This page was not yet optimized for use on mobile devices.
Protection Profile for IPsec Virtual Private Network (VPN) Clients
Web information ?
Status: archivedCertification date: 2013-10-21
Archived date: 2017-12-26
Scheme: 🇺🇸
Category: Data Protection
Security level: EAL1
Certification report ?
Extracted keywords
Schemes
Key ExchangeProtocols
IKE, IPsec, VPNVendor
SamsungClaims
O.VPN_TUNNEL, O.RESIDUAL_INFORMATION_CLEARING, O.TOE_ADMINISTRATION, O.TSF_SELF_TEST, O.VERIFIABLE_UPDATES, T.TSF_CONFIGURATION, T.TSF_FAILURE, T.UNAUTHORIZED_ACCESS, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, A.NO_TOE_BYPASS, A.PHYSICAL, A.TRUSTED_CONFIG, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_PRE, AGD_OPE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, APE_REQ, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.1Security Functional Requirements (SFR)
FAU_GEN, FAU_SEL, FCS_CKM.1, FCS_CKM_EXT, FCS_COP.1, FCS_RBG_EXT, FDP_RIP, FDP_IFC_EXT, FIA_PSK_EXT, FMT_SMF, FMT_SMF.1, FPT_TST_EXT, FPT_TUD_EXT, FRU_RSA, FTP_ITCEvaluation facilities
Gossamer SecurityStandards
X.509File metadata
Creation date | D:20150417145158-04'00' |
---|---|
Modification date | D:20150417164134-04'00' |
Pages | 10 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-, DES, HMAC, HMAC-SHA-256Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224Schemes
MAC, Key ExchangeProtocols
IKE, IKEv2, IKEv1, IPsec, VPNRandomness
DRBG, RNG, RBGElliptic Curves
P-256, P-384, P-521, curve P-384, P-284Block cipher modes
CBC, GCM, CCMClaims
O.VPN_TUNNEL, O.TOE_CONFIGURATION, O.VERIFIABLE_UPDATES, O.RESIDUAL_INFORMATION_CLEARING, O.TSF_SELF_TEST, O.TOE_ADMINISTRATION, T.UNAUTHORIZED_ACCESS, T.TSF_CONFIGURATION, T.UNAUTHORIZED_UPDATE, T.USER_DATA_REUSE, T.TSF_FAILURE, A.NO_TOE_BYPASS, A.PHYSICAL, A.TRUSTED_CONFIG, OE.NO_TOE_BYPASS, OE.PHYSICAL, OE.TRUSTED_CONFIGSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, AGD_OPR, ALC_CMC.1, ALC_CMS.1, ALC_CMC.2, ALC_CMS.2, ATE_IND.1, ATE_IND, AVA_VAN.1, AVA_VANSecurity Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1, FAU_SEL, FAU_SEL.1.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM_EXT.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM_EXT.2, FCS_CKM_EXT.2.1, FCS_CKM_EXT.4.1, FCS_COP, FCS_RBG_EXT.1, FCS_RBG_EXT, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FDP_IFC, FDP_RIP.2, FDP_RIP, FDP_RIP.2.1, FDP_IFC_EXT.1, FDP_IFC_EXT.1.1, FIA_PSK_EXT, FIA_PSK_EXT.1, FIA_PSK_EXT.1.1, FIA_PSK_EXT.1.2, FIA_PSK_EXT.1.3, FMT_SMF.1, FMT_SMF, FMT_SMF.1.1, FPT_TUD_EXT.1, FPT_TST_EXT.1, FPT_TST_EXT.1.2, FPT_TST_EXT, FPT_TST_EXT.1.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2Side-channel analysis
malfunctionStandards
FIPS PUB 186-4, FIPS 186-4, FIPS PUB 197, FIPS PUB 198-1, FIPS PUB 180-4, FIPS 140-2, SP 800-56A, NIST SP 800-38D, NIST SP 800-38A, NIST SP 800-57, NIST SP 800-57A, SP 800-90A, RFC 4301, RFC 2406, RFC 4303, RFC 4106, RFC 3602, RFC 4109, RFC 4304, RFC 4868, RFC 5996, RFC 6379, RFC 5282, RFC 4945, RFC 5280, RFC 2560, RFC 5759, RFC 2865, RFC 2868, RFC 3575, RFC 3579, RFC 3580, RFC 5216, X.509File metadata
Title | Security Requirements for WLAN Clients |
---|---|
Creation date | D:20131205104426-05'00' |
Modification date | D:20150417164153-04'00' |
Pages | 83 |
Creator | Acrobat PDFMaker 10.1 for Word |
Producer | Adobe PDF Library 10.0 |
References ?
- AnyConnect Secure Mobility Client v4.3 for Windows 10 archived
- Apple IOS 10.2 VPN Client on iPhone and iPad archived
- Apple IOS VPN Client on iPhone & iPad archived
- Apple iOS 11 VPN Client on iPhone and iPad archived
- Aruba Remote Access Point Version 6.5.0-FIPS archived
- Aruba VIA Client 2.3 archived
- Aruba, a Hewlett Packard Enterprise company Virtual Intranet Access (VIA) Client Version 3.0 archived
- BlackBerry Smartphones with OS 10.3.3 VPN Client archived
- Cisco 1000V Cloud Services Router v3.16 archived
- Cisco 5921 Embedded Services Router Running IOS 15.5(2)T archived
- Cisco AnyConnect Secure Mobility Client v4.0 for Android archived
- Cisco AnyConnect Secure Mobility Client v4.6 for Apple iOS archived
- Cisco AnyConnect Secure Mobility Desktop Client Version: 4.1 archived
- D4 Secure VPN Client for the HTC A9 Secured by Cog Systems archived
- Microsoft Windows 10 (Anniversary Update) and Windows Server 2016 IPsec VPN Client archived
- Oceus Networks® VPN Client v2 archived
- Samsung Galaxy Devices VPN Client archived
- Samsung Galaxy Note 4 with Android 5 VPN Client archived
- Samsung Galaxy Note 4, Galaxy Note Edge, Galaxy Alpha, Galaxy Tab S & Galaxy Tab Active VPN Client archived
- Samsung Galaxy Note 5 & Tab S2 archived
- Samsung Galaxy Note 7 VPNCPP archived
- Samsung Galaxy S6 & S6 Edge VPN Client archived
- Samsung Galaxy VPN Client on Android 6 archived
- Samsung Galaxy VPN Client on Android 7 archived
- Samsung Galaxy VPN Client on Android 7.1 archived
- Samsung Z VPN on Tizen Version 2.3 archived
- Unisys Stealth Solution Release v3.0 Windows Endpoint archived
- Windows 10 IPsec VPN Client archived
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Protection Profile for IPsec Virtual Private Network (VPN) Clients was processed.
Raw data
{
"_id": "db7434eb64f09c94",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "db7434eb64f09c94",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp_vpn_ipsec_client_v1.4.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 7
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 11
}
},
"FF": {
"DH": {
"DH": 16,
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TOE_BYPASS": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.RESIDUAL_INFORMATION_CLEARING": 2,
"O.TOE_ADMINISTRATION": 1,
"O.TOE_CONFIGURATION": 1,
"O.TSF_SELF_TEST": 2,
"O.VERIFIABLE_UPDATES": 2,
"O.VPN_TUNNEL": 2
},
"OE": {
"OE.NO_TOE_BYPASS": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_CONFIG": 1
},
"T": {
"T.TSF_CONFIGURATION": 3,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 3,
"T.UNAUTHORIZED_UPDATE": 3,
"T.USER_DATA_REUSE": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 9
},
"AGD": {
"AGD_OPE": 4,
"AGD_OPE.1": 12,
"AGD_OPR": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.1": 6,
"ALC_CMC.2": 1,
"ALC_CMS.1": 2,
"ALC_CMS.2": 4
},
"ATE": {
"ATE_IND": 4,
"ATE_IND.1": 6
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.1": 7
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 2,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_SEL": 1,
"FAU_SEL.1": 2,
"FAU_SEL.1.1": 1
},
"FCS": {
"FCS_CKM.1": 6,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 1,
"FCS_CKM_EXT.2": 2,
"FCS_CKM_EXT.2.1": 1,
"FCS_CKM_EXT.4": 4,
"FCS_CKM_EXT.4.1": 1,
"FCS_COP": 3,
"FCS_COP.1": 21,
"FCS_COP.1.1": 6,
"FCS_RBG_EXT": 1,
"FCS_RBG_EXT.1": 5,
"FCS_RBG_EXT.1.1": 3,
"FCS_RBG_EXT.1.2": 4
},
"FDP": {
"FDP_IFC": 2,
"FDP_IFC_EXT.1": 2,
"FDP_IFC_EXT.1.1": 1,
"FDP_RIP": 1,
"FDP_RIP.2": 4,
"FDP_RIP.2.1": 1
},
"FIA": {
"FIA_PSK_EXT": 3,
"FIA_PSK_EXT.1": 1,
"FIA_PSK_EXT.1.1": 1,
"FIA_PSK_EXT.1.2": 2,
"FIA_PSK_EXT.1.3": 3
},
"FMT": {
"FMT_SMF": 3,
"FMT_SMF.1": 5,
"FMT_SMF.1.1": 2
},
"FPT": {
"FPT_TST_EXT": 1,
"FPT_TST_EXT.1": 4,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.1.2": 3,
"FPT_TUD_EXT.1": 7,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 3,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"CCM": {
"CCM": 1
},
"GCM": {
"GCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 35,
"IKEv1": 21,
"IKEv2": 17
},
"IPsec": {
"IPsec": 57
},
"VPN": {
"VPN": 180
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 5
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-256": 18,
"P-284": 6,
"P-384": 7,
"P-521": 18,
"curve P-384": 1
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 4,
"SHA-384": 3,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2
},
"RNG": {
"RBG": 25,
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-4": 5,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 7,
"FIPS PUB 197": 1,
"FIPS PUB 198-1": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38D": 1,
"NIST SP 800-57": 3,
"NIST SP 800-57A": 1,
"SP 800-56A": 1,
"SP 800-90A": 1
},
"RFC": {
"RFC 2406": 1,
"RFC 2560": 1,
"RFC 2865": 1,
"RFC 2868": 1,
"RFC 3575": 1,
"RFC 3579": 1,
"RFC 3580": 1,
"RFC 3602": 1,
"RFC 4106": 1,
"RFC 4109": 1,
"RFC 4301": 2,
"RFC 4303": 2,
"RFC 4304": 1,
"RFC 4868": 2,
"RFC 4945": 1,
"RFC 5216": 1,
"RFC 5280": 2,
"RFC 5282": 1,
"RFC 5759": 1,
"RFC 5996": 1,
"RFC 6379": 1
},
"X509": {
"X.509": 7
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14,
"AES-": 2
}
},
"DES": {
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 8,
"HMAC-SHA-256": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "",
"/ContentTypeId": "0x0101008DE54E388F87EF4D83BC9887E31FF0E8",
"/CreationDate": "D:20131205104426-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 10.1 for Word",
"/ModDate": "D:20150417164153-04\u002700\u0027",
"/Producer": "Adobe PDF Library 10.0",
"/SourceModified": "D:20131205154408",
"/Title": "Security Requirements for WLAN Clients",
"pdf_file_size_bytes": 594357,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 83
},
"report_filename": "pp_vpn_ipsec_client_v1.4-vr.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.NO_TOE_BYPASS": 1,
"A.PHYSICAL": 1,
"A.TRUSTED_CONFIG": 1
},
"O": {
"O.RESIDUAL_INFORMATION_CLEARING": 1,
"O.TOE_ADMINISTRATION": 1,
"O.TSF_SELF_TEST": 1,
"O.VERIFIABLE_UPDATES": 1,
"O.VPN_TUNNEL": 1
},
"OE": {
"OE.NO_TOE_BYPASS": 1,
"OE.PHYSICAL": 1,
"OE.TRUSTED_CONFIG": 1
},
"T": {
"T.TSF_CONFIGURATION": 1,
"T.TSF_FAILURE": 1,
"T.UNAUTHORIZED_ACCESS": 1,
"T.UNAUTHORIZED_UPDATE": 1,
"T.USER_DATA_REUSE": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.2": 1,
"APE_REQ": 1,
"APE_REQ.1": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SEL": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM_EXT": 2,
"FCS_COP.1": 4,
"FCS_RBG_EXT": 1
},
"FDP": {
"FDP_IFC_EXT": 1,
"FDP_RIP": 1
},
"FIA": {
"FIA_PSK_EXT": 1
},
"FMT": {
"FMT_SMF": 2,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_TST_EXT": 1,
"FPT_TUD_EXT": 1
},
"FRU": {
"FRU_RSA": 1
},
"FTP": {
"FTP_ITC": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IKE": {
"IKE": 4
},
"IPsec": {
"IPsec": 16
},
"VPN": {
"VPN": 45
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Gossamer": {
"Gossamer Security": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"X509": {
"X.509": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 14
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20150417145158-04\u002700\u0027",
"/ModDate": "D:20150417164134-04\u002700\u0027",
"pdf_file_size_bytes": 405781,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 10
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d9a7e9af70a9f89822580c8b484d5efa633e24f4c3e96ae4cecc52965e3e1212",
"txt_hash": "3c4a6cdd9dd8462aa42e42a1d424ceb501458bb7ca385fa6ccbab0615f7d1535"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fbd3fef58e62f82d58947852a6ae600ac114183837f774fc25cf3156465b248e",
"txt_hash": "4d920faddccc8ab320a030f2dc81d7d61f5bfebca09470ee8acc4fda17013708"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "Data Protection",
"is_collaborative": false,
"maintenances": [],
"name": "Protection Profile for IPsec Virtual Private Network (VPN) Clients",
"not_valid_after": "2017-12-26",
"not_valid_before": "2013-10-21",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_vpn_ipsec_client_v1.4-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"status": "archived",
"version": "1.4"
}
}