| name |
Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A2.06-C2.04-P2.01-K2.02 |
Huawei GaussDB(openGauss) Database Management System (DBMS) V500R001C20SPC100+V500R001C20HP1015 |
| category |
Network and Network-Related Devices and Systems |
Databases |
| scheme |
JP |
NL |
| status |
archived |
active |
| not_valid_after |
03.03.2016 |
31.08.2027 |
| not_valid_before |
25.02.2011 |
31.08.2022 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cert-cc-22-0392006.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0283_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0392006-cr-final.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0283_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/huawei-gaussdb-kernel-v500r001c20spc100-security-target-v0.18.pdf |
| manufacturer |
Ricoh Company, Ltd. |
Huawei Technologies Co., Ltd. |
| manufacturer_web |
https://www.ricoh.com/ |
https://www.huawei.com |
| security_level |
EAL3 |
EAL4+, ALC_FLR.2 |
| dgst |
172c0a4dc5fcb821 |
acde0feaacc840d9 |
| heuristics/cert_id |
JISEC-CC-CRP-C0283 |
NSCIB-CC-0392006-CR |
| heuristics/cert_lab |
[] |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_FLR.2 |
| heuristics/extracted_versions |
2.01, 2.04, 2.06, 2.02 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0283
- certification_date: 01.02.2011
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0283_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints (device counter collection function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the device counter collection function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the genuine CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured by using a SSL protocol. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - Access control function This function restricts user access according to specified user roles. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only. - Audit logging function This function enables the TOE to record the information related to security relevant events and allows only the administrator to review the audit logging.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Remote Communication Gate A
- product_type: Appliance for remote service
- report_link: https://www.ipa.go.jp/en/security/c0283_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0283_est.pdf
- toe_version: Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.03.2016
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: Remote Communication Gate A Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0283_it0306.html
- toe_overseas_name: Remote Communication Gate A Machine Code (First 4 characters) : D459 Firmware Version : A2.06-C2.04-P2.01-K2.02
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
3f6ac99252bbf14e |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088b_pdf.pdf |
| pdf_data/cert_filename |
|
nscib-cert-cc-22-0392006.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL4: 2
- EAL4 augmented: 1
|
| pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR.2: 1
- ALC_FLR.3: 2
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 1
|
| pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: kruitr
- /CreationDate: D:20220928161032+02'00'
- /Creator: Bullzip PDF Printer (11.0.0.2588)
- /ModDate: D:20220928161124+02'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - CC-22-0392006_rev1.doc
- pdf_file_size_bytes: 246144
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
c0283_erpt.pdf |
nscib-cc-0392006-cr-final.pdf |
| pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0392006-CR
- cert_item: Huawei GaussDB(openGauss) Database Management System (DBMS) V500R001C20SPC100+V500R001C20HP1015
- cert_lab: SGS Brightsight B.V.
- developer: Huawei Technologies Co., Ltd
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0283-01: 1
- Certification No. C0283: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 1
- EAL4+: 1
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMINSHIP: 1
- A.CE: 1
- A.DEVICE: 1
- A.NETWORK: 1
- A.TOE_ADMIN: 1
- T:
- T.ACCESS: 2
- T.FAKE_CS: 2
- T.INTERNET: 2
|
|
| pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 16
- Huawei Technologies Co: 3
|
| pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110426174640+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110426174731+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 794086
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 37
|
|
| pdf_data/st_filename |
c0283_est.pdf |
huawei-gaussdb-kernel-v500r001c20spc100-security-target-v0.18.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.2: 3
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.3: 5
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 16
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 2
- FAU_SEL.1: 11
- FAU_SEL.1.1: 3
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 2
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 3
- FIA:
- FIA_ATD.1: 17
- FIA_ATD.1.1: 2
- FIA_UAU: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 2
- FIA_UAU.2.2: 1
- FIA_UID: 1
- FIA_UID.1: 3
- FIA_UID.2: 12
- FIA_UID.2.1: 2
- FIA_UID.2.2: 1
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 2
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_REV.1: 15
- FMT_REV.1.1: 5
- FMT_REV.1.2: 3
- FMT_SMF.1: 14
- FMT_SMF.1.1: 3
- FMT_SMR.1: 21
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 13
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 2
- FTA_MCS.1.2: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMINSHIP: 3
- A.CE: 3
- A.DEVICE: 3
- A.NETWORK: 3
- A.TOE_ADMIN: 3
- O:
- O.ACCESS: 9
- O.AUDIT_LOGGED: 6
- O.COM_ATR_DEVICE: 10
- O.COM_CS: 8
- O.COM_OPERATOR: 7
- O.GENUINE: 7
- OE:
- OE.ADMIN: 3
- OE.CE: 3
- OE.DEVICE: 3
- OE.NETWORK: 4
- OE.SUPER: 4
- T:
- T.ACCESS: 2
- T.FAKE_CS: 2
- T.INTERNET: 2
|
- A:
- A.AUTHUSER: 2
- A.CONNECT: 3
- A.MANAGE: 2
- A.NO_GENERAL_PURPOSE: 3
- A.PHYSICAL: 3
- A.SUPPORT: 4
- A.TRAINEDUSER: 2
- O:
- O.ACCESS_HISTORY: 1
- O.ADMIN_R: 1
- O.ADMIN_ROLE: 9
- O.AUDIT: 2
- O.AUDIT_GENERATION: 5
- O.DISCRETI: 1
- O.DISCRETIONARY: 2
- O.DISCRETIONARY_ACCESS: 5
- O.MANAGE: 12
- O.MEDIATE: 9
- O.RESIDUAL: 1
- O.RESIDUAL_INFORM: 1
- O.RESIDUAL_INFORMATION: 8
- O.TOE_ACCE: 1
- O.TOE_ACCESS: 18
- OE:
- OE.ADMIN: 11
- OE.INFO_PROTECT: 20
- OE.IT_REMOTE: 10
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 9
- OE.NO_GENERAL_PURPOSE: 8
- OE.PHYSICAL: 8
- T:
- T.ACCESS_TSFDATA: 3
- T.ACCESS_TSFFUNC: 2
- T.IA_MASQUERADE: 5
- T.IA_USER: 2
- T.RESIDUAL_DATA: 3
- T.TSF_COMPROMISE: 3
- T.UNAUTHORIZED_AC: 1
- T.UNAUTHORIZED_ACCESS: 3
|
| pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 16
- Huawei Technologies Co: 104
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 600 GB, and the space of each non-OS disk is greater than or equal to 600 GB. Switch Switch is also out of scope and thus not included in the TOE. It is used to connect node instances in a cluster. OS Evaluation: 1
- Cluster Manage Components (including CM Agent, Om Monitor, and CM Server, ETCD) are also out of scope and thus not included in the TOE. They are used to manage and monitor the running status of the TOE: 1
- Operation Manager Server (including gs_ctl, gs_dump, gs_restore, gs_upgrade, gs_redis) are also out of scope and thus not included in the TOE. They offer the operation tools and configuration manage: 1
- TOE. Clients Clients (including local and remote clients: GSQL, JDBC, ODBC, Psycopg,Libpq) are also out of scope and thus not included in the TOE. They are used to interact with the TOE. Cluster Manager: 1
- V2.0SP5, x86_64 Supported OSs: EulerOS V2.0SP8, ARM Software The Software of Python v2.7 is out of scope and thus not included in the TOE. The Software of Huawei JDK1.8.0 is out of scope and thus not: 1
- database security. 2.3.3 Non-TOE Hardware and Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: Server hardware and OS are: 1
- including CM Agent, Om Monitor, and CM Server, ETCD) are also out of scope and thus not included in the TOE: 1
- including gs_ctl, gs_dump, gs_restore, gs_upgrade, gs_redis) are also out of scope and thus not included in the TOE: 1
- including local and remote clients: GSQL, JDBC, ODBC, Psycopg,Libpq) are also out of scope and thus not included in the TOE: 1
- out of scope: 9
- the required environment for installing and running the TOE. Manager Network channel is also out of scope and thus not included in the TOE. It is used to monitor the status of each node instance in the: 1
|
| pdf_data/st_metadata |
- /Author: team RC Gate
- /Company: 株式会社リコー
- /CreationDate: D:20110425171517+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /ModDate: D:20110425171632+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: Security Target for RC Gate
- pdf_file_size_bytes: 499016
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 51
|
- /Author: zhujinwei,wangshaoyu
- /CreationDate: D:20220607160913+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: ST
- /ModDate: D:20220607160913+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Target
- /Title: ASE_ST
- pdf_file_size_bytes: 2037368
- pdf_hyperlinks: https://e.huawei.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |