IPCOM EX Series Firmware Security Component V1.0.00
CSV information ?
Status | archived |
---|---|
Valid from | 22.03.2007 |
Valid until | 07.01.2013 |
Scheme | 🇯🇵 JP |
Manufacturer | Fujitsu Limited |
Category | Boundary Protection Devices and Systems |
Security level | EAL1 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Certificates
Certification No. C0088Evaluation facilities
Information Technology Security CenterFile metadata
Title | untitled |
---|---|
Creation date | D:20070323205356+09'00' |
Modification date | D:20070323205356+09'00' |
Pages | 1 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Heuristics ?
Similar certificates
Name | Certificate ID | |
---|---|---|
IPCOM EX Series Firmware Security Component V1.0.00 | JISEC-CC-CRP-C0088 | Compare |
Scheme data ?
Cert Id | JISEC-CC-CRP-C0330 | |
---|---|---|
Supplier | Fujitsu Limited | |
Toe Overseas Name | ----- | |
Expiration Date | 01.12.2016 | |
Claim | EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Certification Date | 01.11.2011 | |
Toe Overseas Link | None | |
Toe Japan Name | IPCOM EX Series Firmware Security Component V2.0.01 | |
Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0330_it1351.html | |
Enhanced | ||
Product | IPCOM EX Series Firmware Security Component | |
Toe Version | V2.0.01 | |
Product Type | Firewall module | |
Cc Version | 3.1 | |
Assurance Level | EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Protection Profile | none | |
Vendor | Fujitsu Limited | |
Evaluation Facility | Information Technology Security Center Evaluation Department | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is a firewall module within the firmware of the integrated network server IPCOM EX. It is located at a boundary point of multiple networks, and provides "IP packet filtering" with which IP packet data received from a network can be delivered to other networks or discarded according to predefined rules (filtering rules). In addition to "IP packet filtering", the TOE provides security functions including "configuration management" that allows only an identified and authenticated administrator to configure the settings for the security function, and "operational assistance management" that records events for the audit trail, such as discarding or passing the IP packet data. TOE security functionality The main security functions of the TOE are as follows: - IP packet filtering Passes or discards the IP packet data sent and received among the multiple LAN interfaces according to the filtering rules set by the system administrator. - Configuration management Allows only a valid administrator that has been identified and authenticated to set or change the information of the TOE configuration definition, such as filtering rules or network settings. - Operational assistance management Stores or backs up the IP packet process records received from "configuration management" or "IP packet filtering", and the audit records that are the TOE behavior results. |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0330', 'toe_overseas_name': '-----', 'expiration_date': '2016-12-01', 'claim': 'EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'certification_date': '2011-11-01', 'toe_japan_name': 'IPCOM EX Series Firmware Security Component V2.0.01', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0330_it1351.html', 'enhanced': {'__insert__': {'protection_profile': 'none'}, '__update__': {'toe_version': 'V2.0.01', 'product_type': 'Firewall module', 'cc_version': '3.1', 'assurance_level': 'EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'evaluation_facility': 'Information Technology Security Center Evaluation Department', 'description': 'PRODUCT DESCRIPTION Description of TOE The TOE is a firewall module within the firmware of the integrated network server IPCOM EX. It is located at a boundary point of multiple networks, and provides "IP packet filtering" with which IP packet data received from a network can be delivered to other networks or discarded according to predefined rules (filtering rules). In addition to "IP packet filtering", the TOE provides security functions including "configuration management" that allows only an identified and authenticated administrator to configure the settings for the security function, and "operational assistance management" that records events for the audit trail, such as discarding or passing the IP packet data. TOE security functionality The main security functions of the TOE are as follows: - IP packet filtering Passes or discards the IP packet data sent and received among the multiple LAN interfaces according to the filtering rules set by the system administrator. - Configuration management Allows only a valid administrator that has been identified and authenticated to set or change the information of the TOE configuration definition, such as filtering rules or network settings. - Operational assistance management Stores or backs up the IP packet process records received from "configuration management" or "IP packet filtering", and the audit records that are the TOE behavior results.'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0088', 'supplier': 'Fujitsu Limited', 'toe_overseas_name': 'IPCOM EX Series\n Firmware Security Component\n V1.1.00', 'expiration_date': '2013-03', 'claim': 'EAL1', 'revalidations': [{'date': '2007-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105_01.html'}], 'certification_date': '2007-03', 'toe_overseas_link': None, 'toe_japan_name': 'IPCOM EX Series Firmware\n Security Component\n V1.0.00', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105.html', 'enhanced': {'product': 'IPCOM EX Series Firmware Security Component', 'toe_version': 'V1.0.00', 'product_type': 'IT Product (Firewall)', 'certification_date': '2007-03-22', 'cc_version': '2.3', 'assurance_level': 'EAL1', 'vendor': 'Fujitsu Limited', 'evaluation_facility': 'Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)', 'description': 'PRODUCT DESCRIPTION \n This product is the embedded firmware of firewall appliance that provides the following functions. \n \n - IP packet filtering \n - Operational assistance \n - Configuration \n \n These functions shield the traffic resources on internal network from threats of illegal access and keep the advantage that resources on external network can be used. This product is previously installed as a firmware of following appliances of Fujitsu Limited. \n \n - IPCOM EX1000 SC \n - IPCOM EX1200 SC \n - IPCOM EX2000 SC \n - IPCOM EX1000 LB\n - IPCOM EX1200 LB\n - IPCOM EX2000 LB'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ae815a4b80bbe5c195b9d449cbda68ffb34b5becee687ba16e27bf275ea0f4e1', 'txt_hash': '4dd09fc4b60a387d7ed9b45696d933a82d1345bec9f177d4cf24aa75f4b3f95f'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 13167, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/ModDate': "D:20070323205356+09'00'", '/CreationDate': "D:20070323205356+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'Certification No. C0088': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'ITSC': {'Information Technology Security Center': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0088_ecvr.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0088
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IPCOM EX Series Firmware Security Component V1.0.00 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Boundary Protection Devices and Systems",
"cert_link": null,
"dgst": "bd0bcbdf2f54de16",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0088",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": null,
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0.00"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0330",
"certification_date": "2011-11-01",
"claim": "EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"enhanced": {
"assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"cc_version": "3.1",
"description": "PRODUCT DESCRIPTION Description of TOE The TOE is a firewall module within the firmware of the integrated network server IPCOM EX. It is located at a boundary point of multiple networks, and provides \"IP packet filtering\" with which IP packet data received from a network can be delivered to other networks or discarded according to predefined rules (filtering rules). In addition to \"IP packet filtering\", the TOE provides security functions including \"configuration management\" that allows only an identified and authenticated administrator to configure the settings for the security function, and \"operational assistance management\" that records events for the audit trail, such as discarding or passing the IP packet data. TOE security functionality The main security functions of the TOE are as follows: - IP packet filtering Passes or discards the IP packet data sent and received among the multiple LAN interfaces according to the filtering rules set by the system administrator. - Configuration management Allows only a valid administrator that has been identified and authenticated to set or change the information of the TOE configuration definition, such as filtering rules or network settings. - Operational assistance management Stores or backs up the IP packet process records received from \"configuration management\" or \"IP packet filtering\", and the audit records that are the TOE behavior results.",
"evaluation_facility": "Information Technology Security Center Evaluation Department",
"product": "IPCOM EX Series Firmware Security Component",
"product_type": "Firewall module",
"protection_profile": "none",
"toe_version": "V2.0.01",
"vendor": "Fujitsu Limited"
},
"expiration_date": "2016-12-01",
"supplier": "Fujitsu Limited",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0330_it1351.html",
"toe_japan_name": "IPCOM EX Series Firmware Security Component V2.0.01",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Fujitsu Limited",
"manufacturer_web": "https://www.fujitsu.com/",
"name": "IPCOM EX Series Firmware Security Component V1.0.00",
"not_valid_after": "2013-01-07",
"not_valid_before": "2007-03-22",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0088_ecvr.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"Certification No. C0088": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ITSC": {
"Information Technology Security Center": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20070323205356+09\u002700\u0027",
"/ModDate": "D:20070323205356+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 13167,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"st_filename": null,
"st_frontpage": null,
"st_keywords": null,
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0088_ecvr.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"st_link": null,
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ae815a4b80bbe5c195b9d449cbda68ffb34b5becee687ba16e27bf275ea0f4e1",
"txt_hash": "4dd09fc4b60a387d7ed9b45696d933a82d1345bec9f177d4cf24aa75f4b3f95f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
}
},
"status": "archived"
}