Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei S2300, S2700, S5300, S5700, S6300, S6700, S7700, S9300, S9700 Ethernet Switches V200R003
SERTIT-052
IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
CCEVS-VR-VID-10055-2008
name Huawei S2300, S2700, S5300, S5700, S6300, S6700, S7700, S9300, S9700 Ethernet Switches V200R003 IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
scheme NO US
not_valid_after 01.09.2019 20.07.2012
not_valid_before 21.08.2013 31.07.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-052%20CR%20v%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ASE]%20CC%20Huawei%20S%20Series%20Ethernet%20Switches%20V200R003%20-%20Security%20Target%20V1.0_Final%20from%20Huawei.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10055-st.pdf
manufacturer Huawei Technologies Co. Ltd. IBM Corporation
manufacturer_web https://www.huawei.com https://www.ibm.com
security_level ALC_CMC.4, EAL3+ EAL2
dgst 1947cda3ffc4c0f0 217a610530fdc3fa
heuristics/cert_id SERTIT-052 CCEVS-VR-VID-10055-2008
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMS.3, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions - 7.1, 2.0
heuristics/scheme_data
  • category: Network and Network-Related Devices and Systems
  • certification_date: 28.08.2013
  • developer: Huawei Technologies Co. , Ltd.
  • enhanced:
    • category: Network and Network-Related Devices and Systems
    • cert_id: SERTIT-052
    • certification_date: 28.08.2013
    • description: SERTIT-052 C
    • developer: Huawei Technologies Co. , Ltd.
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134896-1607951580/SERTIT/Sertifikater/2013/52/%5BASE%5D%20CC%20Huawei%20S%20Series%20Ethernet%20Switches%20V200R003%20-%20Security%20Target%20V1.0_Final%20from%20Huawei.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134899-1607951586/SERTIT/Sertifikater/2013/52/SERTIT-052%20CR%20v%201.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 3, ALC_CMC.4
    • mutual_recognition: CCRA
    • product: V200R003
    • sponsor: Huawei Technologies Co., Ltd.
  • product: Huawei S2300, S2700, S5300, S5700, S6300, S6700, S7700, S9300, S9700 Ethernet Switches
  • url: https://sertit.no/certified-products/product-archive/huawei-s2300-s2700-s5300-s5700-s6300-s6700-s7700-s9300-s9700-ethernet-switches
  • category: Network Management
  • certification_date: 31.07.2008
  • evaluation_facility: Arca CCTL
  • expiration_date:
  • id: CCEVS-VR-VID10055
  • product: IBM Tivoli Netcool OMNIbus v7.1 with Tivoli Netcool Webtop v2.0
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10055
  • vendor: IBM Corporation
pdf_data/report_filename SERTIT-052 CR v 1.0.pdf st_vid10055-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10055-2008
    • cert_item: IBM Tivoli Netcool OMNIbus v7.1 with IBM Tivoli Netcool WebTop v2.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-052: 27
  • US:
    • CCEVS-VR-VID10055-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL1: 1
    • EAL3: 28
    • EAL3+: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 4: 1
    • EAL2: 4
    • EAL3: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 4
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 4
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.3: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_COP: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.INSTALL: 1
    • A.LOWEXP: 1
    • A.OSLOGIN: 1
    • A.PHYSEC: 1
    • A.PROBE: 1
    • A.SEL_PRO: 1
    • A.SOLARIS: 1
    • A.TRUSTED: 1
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 17
    • Huawei Technologies: 3
  • Cisco:
    • Cisco: 17
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-004: 1
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_metadata
  • /Author: Kvassnes, Kjartan Jæger
  • /CreationDate: D:20130821130201+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20130821130308+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: tittel
  • pdf_file_size_bytes: 1489768
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: dmhale1
  • /CreationDate: D:20081020142813-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20081020142813-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - VID10055-VR-final.doc
  • pdf_file_size_bytes: 379398
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename [ASE] CC Huawei S Series Ethernet Switches V200R003 - Security Target V1.0_Final from Huawei.pdf st_vid10055-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
    • EAL3+: 1
  • EAL:
    • EAL 2: 1
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.3: 3
    • ALC_CMC.4: 3
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 3
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 5
    • FCS_CKM.4: 7
    • FCS_CKM.4.1: 2
    • FCS_COP: 6
    • FCS_COP.1: 9
    • FCS_COP.1.1: 6
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU.1: 9
    • FDP_DAU.1.1: 2
    • FDP_DAU.1.2: 2
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 12
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FRU:
    • FRU_FLT.1: 5
    • FRU_FLT.1.1: 1
    • FRU_PRS.1: 5
    • FRU_PRS.1.1: 1
    • FRU_PRS.1.2: 1
    • FRU_RSA.1: 5
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_TSE.1: 4
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_STM.1: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN_EXP.1: 9
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 19
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 2
    • FCS_COP.1: 17
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 11
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 11
    • FDP_IFF.1: 13
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 8
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 12
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 7
    • FMT_SMR.1: 8
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_RVM.1: 2
    • FPT_RVM_EXP.1: 8
    • FPT_SEP.1: 2
    • FPT_SEP_EXP.1: 6
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM.1: 6
    • FPT_TRC.1: 7
    • FPT_TRC.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.INSTALL: 4
    • A.LOWEXP: 2
    • A.OSLOGIN: 2
    • A.PHYSEC: 2
    • A.PROBE: 2
    • A.SEL_PRO: 4
    • A.SOLARIS: 2
    • A.TRUSTED: 3
  • O:
    • O.AUDITING: 4
    • O.AUDITPROTECT: 4
    • O.AUTHORIZATION: 4
    • O.DISCRETIONARY_ACCESS: 4
    • O.MANAGE: 4
    • O.REPLICATION: 4
    • O.SECURECOMMS: 4
    • O.SEL_PRO: 6
  • OE:
    • OE.CREDEN: 3
    • OE.INSTALL: 5
    • OE.LOWEXP: 3
    • OE.OSLOGIN: 6
    • OE.PAM: 5
    • OE.PHYSICAL: 3
    • OE.PROBE: 3
    • OE.SEL_PRO: 7
  • T:
    • T.AUD: 3
    • T.COMPDATA: 3
    • T.DATABASEFAIL: 4
    • T.DATABSEFAIL: 1
    • T.INSECURE: 4
    • T.LOWEXP: 5
    • T.NETSEC: 9
    • T.SEL_PRO: 2
    • T.UNAUTH: 5
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 22
    • Huawei Technologies Co: 65
  • Cisco:
    • Cisco: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
      • AES128: 1
      • AES256: 1
  • DES:
    • 3DES:
      • 3DES: 4
  • constructions:
    • MAC:
      • HMAC: 1
  • DES:
    • 3DES:
      • 3-DES: 2
    • DES:
      • DES: 7
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 10
  • SHA:
    • SHA1:
      • SHA1: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 38
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 36
    • SSHv1: 3
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 1
  • PKCS:
    • PKCS#1: 2
  • RFC:
    • RFC 1321: 1
    • RFC 2104: 1
    • RFC 4253: 3
    • RFC4419: 1
  • FIPS:
    • FIPS PUB 46-2: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS #3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation of this TOE. Ultimately the validity of the key management for these protocols is: 1
    • to a platform needing to communicate. The destruction of the TOE public/private key pair is also out of scope of the evaluation as once the keys are created they are data files controlled by operating systems: 1
pdf_data/st_metadata
  • /Author: d00113891
  • /CreationDate: D:20130824225906+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130824225906+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 963977
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 63
  • /Author:
  • /CreationDate: D:20081017125000+0500
  • /CreationDate--Text: D:20081017125000+0500
  • /Creator: Windows NT 4.0
  • /ModDate: D:20081020144551-04'00'
  • /Producer: 5D PDF Creator
  • /Title: Microsoft Word - IBM_Netcool-OMNIbus-v7.1_with_Webtop-v2.0_EAL2_ASE_ST_v2.9_Sanitized IBM.doc
  • pdf_file_size_bytes: 838811
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different