McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0
CSV information ?
Status | archived |
---|---|
Valid from | 27.01.2012 |
Valid until | 15.05.2017 |
Scheme | 🇨🇦 CA |
Manufacturer | McAfee, Inc. |
Category | Boundary Protection Devices and Systems |
Security level | EAL4+, ALC_FLR.3 |
Maintenance updates | McAfee Firewall Enterprise 8.3.2 and McAfee Firewall Enterprise Control Center v5.3.2 (December 2013) (03.03.2014) Certification report Security target |
McAfee Firewall Enterprise v8.3.1 and McAfee Firewall Enterprise Control Center v5.3.1 Patch 01 (28.06.2013) Certification report | |
McAfee Firewall Enterprise v8.2.1 and McAfee Firewall Enterprise Control Center v5.2.1 (June 2012) (15.06.2012) Certification report |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DES, 3DES, HMACAsymmetric Algorithms
DSAHash functions
SHA-1Protocols
VPNRandomness
PRNGSecurity level
EAL 4+, EAL 4, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3Security Functional Requirements (SFR)
FIA_UAU.8Certificates
383-4-182-CREvaluation facilities
EWA-CanadaStandards
FIPS 140-2, FIPS 46-3, FIPS 197, FIPS 186-2, FIPS 186-3, FIPS 180-3, FIPS 198, ISO/IEC 17025:2005File metadata
Title: | EAL 4 Evaluation of <TOE name and version> |
---|---|
Author: | User |
Creation date: | D:20120220072157-05'00' |
Modification date: | D:20120220072221-05'00' |
Pages: | 17 |
Creator: | Acrobat PDFMaker 6.0 for Word |
Producer: | Acrobat Distiller 6.0 (Windows) |
Frontpage
Certificate ID: | 383-4-182-CR |
---|---|
Certification lab: | CANADA |
References
Heuristics ?
Extracted SARs
ALC_FLR.3References ?
Updates ?
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 was processed.
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {'cert_id': '383-4-182-CR', 'cert_lab': 'CANADA'}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The report_keywords property was updated, with the
{'rules_cert_id': {'383-4-182-CR': 1}}
data.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['5.2.0', '8.2.0']}
. - The cert_id property was set to
383-4-182-CR
.
- The report_frontpage property was updated, with the
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The cert_lab property was set to
['CANADA']
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}]}}
.
- The following values were inserted:
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '583b46c74a7b86c7c8ebaeff4fdbbf22458f7f679a23e354816bc00e79f2e939', 'st_pdf_hash': '71305afd681cd22baf60ea98069003f30a5fa88a190ef4828216cd17898fce39', 'report_txt_hash': '261ff3d3137ac46412620120d744660d0b47b8f98d6cc0133873de481b2f46f8', 'st_txt_hash': '27d83c53878f73b8a232fc3355f92b89b354fff289d98b58d15291207fc326a7'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 3, 'DES': 3, '3DES': 3, 'HMAC': 3}, 'rules_asymmetric_crypto': {'DSA': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 3}, 'rules_crypto_schemes': {'MAC': 3}, 'rules_randomness': {'PRNG': 3, 'RNG': 3}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 12, 'DES': 3, 'HMAC': 3}, 'rules_asymmetric_crypto': {'ECC': 1, 'Diffie-Hellman': 2, 'DSA': 12}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 7, 'SHA-256': 7, 'SHA-384': 5, 'SHA-512': 3, 'SHA-224': 3}, 'rules_crypto_schemes': {'MAC': 5, 'Key Exchange': 2, 'SSL': 4, 'TLS': 5}, 'rules_randomness': {'PRNG': 5, 'RNG': 7}, 'rules_tee': {'SE': 10}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/c93c524be2602079.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/c93c524be2602079.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'CA': {'383-4-182-CR': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 2, 'EAL 4': 5, 'EAL 4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 2}}, 'cc_sfr': {'FIA': {'FIA_UAU.8': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'EWA': {'EWA-Canada': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 6}, '3DES': {'Triple-DES': 3, '3DES': 3}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'FF': {'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'PRNG': 3}, 'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 4, 'FIPS 46-3': 3, 'FIPS 197': 3, 'FIPS 186-2': 3, 'FIPS 186-3': 3, 'FIPS 180-3': 3, 'FIPS 198': 3}, 'ISO': {'ISO/IEC 17025:2005': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 1, 'EAL4': 2, 'EAL 4 augmented': 1, 'EAL2 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 4, 'ALC_FLR.2': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_SAR.1': 10, 'FAU_SAR.3': 8, 'FAU_STG.1': 9, 'FAU_STG.4': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1, 'FAU_GEN': 1}, 'FCS': {'FCS_COP.1': 38, 'FCS_CKM.1': 22, 'FCS_CKM.4': 11, 'FCS_COP.1.1': 4, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 1, 'FCS_ITC.1': 1, 'FCS_ITC.2': 1}, 'FDP': {'FDP_IFC.1': 31, 'FDP_IFF.1': 40, 'FDP_UCT.1': 8, 'FDP_RIP.1': 7, 'FDP_ACC.1': 5, 'FDP_IFF.1.1': 4, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.2': 4, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_UCT.1.1': 1, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_ATD.1': 8, 'FIA_UID.2': 11, 'FIA_AFL.1': 10, 'FIA_UAU.5': 20, 'FIA_UAU.8': 20, 'FIA_SOS.2': 8, 'FIA_ATD.1.1': 3, 'FIA_UID.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.8.1': 2, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 15, 'FMT_MSA.1': 49, 'FMT_MSA.3': 9, 'FMT_MTD.1': 19, 'FMT_MTD.2': 8, 'FMT_MOF.1': 19, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_MOF.1.1': 2, 'FMT_SMF.1': 4}, 'FPT': {'FPT_STM.1': 10, 'FPT_STM.1.1': 2}, 'FTP': {'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 9, 'O.SINUSE': 7, 'O.MEDIAT': 19, 'O.SECSTA': 17, 'O.ENCRYP': 6, 'O.SELPRO': 10, 'O.AUDREC': 9, 'O.ACCOUN': 7, 'O.SECFUN': 20, 'O.LIMEXT': 7, 'O.EAL': 5, 'O.NETSEC': 16, 'O.ENCRYPT': 6}, 'T': {'T.NOAUTH': 8, 'T.REPEAT': 5, 'T.REPLAY': 6, 'T.ASPOOF': 3, 'T.MEDIAT': 3, 'T.OLDINF': 3, 'T.PROCOM': 3, 'T.AUDACC': 7, 'T.SELPRO': 4, 'T.AUDFUL': 4, 'T.NETSEC': 3, 'T.TUSAGE': 4, 'T.LOWEXP': 2}, 'A': {'A.PHYSEC': 1, 'A.LOWEXP': 1, 'A.GENPUR': 1, 'A.PUBLIC': 1, 'A.NOEVIL': 1, 'A.SINGEN': 1, 'A.DIRECT': 1, 'A.NOREMO': 1, 'A.REMACC': 1}, 'OE': {'OE.PHYSEC': 2, 'OE.LOWEXP': 2, 'OE.GENPUR': 2, 'OE.PUBLIC': 2, 'OE.NOEVIL': 2, 'OE.SINGEN': 2, 'OE.DIRECT': 2, 'OE.NOREMO': 2, 'OE.REMACC': 2, 'OE.GUIDAN': 3, 'OE.ADMTRA': 2, 'OE.SINUSE': 3, 'OE.ADMINTRA': 1}}, 'vendor': {'STMicroelectronics': {'STM': 14}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 12}}, 'DES': {'DES': {'DES': 3}, '3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 7, 'SHA-384': 5, 'SHA-512': 3, 'SHA-224': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 5}, 'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 4}, 'TLS': {'TLS': 4, 'TLS 1.0': 1}}, 'IKE': {'IKE': 2}}, 'randomness': {'PRNG': {'PRNG': 5}, 'RNG': {'RNG': 7}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 7}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 10}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 9, 'FIPS 180-3': 1, 'FIPS 197': 3, 'FIPS PUB 140-2': 3, 'FIPS PUB 180-3': 1, 'FIPS 186-2': 1}, 'NIST': {'SP 800-57': 1, 'SP 800-67': 2, 'NIST SP 800-56A': 1}, 'PKCS': {'PKCS #1': 2}, 'RFC': {'RFC 2409': 2, 'RFC 4306': 1}, 'X509': {'X.509': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The st_extract_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Application-level Firewall in Basic Robustness Environments, V...', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_fw_al_br_v1.1.pdf', 'pp_ids': None}]}
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2014-03-03', 'maintenance_title': 'McAfee Firewall Enterprise 8.3.2 and McAfee Firewall Enterprise Control Center v5.3.2 (December 2013)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/mcafee-firewall-v832-dec-maint-eng.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20832%20ST15%20(131217).pdf'}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2013-06-28', 'maintenance_title': 'McAfee Firewall Enterprise v8.3.1 and McAfee Firewall Enterprise Control Center v5.3.1 Patch 01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/mcafee-firewall-v831-june-maint-eng.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2012-06-15', 'maintenance_title': 'McAfee Firewall Enterprise v8.2.1 and McAfee Firewall Enterprise Control Center v5.2.1 (June 2012)', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/mcafee-firewall-v821-june-maint-eng.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}]}
.
- The new value is
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 436644, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Author': 'Straw', '/Company': 'TOSHIBA', '/CreationDate': "D:20120110183702+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/ModDate': "D:20120322141729-04'00'", '/Producer': 'Adobe PDF Library 9.0', '/SourceModified': 'D:20120110173615', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
.
- The st_extract_ok property was set to
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '383-4-182_CRv1.0_e.pdf', 'st_filename': 'McAfee Firewall 820 ST11.pdf'}
. - The report_keywords property was updated, with the
{'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'crypto_scheme': {}, 'randomness': {'__delete__': ['RNG']}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 5}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 1, 'FAU_STG': 2}, '__update__': {'FAU_GEN.1': 10, 'FAU_SAR.1': 8, 'FAU_STG.1': 7}}, 'FCS': {'__insert__': {'FCS_CKM': 2}, '__update__': {'FCS_CKM.4': 9}, '__delete__': ['FCS_CKM.2', 'FCS_ITC.1']}, 'FDP': {'__insert__': {'FDP_UCT': 1, 'FDP_RIP': 2}, '__update__': {'FDP_IFF.1.2': 5}}, 'FIA': {'__insert__': {'FIA_SOS': 1, 'FIA_ATD': 2}, '__update__': {'FIA_UID.2': 10, 'FIA_UAU.5': 19, 'FIA_UAU.8': 22, 'FIA_UAU.8.1': 1}, '__delete__': ['FIA_UAU.1']}, 'FMT': {'__insert__': {'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_MSA': 1, 'FMT_SMF': 1}, '__update__': {'FMT_SMR.1': 12, 'FMT_MSA.1': 47, 'FMT_MTD.1': 18, 'FMT_SMF.1': 3}}, 'FPT': {'__insert__': {'FPT_STM': 2}}, 'FTP': {'__insert__': {'FTP_ITC': 2}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.SINUSE': 5, 'O.SECSTA': 15, 'O.SELPRO': 8, 'O.ACCOUN': 5, 'O.LIMEXT': 5}}, 'T': {'__update__': {'T.REPEAT': 4, 'T.REPLAY': 5, 'T.ASPOOF': 2, 'T.OLDINF': 2, 'T.AUDACC': 5, 'T.AUDFUL': 3, 'T.NETSEC': 2}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 13}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DSA': {'__update__': {'DSA': 9}}}}}, '__delete__': ['ECC']}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 2}}, 'TLS': {'__update__': {'TLS': 3, 'TLS 1.0': 2}}}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 2}}}}, 'tee_name': {}, 'standard_id': {'__insert__': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, '__update__': {'FIPS': {'__update__': {'FIPS 140-2': 10}}, 'RFC': {'__update__': {'RFC 4306': 2}}}}}
data.
The computed heuristics were updated.
- The cert_id property was set to
383-4-182
.
- The following values were inserted:
-
26.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'crypto_protocol': {'VPN': {'VPN': 5}}}
data. - The st_keywords property was updated, with the
{'crypto_protocol': {'__insert__': {'VPN': {'VPN': 31}}}}
data.
- The report_keywords property was updated, with the
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Application-level Firewall in Basic Robustness Environments, V...', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp_fw_al_br_v1.1.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'U.S. Government Protection Profile for Application-level Firewall in Basic Robustness Environments, V...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_fw_al_br_v1.1.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
16.11.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'/ST date': '10 January 2012', '/ST version': 'Version 1.1', '/TOE Version': '5.0', '/TOE name and version': 'McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0', '/Document number': '383-4-182-CR', '/CR version': '1.0', '/TOE short name': 'McAfee Firewall Enterprise', '/Certificate date': '27 January 2012', '/Developer name': 'McAfee', '/Evaluation completion date': '10 January 2012', '/ST Title': 'McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target', '/ETR title, version, date': 'Evaluation Technical Report for EAL 4+ Common Criteria Evaluation of McAfee, Inc McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0, Version 1.2, 10 January 2012', '/CR date': '27 January 2012'}
values inserted.
- The report_metadata property was updated, with the
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20820%20ST11.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated, with the
[[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/383-4-182_CRv1.0_e.pdf, code: nok']]
values inserted.
- The errors property was updated, with the
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
71305afd681cd22baf60ea98069003f30a5fa88a190ef4828216cd17898fce39
. - The st_txt_hash property was set to
27d83c53878f73b8a232fc3355f92b89b354fff289d98b58d15291207fc326a7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 436644, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Author': 'Straw', '/Company': 'TOSHIBA', '/CreationDate': "D:20120110183702+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/ModDate': "D:20120322141729-04'00'", '/Producer': 'Adobe PDF Library 9.0', '/SourceModified': 'D:20120110173615', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 1, 'EAL4': 3, 'EAL 4 augmented': 1, 'EAL2 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_FLR.2': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 8, 'FAU_SAR.3': 8, 'FAU_STG.1': 7, 'FAU_STG.4': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1, 'FAU_GEN': 1, 'FAU_SAR': 1, 'FAU_STG': 2}, 'FCS': {'FCS_COP.1': 38, 'FCS_CKM.1': 22, 'FCS_CKM.4': 9, 'FCS_CKM': 2, 'FCS_COP.1.1': 4, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_ITC.2': 1}, 'FDP': {'FDP_IFC.1': 31, 'FDP_IFF.1': 40, 'FDP_UCT.1': 8, 'FDP_RIP.1': 7, 'FDP_ACC.1': 5, 'FDP_UCT': 1, 'FDP_IFF.1.1': 4, 'FDP_IFF.1.2': 5, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_UCT.1.1': 1, 'FDP_RIP.1.1': 1, 'FDP_RIP': 2, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_ATD.1': 8, 'FIA_UID.2': 10, 'FIA_AFL.1': 10, 'FIA_UAU.5': 19, 'FIA_UAU.8': 22, 'FIA_SOS.2': 8, 'FIA_SOS': 1, 'FIA_ATD.1.1': 3, 'FIA_UID.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.8.1': 1, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_ATD': 2, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 12, 'FMT_MSA.1': 47, 'FMT_MSA.3': 9, 'FMT_MTD.1': 18, 'FMT_MTD.2': 8, 'FMT_MOF.1': 19, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_MOF.1.1': 2, 'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_MSA': 1, 'FMT_SMF.1': 3, 'FMT_SMF': 1}, 'FPT': {'FPT_STM.1': 10, 'FPT_STM.1.1': 2, 'FPT_STM': 2}, 'FTP': {'FTP_ITC.1': 8, 'FTP_ITC': 2, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 9, 'O.SINUSE': 5, 'O.MEDIAT': 19, 'O.SECSTA': 15, 'O.ENCRYP': 6, 'O.SELPRO': 8, 'O.AUDREC': 9, 'O.ACCOUN': 5, 'O.SECFUN': 20, 'O.LIMEXT': 5, 'O.EAL': 5, 'O.NETSEC': 16, 'O.ENCRYPT': 6}, 'T': {'T.NOAUTH': 8, 'T.REPEAT': 4, 'T.REPLAY': 5, 'T.ASPOOF': 2, 'T.MEDIAT': 3, 'T.OLDINF': 2, 'T.PROCOM': 3, 'T.AUDACC': 5, 'T.SELPRO': 4, 'T.AUDFUL': 3, 'T.NETSEC': 2, 'T.TUSAGE': 4, 'T.LOWEXP': 2}, 'A': {'A.PHYSEC': 1, 'A.LOWEXP': 1, 'A.GENPUR': 1, 'A.PUBLIC': 1, 'A.NOEVIL': 1, 'A.SINGEN': 1, 'A.DIRECT': 1, 'A.NOREMO': 1, 'A.REMACC': 1}, 'OE': {'OE.PHYSEC': 2, 'OE.LOWEXP': 2, 'OE.GENPUR': 2, 'OE.PUBLIC': 2, 'OE.NOEVIL': 2, 'OE.SINGEN': 2, 'OE.DIRECT': 2, 'OE.NOREMO': 2, 'OE.REMACC': 2, 'OE.GUIDAN': 3, 'OE.ADMTRA': 2, 'OE.SINUSE': 3, 'OE.ADMINTRA': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 9}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 7, 'SHA-384': 5, 'SHA-512': 3, 'SHA-224': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 3, 'TLS 1.0': 2}}, 'IKE': {'IKE': 2}, 'VPN': {'VPN': 31}}, 'randomness': {'PRNG': {'PRNG': 5}, 'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 7}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 10, 'FIPS 180-3': 1, 'FIPS 197': 3, 'FIPS PUB 140-2': 3, 'FIPS PUB 180-3': 1, 'FIPS 186-2': 1}, 'NIST': {'SP 800-57': 1, 'SP 800-67': 2, 'NIST SP 800-56A': 1}, 'PKCS': {'PKCS #1': 2}, 'RFC': {'RFC 2409': 2, 'RFC 4306': 2}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
McAfee Firewall 820 ST11.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/383-4-182_CRv1.0_e.pdf, code: nok']
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20820%20ST11.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
71305afd681cd22baf60ea98069003f30a5fa88a190ef4828216cd17898fce39
. - The st_txt_hash property was set to
27d83c53878f73b8a232fc3355f92b89b354fff289d98b58d15291207fc326a7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 436644, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Author': 'Straw', '/Company': 'TOSHIBA', '/CreationDate': "D:20120110183702+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/ModDate': "D:20120322141729-04'00'", '/Producer': 'Adobe PDF Library 9.0', '/SourceModified': 'D:20120110173615', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL2': 1, 'EAL4': 3, 'EAL 4 augmented': 1, 'EAL2 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_FLR.2': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 10, 'FAU_SAR.1': 8, 'FAU_SAR.3': 8, 'FAU_STG.1': 7, 'FAU_STG.4': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1, 'FAU_GEN': 1, 'FAU_SAR': 1, 'FAU_STG': 2}, 'FCS': {'FCS_COP.1': 38, 'FCS_CKM.1': 22, 'FCS_CKM.4': 9, 'FCS_CKM': 2, 'FCS_COP.1.1': 4, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 1, 'FCS_ITC.2': 1}, 'FDP': {'FDP_IFC.1': 31, 'FDP_IFF.1': 40, 'FDP_UCT.1': 8, 'FDP_RIP.1': 7, 'FDP_ACC.1': 5, 'FDP_UCT': 1, 'FDP_IFF.1.1': 4, 'FDP_IFF.1.2': 5, 'FDP_IFC.1.1': 2, 'FDP_IFF.1.3': 3, 'FDP_IFF.1.4': 3, 'FDP_IFF.1.5': 3, 'FDP_UCT.1.1': 1, 'FDP_RIP.1.1': 1, 'FDP_RIP': 2, 'FDP_ITC.1': 1, 'FDP_ITC.2': 1}, 'FIA': {'FIA_ATD.1': 8, 'FIA_UID.2': 10, 'FIA_AFL.1': 10, 'FIA_UAU.5': 19, 'FIA_UAU.8': 22, 'FIA_SOS.2': 8, 'FIA_SOS': 1, 'FIA_ATD.1.1': 3, 'FIA_UID.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 2, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.8.1': 1, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_ATD': 2, 'FIA_UID.1': 1}, 'FMT': {'FMT_SMR.1': 12, 'FMT_MSA.1': 47, 'FMT_MSA.3': 9, 'FMT_MTD.1': 18, 'FMT_MTD.2': 8, 'FMT_MOF.1': 19, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1.1': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 2, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_MOF.1.1': 2, 'FMT_MTD': 1, 'FMT_SMR': 1, 'FMT_MSA': 1, 'FMT_SMF.1': 3, 'FMT_SMF': 1}, 'FPT': {'FPT_STM.1': 10, 'FPT_STM.1.1': 2, 'FPT_STM': 2}, 'FTP': {'FTP_ITC.1': 8, 'FTP_ITC': 2, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.IDAUTH': 9, 'O.SINUSE': 5, 'O.MEDIAT': 19, 'O.SECSTA': 15, 'O.ENCRYP': 6, 'O.SELPRO': 8, 'O.AUDREC': 9, 'O.ACCOUN': 5, 'O.SECFUN': 20, 'O.LIMEXT': 5, 'O.EAL': 5, 'O.NETSEC': 16, 'O.ENCRYPT': 6}, 'T': {'T.NOAUTH': 8, 'T.REPEAT': 4, 'T.REPLAY': 5, 'T.ASPOOF': 2, 'T.MEDIAT': 3, 'T.OLDINF': 2, 'T.PROCOM': 3, 'T.AUDACC': 5, 'T.SELPRO': 4, 'T.AUDFUL': 3, 'T.NETSEC': 2, 'T.TUSAGE': 4, 'T.LOWEXP': 2}, 'A': {'A.PHYSEC': 1, 'A.LOWEXP': 1, 'A.GENPUR': 1, 'A.PUBLIC': 1, 'A.NOEVIL': 1, 'A.SINGEN': 1, 'A.DIRECT': 1, 'A.NOREMO': 1, 'A.REMACC': 1}, 'OE': {'OE.PHYSEC': 2, 'OE.LOWEXP': 2, 'OE.GENPUR': 2, 'OE.PUBLIC': 2, 'OE.NOEVIL': 2, 'OE.SINGEN': 2, 'OE.DIRECT': 2, 'OE.NOREMO': 2, 'OE.REMACC': 2, 'OE.GUIDAN': 3, 'OE.ADMTRA': 2, 'OE.SINUSE': 3, 'OE.ADMINTRA': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 1}}, 'constructions': {'MAC': {'HMAC': 3}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 9}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 7, 'SHA-384': 5, 'SHA-512': 3, 'SHA-224': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 3, 'TLS 1.0': 2}}, 'IKE': {'IKE': 2}, 'VPN': {'VPN': 31}}, 'randomness': {'PRNG': {'PRNG': 5}, 'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 7}, 'CBC': {'CBC': 7}, 'CFB': {'CFB': 2}, 'OFB': {'OFB': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 10, 'FIPS 180-3': 1, 'FIPS 197': 3, 'FIPS PUB 140-2': 3, 'FIPS PUB 180-3': 1, 'FIPS 186-2': 1}, 'NIST': {'SP 800-57': 1, 'SP 800-67': 2, 'NIST SP 800-56A': 1}, 'PKCS': {'PKCS #1': 2}, 'RFC': {'RFC 2409': 2, 'RFC 4306': 2}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
McAfee Firewall 820 ST11.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/383-4-182_CRv1.0_e.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20820%20ST11.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
Raw data
{
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "c93c524be2602079",
"heuristics": {
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
"cert_id": "383-4-182",
"cert_lab": [
"CANADA"
],
"cpe_matches": null,
"direct_dependency_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.2.0",
"5.2.0"
]
},
"indirect_dependency_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
"maintenance_date": "2014-03-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/mcafee-firewall-v832-dec-maint-eng.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20832%20ST15%20(131217).pdf",
"maintenance_title": "McAfee Firewall Enterprise 8.3.2 and McAfee Firewall Enterprise Control Center v5.3.2 (December 2013)"
},
{
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
"maintenance_date": "2013-06-28",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/mcafee-firewall-v831-june-maint-eng.pdf",
"maintenance_st_link": null,
"maintenance_title": "McAfee Firewall Enterprise v8.3.1 and McAfee Firewall Enterprise Control Center v5.3.1 Patch 01"
},
{
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
"maintenance_date": "2012-06-15",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/mcafee-firewall-v821-june-maint-eng.pdf",
"maintenance_st_link": null,
"maintenance_title": "McAfee Firewall Enterprise v8.2.1 and McAfee Firewall Enterprise Control Center v5.2.1 (June 2012)"
}
]
},
"manufacturer": "McAfee, Inc.",
"manufacturer_web": "https://www.mcafee.com/",
"name": "McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0",
"not_valid_after": "2017-05-15",
"not_valid_before": "2012-01-27",
"pdf_data": {
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
"report_filename": "383-4-182_CRv1.0_e.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {
"cert_id": "383-4-182-CR",
"cert_lab": "CANADA"
},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DSA": {
"DSA": 3
}
}
},
"cc_cert_id": {
"CA": {
"383-4-182-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 4 augmented": 2,
"EAL 4+": 2
}
},
"cc_sfr": {
"FIA": {
"FIA_UAU.8": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 5
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"EWA": {
"EWA-Canada": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 3
}
},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-2": 4,
"FIPS 180-3": 3,
"FIPS 186-2": 3,
"FIPS 186-3": 3,
"FIPS 197": 3,
"FIPS 198": 3,
"FIPS 46-3": 3
},
"ISO": {
"ISO/IEC 17025:2005": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 3,
"Triple-DES": 3
}
},
"constructions": {
"MAC": {
"HMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "User",
"/CCEF": "EWA-Canada",
"/CR date": "27 January 2012",
"/CR version": "1.0",
"/Certificate date": "27 January 2012",
"/Company": "Microsoft",
"/CreationDate": "D:20120220072157-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/Developer name": "McAfee",
"/Document number": "383-4-182-CR",
"/ETR title, version, date": "Evaluation Technical Report for EAL 4+ Common Criteria Evaluation of McAfee, Inc McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0, Version 1.2, 10 January 2012",
"/Evaluation completion date": "10 January 2012",
"/ModDate": "D:20120220072221-05\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/ST Title": "McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0 Security Target",
"/ST date": "10 January 2012",
"/ST version": "Version 1.1",
"/SourceModified": "D:20120220122123",
"/Sponsor": "McAfee",
"/TOE Version": "5.0",
"/TOE name and version": "McAfee Firewall Enterprise v8.2.0 and McAfee Firewall Enterprise Control Center v5.2.0",
"/TOE short name": "McAfee Firewall Enterprise",
"/Title": "EAL 4 Evaluation of \u003cTOE name and version\u003e",
"pdf_file_size_bytes": 125192,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": null,
"st_frontpage": null,
"st_keywords": null,
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_fw_al_br_v1.1.pdf",
"pp_name": "U.S. Government Protection Profile for Application-level Firewall in Basic Robustness Environments, V..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/383-4-182_CRv1.0_e.pdf",
"scheme": "CA",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20820%20ST11.pdf",
"state": {
"_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
"errors": [
"failed to download report from https://www.commoncriteriaportal.org/files/epfiles/383-4-182_CRv1.0_e.pdf, code: nok",
"failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/McAfee%20Firewall%20820%20ST11.pdf, code: 408"
],
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "583b46c74a7b86c7c8ebaeff4fdbbf22458f7f679a23e354816bc00e79f2e939",
"report_txt_hash": "261ff3d3137ac46412620120d744660d0b47b8f98d6cc0133873de481b2f46f8",
"st_convert_garbage": false,
"st_convert_ok": false,
"st_download_ok": false,
"st_extract_ok": false,
"st_pdf_hash": null,
"st_txt_hash": null
},
"status": "archived"
}