StoneGate Firewall/VPN

CSV information ?

Status archived
Valid from 13.03.2009
Valid until 13.03.2014
Scheme 🇬🇧 UK
Manufacturer Stonesoft Corporation
Category Boundary Protection Devices and Systems
Security level EAL4+, ALC_FLR.1
Maintenance updates Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1 (23.03.2010) Certification report Security target

Heuristics summary ?

Certificate ID: CRP249

Certification report ?

Extracted keywords

Hash functions
SHA-1, MD5
Schemes
Key Exchange
Protocols
SSH, SSL, IKE, VPN
Libraries
OpenSSL

Security level
EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1
Security Functional Requirements (SFR)
FAU_STG
Certificates
CRP249

Standards
FIPS PUB 140-2, FIPS 140-2, CCMB-2006-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004

File metadata

Title: Microsoft Word - 090325 LFS T536 StoneGate CRP249 v1.0.doc
Author: Bhavin
Creation date: D:20090325110143Z00'00'
Modification date: D:20090325110143Z00'00'
Pages: 22
Creator: PScript5.dll Version 5.2.2
Producer: GPL Ghostscript 8.63

Frontpage

Certified item: • confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 © Crown Copyright 2009 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 – StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report
Developer: Stonesoft Corporation

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC
Asymmetric Algorithms
Diffie-Hellman, DH
Hash functions
SHA-1
Schemes
Key Exchange
Protocols
SSH, SSL, TLS, IKE, IPsec, VPN
Libraries
OpenSSL
Block cipher modes
CBC

Security level
EAL4, EAL4 augmented
Claims
O.E, O.AUDIT, O.MEDIAT, O.NETADDRHIDE, O.VPN, O.IDAUTH, O.HIGHAVAILABILITY, O.CRYPTOSERVICES, O.SECFUN, T.AUDIT_UNDETECTED, T.MEDIAT, T.NOAUTH, T.NODE_FAILURE, T.SECURE_CONNECTION_COMPROMISE, T.SELPRO, A.ADMINTRUSTED, A.SHAREDSECRETKEY, A.ADMIN_ACCESS, A.AUDITMAN, A.AUDIT_SUPPORT, A.MEDIAT_SUPPORT, A.MODEXP, A.OPERATING_ENVIRONMENT, A.USER_AUTH, A.TIME
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3
Security Functional Requirements (SFR)
FAU_STG, FAU_GEN.1, FAU_SEL.1, FAU_STG.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.1, FDP_IFC.1, FDP_IFF.1, FDP_UCT.1, FDP_UIT.1, FDP_IFF.1.1, FDP_IFC.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.5, FDP_IFF.1.4, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_STM.1, FRU_FLT.2, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Certification process
out of scope, of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the

Side-channel analysis
malfunction
Certification process
out of scope, of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS 46-3, FIPS 197, FIPS 198, FIPS 180-2, PKCS#1, PKCS #1, RFC 2401, RFC 1631, RFC 2409, RFC 2406, RFC 959, RFC 821, RFC 2616

File metadata

Title: Microsoft Word - T536 ST version 1.0.doc
Author: Bhavin
Creation date: D:20090325110253Z00'00'
Modification date: D:20090325110253Z00'00'
Pages: 50
Creator: PScript5.dll Version 5.2.2
Producer: GPL Ghostscript 8.63

References

No references.

Heuristics ?

Certificate ID: CRP249

Extracted SARs

ATE_IND.2, ALC_CMC.4, ALC_DVS.1, ATE_DPT.2, ADV_IMP.1, ADV_TDS.3, ALC_CMS.4, ATE_FUN.1, ALC_DEL.1, AVA_VAN.3, ALC_FLR.1, ALC_TAT.1, ALC_LCD.1, ADV_FSP.4, ATE_COV.2, AGD_PRE.1, AGD_OPE.1, ADV_ARC.1

References ?

No references are available for this certificate.

Updates ?

  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2010-03-23', 'maintenance_title': 'Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f.
    • The st_txt_hash property was set to 4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.
    • The st_filename property was set to lfs_t536_st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f.
    • The st_txt_hash property was set to 4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 321611, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/Producer': 'GPL Ghostscript 8.63', '/CreationDate': "D:20090325110253Z00'00'", '/ModDate': "D:20090325110253Z00'00'", '/Title': 'Microsoft Word - T536 ST version 1.0.doc', '/Creator': 'PScript5.dll Version 5.2.2', '/Author': 'Bhavin', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_STG': 13, 'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4': 1}, 'FCS': {'FCS_COP': 33, 'FCS_CKM': 18, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UCT.1': 7, 'FDP_UIT.1': 6, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 5, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 8, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.E': 41, 'O.AUDIT': 9, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10}, 'T': {'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 5}, '3DES': {'3DES': 15}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 9}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}, 'VPN': {'VPN': 70}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 2401': 2, 'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.
    • The st_filename property was set to lfs_t536_st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/crp249.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 11}}}} data.
    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 70}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'crp249.pdf', 'st_filename': 'lfs_t536_st.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'UK': {'__update__': {'CRP249': 2}}}}, 'cc_sfr': {'FAU': {'FAU_STG': 2}}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 1}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}}}}}} data.
    • The st_keywords property was updated, with the {'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG': 13, 'FAU_STG.4': 1}}, 'FCS': {'__insert__': {'FCS_COP': 33, 'FCS_CKM': 18}}, 'FDP': {'__update__': {'FDP_IFC.1': 12, 'FDP_IFF.1': 9, 'FDP_UIT.1': 6, 'FDP_IFF.1.5': 5}}, 'FMT': {'__update__': {'FMT_SMF.1': 8, 'FMT_SMR.1': 8}}}}, 'cc_claims': {'__update__': {'O': {'__insert__': {'O.E': 41}, '__delete__': ['O.E.AUDIT_SUPPORT', 'O.E.AUDITMAN', 'O.E.MEDIAT_SUPPORT', 'O.E.USER_AUTH', 'O.E.ADMIN_ACCESS', 'O.E.ADMINTRUSTED', 'O.E.MODEXP', 'O.E.OPERATING_ENVIRONMENT', 'O.E.SHAREDSECRETKEY']}, 'T': {'__delete__': ['T']}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 14}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}}, '3DES': {'__update__': {'3DES': 15}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 9}}}}}}, 'crypto_scheme': {'__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 2}}, 'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 2}}}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 3}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 2401': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}, '__delete__': ['ion of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2010-03-23', 'maintenance_title': 'Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CRP249': 46}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 2}}, 'IKE': {'IKE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 140-2': 2, 'FIPS 140-2': 3}, 'CC': {'CCMB-2006-09-001': 1, 'CCMB-2007-09-002': 1, 'CCMB-2007-09-003': 1, 'CCMB-2007-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 8, 'EAL4 augmented': 4}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SEL.1': 6, 'FAU_STG.1': 7, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_CKM.2': 3, 'FCS_COP.1': 3, 'FCS_CKM.1': 7}, 'FDP': {'FDP_IFC.1': 13, 'FDP_IFF.1': 10, 'FDP_UCT.1': 7, 'FDP_UIT.1': 7, 'FDP_IFF.1.1': 3, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.2': 5, 'FDP_IFF.1.3': 5, 'FDP_IFF.1.5': 4, 'FDP_IFF.1.4': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACC.1': 1}, 'FIA': {'FIA_UAU.5': 7, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1': 1}, 'FMT': {'FMT_MSA.1': 8, 'FMT_MSA.2': 16, 'FMT_MSA.3': 7, 'FMT_MTD.1': 8, 'FMT_SMF.1': 10, 'FMT_SMR.1': 10, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FRU': {'FRU_FLT.2': 6, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 9, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 9, 'O.E.AUDIT_SUPPORT': 6, 'O.E.AUDITMAN': 4, 'O.MEDIAT': 9, 'O.NETADDRHIDE': 6, 'O.VPN': 9, 'O.E.MEDIAT_SUPPORT': 6, 'O.E.USER_AUTH': 4, 'O.IDAUTH': 5, 'O.HIGHAVAILABILITY': 6, 'O.CRYPTOSERVICES': 16, 'O.SECFUN': 10, 'O.E.ADMIN_ACCESS': 4, 'O.E.ADMINTRUSTED': 2, 'O.E.MODEXP': 2, 'O.E.OPERATING_ENVIRONMENT': 2, 'O.E.SHAREDSECRETKEY': 2}, 'T': {'T': 3, 'T.AUDIT_UNDETECTED': 4, 'T.MEDIAT': 6, 'T.NOAUTH': 2, 'T.NODE_FAILURE': 2, 'T.SECURE_CONNECTION_COMPROMISE': 4, 'T.SELPRO': 3}, 'A': {'A.ADMINTRUSTED': 3, 'A.SHAREDSECRETKEY': 4, 'A.ADMIN_ACCESS': 2, 'A.AUDITMAN': 2, 'A.AUDIT_SUPPORT': 2, 'A.MEDIAT_SUPPORT': 2, 'A.MODEXP': 2, 'A.OPERATING_ENVIRONMENT': 2, 'A.USER_AUTH': 2, 'A.TIME': 2}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 21}, '3DES': {'3DES': 16}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 13, 'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 19}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 5}}, 'crypto_protocol': {'SSH': {'SSH': 3}, 'TLS': {'SSL': {'SSL': 3}, 'TLS': {'TLS': 1}}, 'IKE': {'IKE': 35}, 'IPsec': {'IPsec': 16}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 5}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 21, 'FIPS PUB 140-2': 4, 'FIPS 46-3': 2, 'FIPS 197': 2, 'FIPS 198': 2, 'FIPS 180-2': 1}, 'PKCS': {'PKCS#1': 2, 'PKCS #1': 1}, 'RFC': {'RFC 1631': 1, 'RFC 2409': 8, 'RFC 2406': 4, 'RFC 959': 3, 'RFC 821': 1, 'RFC 2616': 2, 'RFC 2401': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'ion of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60', 'st_pdf_hash': '9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f', 'report_txt_hash': 'd3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3', 'st_txt_hash': '4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1, 'MD5': 1}, 'rules_crypto_schemes': {'Key Exchange': 2, 'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 16, '3DES': 16, 'DES': 5, 'HMAC': 1}, 'rules_asymmetric_crypto': {'Diffie-Hellman': 13, 'DH': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 19}, 'rules_crypto_schemes': {'MAC': 1, 'Key Exchange': 5, 'SSL': 3, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 5}, 'rules_side_channels': {'malfunction': 3}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': '', 'cert_item': '• confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 © Crown Copyright 2009 – All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 – StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report', 'developer': 'Stonesoft Corporation', 'cert_lab': ''}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name StoneGate Firewall/VPN was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "d670b489e240783a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "CRP249",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2010-03-23",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP249-MR1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/CRP249-ST1.pdf",
        "maintenance_title": "Stonegate Firewall/VPN Version 4.2.2, Build 5708.cc.3.1"
      }
    ]
  },
  "manufacturer": "Stonesoft Corporation",
  "manufacturer_web": "https://www.stonesoft.com/",
  "name": "StoneGate Firewall/VPN",
  "not_valid_after": "2014-03-13",
  "not_valid_before": "2009-03-13",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "crp249.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {
        "cert_id": "",
        "cert_item": "\u2022 confirms that the certificate has been issued under the authority of a party to an international Mutual Recognition Agreement (MRA) 122-B March 2009 Issue 1.0 Page 1 of 22 CERTIFICATION REPORT No. CRP249 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 running on the StoneGate appliance models FW-310, FW-1020, FW-1050, FW-1200, FW-5000 and FW-5100 Issue 1.0 March 2009 \u00a9 Crown Copyright 2009 \u2013 All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body IACS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom CRP249 \u2013 StoneGate Firewall/VPN Version 4.2.2 Build 5708.cc3.1 Page 2 of 22 Issue 1.0 March 2009 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report",
        "cert_lab": "",
        "developer": "Stonesoft Corporation"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CRP249": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_STG": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        },
        "VPN": {
          "VPN": 11
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 1,
          "CCMB-2007-09-002": 1,
          "CCMB-2007-09-003": 1,
          "CCMB-2007-09-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 3,
          "FIPS PUB 140-2": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bhavin",
      "/CreationDate": "D:20090325110143Z00\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20090325110143Z00\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.63",
      "/Title": "Microsoft Word - 090325 LFS T536 StoneGate CRP249 v1.0.doc",
      "pdf_file_size_bytes": 836073,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    },
    "st_filename": "lfs_t536_st.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 13
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMINTRUSTED": 3,
          "A.ADMIN_ACCESS": 2,
          "A.AUDITMAN": 2,
          "A.AUDIT_SUPPORT": 2,
          "A.MEDIAT_SUPPORT": 2,
          "A.MODEXP": 2,
          "A.OPERATING_ENVIRONMENT": 2,
          "A.SHAREDSECRETKEY": 4,
          "A.TIME": 2,
          "A.USER_AUTH": 2
        },
        "O": {
          "O.AUDIT": 9,
          "O.CRYPTOSERVICES": 16,
          "O.E": 41,
          "O.HIGHAVAILABILITY": 6,
          "O.IDAUTH": 5,
          "O.MEDIAT": 9,
          "O.NETADDRHIDE": 6,
          "O.SECFUN": 10,
          "O.VPN": 9
        },
        "T": {
          "T.AUDIT_UNDETECTED": 4,
          "T.MEDIAT": 6,
          "T.NOAUTH": 2,
          "T.NODE_FAILURE": 2,
          "T.SECURE_CONNECTION_COMPROMISE": 4,
          "T.SELPRO": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 10,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 8,
          "EAL4 augmented": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 8,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SEL.1": 6,
          "FAU_SEL.1.1": 1,
          "FAU_STG": 13,
          "FAU_STG.1": 7,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.4": 1
        },
        "FCS": {
          "FCS_CKM": 18,
          "FCS_CKM.1": 7,
          "FCS_CKM.2": 3,
          "FCS_CKM.4": 15,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 33,
          "FCS_COP.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_IFC.1": 12,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 9,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 5,
          "FDP_IFF.1.3": 5,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 5,
          "FDP_UCT.1": 7,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 6,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_UAU.5": 7,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 8,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 16,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 7,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 8,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 8,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_STM.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 6,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 9,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "of Security Functions: administrators access the firewall engine through the Management Server (out of scope) which provides the interface for managing the security policy and authentication attributes, the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 35
        },
        "IPsec": {
          "IPsec": 16
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "SSL": {
            "SSL": 2
          },
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 70
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 9
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 3
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 21,
          "FIPS 180-2": 1,
          "FIPS 197": 2,
          "FIPS 198": 2,
          "FIPS 46-3": 2,
          "FIPS PUB 140-2": 4
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 2
        },
        "RFC": {
          "RFC 1631": 1,
          "RFC 2401": 2,
          "RFC 2406": 4,
          "RFC 2409": 8,
          "RFC 2616": 2,
          "RFC 821": 1,
          "RFC 959": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14
          }
        },
        "DES": {
          "3DES": {
            "3DES": 15
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Bhavin",
      "/CreationDate": "D:20090325110253Z00\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20090325110253Z00\u002700\u0027",
      "/Producer": "GPL Ghostscript 8.63",
      "/Title": "Microsoft Word - T536 ST version 1.0.doc",
      "pdf_file_size_bytes": 321611,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 50
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/crp249.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/lfs_t536_st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "8d6e4aae5e0d47c1c6b0d7976ac67458ef04e6a5a50e4fc52cd27465a9a8ed60",
    "report_txt_hash": "d3d7fb8f25f09d93953e3ac27cfecfbd9f9ba6356d49696c0f637ba0c20598c3",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "9408740c0a82072bbf58c2bfb157a21c7aa337e1ea3be45f6ddcc3ec303f7f8f",
    "st_txt_hash": "4c19b50970489756c31b717479e514754a76751b514794a3a97aa2b69a5fc522"
  },
  "status": "archived"
}