RFC 5996": 1,
          "RFC 6379": 1
        },
        "X509": {
          "X.509": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14,
            "AES-": 2
          }
        },
        "DES": {
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 8,
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "pp_metadata": {
      "/Author": "",
      "/ContentTypeId": "0x0101008DE54E388F87EF4D83BC9887E31FF0E8",
      "/CreationDate": "D:20131205104426-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 for Word",
      "/ModDate": "D:20150417164153-04\u002700\u0027",
      "/Producer": "Adobe PDF Library 10.0",
      "/SourceModified": "D:20131205154408",
      "/Title": "Security Requirements for WLAN Clients",
      "pdf_file_size_bytes": 594357,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 83
    },
    "report_filename": "pp_vpn_ipsec_client_v1.4-vr.pdf",
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_TOE_BYPASS": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED_CONFIG": 1
        },
        "O": {
          "O.RESIDUAL_INFORMATION_CLEARING": 1,
          "O.TOE_ADMINISTRATION": 1,
          "O.TSF_SELF_TEST": 1,
          "O.VERIFIABLE_UPDATES": 1,
          "O.VPN_TUNNEL": 1
        },
        "OE": {
          "OE.NO_TOE_BYPASS": 1,
          "OE.PHYSICAL": 1,
          "OE.TRUSTED_CONFIG": 1
        },
        "T": {
          "T.TSF_CONFIGURATION": 1,
          "T.TSF_FAILURE": 1,
          "T.UNAUTHORIZED_ACCESS": 1,
          "T.UNAUTHORIZED_UPDATE": 1,
          "T.USER_DATA_REUSE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ": 1,
          "APE_REQ.1": 1
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SEL": 1
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM_EXT": 2,
          "FCS_COP.1": 4,
          "FCS_RBG_EXT": 1
        },
        "FDP": {
          "FDP_IFC_EXT": 1,
          "FDP_RIP": 1
        },
        "FIA": {
          "FIA_PSK_EXT": 1
        },
        "FMT": {
          "FMT_SMF": 2,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_TST_EXT": 1,
          "FPT_TUD_EXT": 1
        },
        "FRU": {
          "FRU_RSA": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 4
        },
        "IPsec": {
          "IPsec": 16
        },
        "VPN": {
          "VPN": 45
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Gossamer": {
          "Gossamer Security": 6
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 14
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20150417145158-04\u002700\u0027",
      "/ModDate": "D:20150417164134-04\u002700\u0027",
      "pdf_file_size_bytes": 405781,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 10
    }
  },
  "state": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
    "pp": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d9a7e9af70a9f89822580c8b484d5efa633e24f4c3e96ae4cecc52965e3e1212",
      "txt_hash": "3c4a6cdd9dd8462aa42e42a1d424ceb501458bb7ca385fa6ccbab0615f7d1535"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fbd3fef58e62f82d58947852a6ae600ac114183837f774fc25cf3156465b248e",
      "txt_hash": "4d920faddccc8ab320a030f2dc81d7d61f5bfebca09470ee8acc4fda17013708"
    }
  },
  "web_data": {
    "_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
    "category": "Data Protection",
    "is_collaborative": false,
    "maintenances": [],
    "name": "Protection Profile for IPsec Virtual Private Network (VPN) Clients",
    "not_valid_after": "2017-12-26",
    "not_valid_before": "2013-10-21",
    "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf",
    "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4-vr.pdf",
    "scheme": "US",
    "security_level": {
      "_type": "Set",
      "elements": [
        "EAL1"
      ]
    },
    "status": "archived",
    "version": "1.4"
  }
}